Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 49 of 724
CVE-2022-50826UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50826 CVE-2022-50826: In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v4l
In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v4l2_subdev_get_try_crop() and v4l2_subdev_get_try_compose() with a subdev state of NULL leads to a NULL pointer dereference. This can currently happen in imgu_subdev_set_
osv
CVE-2022-50859UNKNOWN≥ 5.0.0, < 5.4.220≥ 5.5.0, < 5.10.150+3 more2025-12-30
CVE-2022-50859 cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
Commit d5c7076b772a ("smb3: add smb3.1.1 to default dialect list")
extend the dialects from 3 to 4, but forget to decrease the extended
length when specific the dialect, then the message length is larger
than expected.
This may
osv
CVE-2022-50811UNKNOWN≥ 5.13.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-30
CVE-2022-50811 erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
Otherwise, meta buffers could be leaked.
osv
CVE-2023-54205UNKNOWN≥ 5.2.0, < 5.4.235≥ 5.5.0, < 5.10.173+3 more2025-12-30
CVE-2023-54205 pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
of_irq_find_parent() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
osv
CVE-2022-50825UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50825 CVE-2022-50825: In the Linux kernel, the following vulnerability has been resolved: usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe() I got the follo
In the Linux kernel, the following vulnerability has been resolved: usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe() I got the following report while doing fault injection test: OF: ERROR: memory leak, expected refcount 1 instead of 4, of_node_get()/of_node_put() unbalanced - destroy cset entry: att
osv
CVE-2022-50839UNKNOWN≥ 5.10.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-30
CVE-2022-50839 jbd2: fix potential buffer head reference count leak
jbd2: fix potential buffer head reference count leak
In the Linux kernel, the following vulnerability has been resolved:
jbd2: fix potential buffer head reference count leak
As in 'jbd2_fc_wait_bufs' if buffer isn't uptodate, will return -EIO without
update 'journal->j_fc_off'. But 'jbd2_fc_release_bufs' will release buffer head
from ‘j_fc_off - 1’ if 'bh' is NULL will terminal release which will lead to
buffer head buffer he
osv
CVE-2023-54273UNKNOWN≥ 6.2.0, < 6.3.42025-12-30
CVE-2023-54273 xfrm: Fix leak of dev tracker
xfrm: Fix leak of dev tracker
In the Linux kernel, the following vulnerability has been resolved:
xfrm: Fix leak of dev tracker
At the stage of direction checks, the netdev reference tracker is
already initialized, but released with wrong *_put() call.
osv
CVE-2022-50852UNKNOWN≥ 6.0.0, < 6.0.32025-12-30
CVE-2022-50852 wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
Don't dereference "sar_root" after it has been freed.
osv
CVE-2022-50821UNKNOWN≥ 3.10.0, < 4.19.270≥ 4.20.0, < 5.4.229+4 more2025-12-30
CVE-2022-50821 SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
osv
CVE-2023-54315UNKNOWN≥ 5.9.0, < 5.10.188≥ 5.11.0, < 5.15.121+3 more2025-12-30
CVE-2023-54315 powerpc/powernv/sriov: perform null check on iov before dereferencing iov
powerpc/powernv/sriov: perform null check on iov before dereferencing iov
In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv/sriov: perform null check on iov before dereferencing iov
Currently pointer iov is being dereferenced before the null check of iov
which can lead to null pointer dereference errors. Fix this by moving the
iov null check before the dereferencing.
Det
osv
CVE-2022-50813UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50813 CVE-2022-50813: In the Linux kernel, the following vulnerability has been resolved: drivers: mcb: fix resource leak in mcb_probe() When probe hook function failed in
In the Linux kernel, the following vulnerability has been resolved: drivers: mcb: fix resource leak in mcb_probe() When probe hook function failed in mcb_probe(), it doesn't put the device. Compiled test only.
osv
CVE-2023-54191UNKNOWN≥ 6.2.0, < 6.2.32025-12-30
CVE-2023-54191 wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit
wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit
Always purge mcu skb queues in mt7996_mcu_exit routine even if
mt7996_firmware_state fails.
osv
CVE-2023-54227UNKNOWN≥ 5.16.0, < 6.5.52025-12-30
CVE-2023-54227 blk-mq: fix tags leak when shrink nr_hw_queues
blk-mq: fix tags leak when shrink nr_hw_queues
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: fix tags leak when shrink nr_hw_queues
Although we don't need to realloc set->tags[] when shrink nr_hw_queues,
we need to free them. Or these tags will be leaked.
How to reproduce:
1. mount -t configfs configfs /mnt
2. modprobe null_blk nr_devices=0 submit_queues=8
3. mkdir /mnt/nullb/nullb0
4. echo 1 > /mnt/n
osv
CVE-2023-54254UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54254 CVE-2023-54254: In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on eviction error On eviction errors other than -EM
In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on eviction error On eviction errors other than -EMULTIHOP we were leaking a resource. Fix. v2: - Avoid yet another goto (Andi Shyti)
osv
CVE-2023-54167UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54167 CVE-2023-54167: In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_virt handling after paging_init() When booting with
In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_virt handling after paging_init() When booting with an initial ramdisk on platforms where physical memory does not start at address zero (e.g. on Amiga): initrd: 0ef0602c - 0f800000 Zone ranges: DMA [mem 0x000000000800000
osv
CVE-2023-54237UNKNOWN≥ 5.8.0, < 6.1.16≥ 6.2.0, < 6.2.32025-12-30
CVE-2023-54237 net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()
net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()
In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()
There is a certain chance to trigger the following panic:
PID: 5900 TASK: ffff88c1c8af4100 CPU: 1 COMMAND: "kworker/1:48"
#0 [ffff9456c1cc79a0] machine_kexec at ffffffff870665b7
#1 [ffff9456c1cc79f
osv
CVE-2023-54188UNKNOWN≥ 0, < 6.1.25-12025-12-30
CVE-2023-54188 CVE-2023-54188: In the Linux kernel, the following vulnerability has been resolved: dmaengine: apple-admac: Fix 'current_tx' not getting freed In terminate_all we sho
In the Linux kernel, the following vulnerability has been resolved: dmaengine: apple-admac: Fix 'current_tx' not getting freed In terminate_all we should queue up all submitted descriptors to be freed. We do that for the content of the 'issued' and 'submitted' lists, but the 'current_tx' descriptor falls through the
osv
CVE-2023-54197UNKNOWN≥ 0, < 4.14.315≥ 4.15.0, < 4.19.283+6 more2025-12-30
CVE-2023-54197 Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
In the Linux kernel, the following vulnerability has been resolved:
Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.
This patch introduces a possible null-ptr-def problem. Revert it. And the
fixe
osv
CVE-2022-50829UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50829 CVE-2022-50829: In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb() It is possib
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb() It is possible that skb is freed in ath9k_htc_rx_msg(), then usb_submit_urb() fails and we try to free skb again. It causes use-after-free bug. Moreover, if alloc_skb() fails, urb-
osv
CVE-2023-54165UNKNOWN≥ 6.2.0, < 6.3.52025-12-30
CVE-2023-54165 zsmalloc: move LRU update from zs_map_object() to zs_malloc()
zsmalloc: move LRU update from zs_map_object() to zs_malloc()
In the Linux kernel, the following vulnerability has been resolved:
zsmalloc: move LRU update from zs_map_object() to zs_malloc()
Under memory pressure, we sometimes observe the following crash:
[ 5694.832838] ------------[ cut here ]------------
[ 5694.842093] list_del corruption, ffff888014b6a448->next is LIST_POISON1 (dead000000000100)
[ 5694.858677] W
osv