Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 46 of 724
CVE-2023-54310UNKNOWN≥ 2.6.12, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-12-30
CVE-2023-54310 scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition In the Linux kernel, the following vulnerability has been resolved: scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition mptlan_probe() calls mpt_register_lan_device() which initializes the &priv->post_buckets_task workqueue. A call to mpt_lan_wake_post_buckets_task() will
osv
CVE-2022-50853UNKNOWN≥ 0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-30
CVE-2022-50853 NFSv4: Fix a credential leak in _nfs4_discover_trunking() NFSv4: Fix a credential leak in _nfs4_discover_trunking() In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix a credential leak in _nfs4_discover_trunking()
osv
CVE-2022-50822UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50822 CVE-2022-50822: In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Release MR restrack when delete The MR restrack also needs to be re In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Release MR restrack when delete The MR restrack also needs to be released when delete it, otherwise it cause memory leak as the task struct won't be released.
osv
CVE-2023-54193UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-30
CVE-2023-54193 CVE-2023-54193: In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: remove block_cb from driver_list before freeing Error handler In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: remove block_cb from driver_list before freeing Error handler of tcf_block_bind() frees the whole bo->cb_list on error. However, by that time the flow_block_cb instances are already in the driver list because driver ndo_setup_tc()
osv
CVE-2022-50889UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50889 CVE-2022-50889: In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF pro In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr().
osv
CVE-2022-50878UNKNOWN≥ 5.10.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-30
CVE-2022-50878 gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() In the Linux kernel, the following vulnerability has been resolved: gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() A NULL check for bridge->encoder shows that it may be NULL, but it already been dereferenced on all paths leading to the check. 812 if (!bridge->encoder) { Dereference the pointer br
osv
CVE-2023-54326UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54326 CVE-2023-54326: In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Free IRQs before removing the device In pci_endpoint_test In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Free IRQs before removing the device In pci_endpoint_test_remove(), freeing the IRQs after removing the device creates a small race window for IRQs to be received with the test device memory already released, causing the IRQ
osv
CVE-2023-54304UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54304 CVE-2023-54304: In the Linux kernel, the following vulnerability has been resolved: firmware: meson_sm: fix to avoid potential NULL pointer dereference of_match_devic In the Linux kernel, the following vulnerability has been resolved: firmware: meson_sm: fix to avoid potential NULL pointer dereference of_match_device() may fail and returns a NULL pointer. Fix this by checking the return value of of_match_device.
osv
CVE-2022-50856UNKNOWN≥ 5.5.0, < 5.10.152≥ 5.11.0, < 5.15.76+1 more2025-12-30
CVE-2022-50856 cifs: Fix xid leak in cifs_ses_add_channel() cifs: Fix xid leak in cifs_ses_add_channel() In the Linux kernel, the following vulnerability has been resolved: cifs: Fix xid leak in cifs_ses_add_channel() Before return, should free the xid, otherwise, the xid will be leaked.
osv
CVE-2023-54203UNKNOWN≥ 5.15.105, < 5.15.145≥ 6.1.22, < 6.1.24+1 more2025-12-30
CVE-2023-54203 ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr When smb1 mount fails, KASAN detect slab-out-of-bounds in init_smb2_rsp_hdr like the following one. For smb1 negotiate(56bytes) , init_smb2_rsp_hdr() for smb2 is called. The issue occurs while handling smb1 negotiate as smb2 server operations. Add smb server op
osv
CVE-2023-54217UNKNOWN≥ 6.3.0, < 6.3.22025-12-30
CVE-2023-54217 Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue" Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue" In the Linux kernel, the following vulnerability has been resolved: Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue" This reverts commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0. A recent patch that tried to fix up the msm_drm_init() paths with respect to the workqueue but only ended up making things
osv
CVE-2022-50887UNKNOWN≥ 3.3.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50887 regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got the the following report: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /i2c/pmic@62/regu
osv
CVE-2023-54257UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-30
CVE-2023-54257 CVE-2023-54257: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite so In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite some time we were chasing a bug which looked like a sudden permanent failure of networking and mmc on some of our devices. The bug was very sensitive to any software chan
osv
CVE-2023-54242UNKNOWN≥ 5.17.0, < 6.1.30≥ 6.2.0, < 6.3.42025-12-30
CVE-2023-54242 block, bfq: Fix division by zero error on zero wsum block, bfq: Fix division by zero error on zero wsum In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by zero error on zero wsum When the weighted sum is zero the calculation of limit causes a division by zero error. Fix this by continuing to the next level. This was discovered by running as root: stress-ng --ioprio 0 Fixes divison by error oops: [ 521.450556] divide error: 0000 [
osv
CVE-2023-54279UNKNOWN≥ 3.10.0, < 4.14.315≥ 4.15.0, < 4.19.283+6 more2025-12-30
CVE-2023-54279 MIPS: fw: Allow firmware to pass a empty env MIPS: fw: Allow firmware to pass a empty env In the Linux kernel, the following vulnerability has been resolved: MIPS: fw: Allow firmware to pass a empty env fw_getenv will use env entry to determine style of env, however it is legal for firmware to just pass a empty list. Check if first entry exist before running strchr to avoid null pointer dereference.
osv
CVE-2023-54183UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54183 CVE-2023-54183: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() If fwn In the Linux kernel, the following vulnerability has been resolved: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() If fwnode_graph_get_remote_endpoint() fails, 'fwnode' is known to be NULL, so fwnode_handle_put() is a no-op. Release the reference taken from a previous fwnode_graph_get_por
osv
CVE-2023-54215UNKNOWN≥ 0, < 6.4.13-12025-12-30
CVE-2023-54215 CVE-2023-54215: In the Linux kernel, the following vulnerability has been resolved: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() Free the cpumask al In the Linux kernel, the following vulnerability has been resolved: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() Free the cpumask allocated by create_affinity_masks() before returning from the function.
osv
CVE-2023-54230UNKNOWN≥ 3.1.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-30
CVE-2023-54230 amba: bus: fix refcount leak amba: bus: fix refcount leak In the Linux kernel, the following vulnerability has been resolved: amba: bus: fix refcount leak commit 5de1540b7bc4 ("drivers/amba: create devices from device tree") increases the refcount of of_node, but not releases it in amba_device_release, so there is refcount leak. By using of_node_put to avoid refcount leak.
osv
CVE-2022-50849UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50849 CVE-2022-50849: In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by ru In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by running 'cat /proc/kcore > /dev/null' on devices using pstore with the ram backend because kmap_atomic() assumes lowmem pages are accessible with __va(). Unable to handle
osv
CVE-2022-50880UNKNOWN≥ 4.8.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-30
CVE-2022-50880 wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() When peer delete failed in a disconnect operation, use-after-free detected by KFENCE in below log. It is because for each vdev_id and address, it has only one struct ath10k_peer, it is allocat
osv