Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 52 of 724
CVE-2023-54121UNKNOWN≥ 2.6.33, < 6.1.47≥ 6.2.0, < 6.4.122025-12-24
CVE-2023-54121 btrfs: fix incorrect splitting in btrfs_drop_extent_map_range
btrfs: fix incorrect splitting in btrfs_drop_extent_map_range
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix incorrect splitting in btrfs_drop_extent_map_range
In production we were seeing a variety of WARN_ON()'s in the extent_map
code, specifically in btrfs_drop_extent_map_range() when we have to call
add_extent_mapping() for our second split.
Consider the following extent map layou
osv
CVE-2023-54023UNKNOWN≥ 3.3.0, < 6.1.42≥ 6.2.0, < 6.4.72025-12-24
CVE-2023-54023 btrfs: fix race between balance and cancel/pause
btrfs: fix race between balance and cancel/pause
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race between balance and cancel/pause
Syzbot reported a panic that looks like this:
assertion failed: fs_info->exclusive_operation == BTRFS_EXCLOP_BALANCE_PAUSED, in fs/btrfs/ioctl.c:465
------------[ cut here ]------------
kernel BUG at fs/btrfs/messages.c:259!
RIP: 0010:btrfs_assertfail+0x2c/0x30 fs/b
osv
CVE-2023-54126UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54126 CVE-2023-54126: In the Linux kernel, the following vulnerability has been resolved: crypto: safexcel - Cleanup ring IRQ workqueues on load failure A failure loading t
In the Linux kernel, the following vulnerability has been resolved: crypto: safexcel - Cleanup ring IRQ workqueues on load failure A failure loading the safexcel driver results in the following warning on boot, because the IRQ affinity has not been correctly cleaned up. Ensure we clean up the affinity and workqueues
osv
CVE-2023-53989UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.4.11-12025-12-24
CVE-2023-53989 CVE-2023-53989: In the Linux kernel, the following vulnerability has been resolved: arm64: mm: fix VA-range sanity check Both create_mapping_noalloc() and update_mapp
In the Linux kernel, the following vulnerability has been resolved: arm64: mm: fix VA-range sanity check Both create_mapping_noalloc() and update_mapping_prot() sanity-check their 'virt' parameter, but the check itself doesn't make much sense. The condition used today appears to be a historical accident. The sanity-c
osv
CVE-2023-54111UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-24
CVE-2023-54111 CVE-2023-54111: In the Linux kernel, the following vulnerability has been resolved: pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups of_find_node
In the Linux kernel, the following vulnerability has been resolved: pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups of_find_node_by_phandle() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount l
osv
CVE-2023-54129UNKNOWN≥ 4.20.0, < 6.1.32≥ 6.2.0, < 6.2.16+1 more2025-12-24
CVE-2023-54129 octeontx2-af: Add validation for lmac type
octeontx2-af: Add validation for lmac type
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Add validation for lmac type
Upon physical link change, firmware reports to the kernel about the
change along with the details like speed, lmac_type_id, etc.
Kernel derives lmac_type based on lmac_type_id received from firmware.
In a few scenarios, firmware returns an invalid lmac_type_id, which
is resulting in
osv
CVE-2023-54013UNKNOWN≥ 0, < 6.5.6-12025-12-24
CVE-2023-54013 CVE-2023-54013: In the Linux kernel, the following vulnerability has been resolved: interconnect: Fix locking for runpm vs reclaim For cases where icc_bw_set() can be
In the Linux kernel, the following vulnerability has been resolved: interconnect: Fix locking for runpm vs reclaim For cases where icc_bw_set() can be called in callbaths that could deadlock against shrinker/reclaim, such as runpm resume, we need to decouple the icc locking. Introduce a new icc_bw_lock for cases wher
osv
CVE-2022-50754UNKNOWN≥ 4.13.0, < 4.14.303≥ 4.15.0, < 4.19.270+5 more2025-12-24
CVE-2022-50754 apparmor: fix a memleak in multi_transaction_new()
apparmor: fix a memleak in multi_transaction_new()
In the Linux kernel, the following vulnerability has been resolved:
apparmor: fix a memleak in multi_transaction_new()
In multi_transaction_new(), the variable t is not freed or passed out
on the failure of copy_from_user(t->data, buf, size), which could lead
to a memleak.
Fix this bug by adding a put_multi_transaction(t) in the error path.
osv
CVE-2023-53999UNKNOWN≥ 0, < 6.4.11-12025-12-24
CVE-2023-53999 CVE-2023-53999: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, Fix internal port memory leak The flow rule can be splited, and the
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, Fix internal port memory leak The flow rule can be splited, and the extra post_act rules are added to post_act table. It's possible to trigger memleak when the rule forwards packets from internal port and over tunnel, in the case that,
osv
CVE-2022-50781UNKNOWN≥ 4.20.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-24
CVE-2022-50781 amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
In the Linux kernel, the following vulnerability has been resolved:
amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at
2 but not checked for negative values so it results in an out of bounds
read. This value comes from the user via sysfs.
osv
CVE-2023-54039UNKNOWN≥ 5.4.0, < 5.4.241≥ 5.5.0, < 5.10.178+3 more2025-12-24
CVE-2023-54039 can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access
can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access
In the j1939_tp_tx_dat_new() function, an out-of-bounds memory access
could occur during the memcpy() operation if the size of skb->cb is
larger than the size of struct j1939_sk_buff_cb. This is because the
memcpy
osv
CVE-2023-54006UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-24
CVE-2023-54006 CVE-2023-54006: In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data-race around unix_tot_inflight
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data-race around unix_tot_inflight. unix_tot_inflight is changed under spin_lock(unix_gc_lock), but unix_release_sock() reads it locklessly. Let's use READ_ONCE() for unix_tot_inflight. Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix: annote lockless
osv
CVE-2022-50749UNKNOWN≥ 2.6.12, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-24
CVE-2022-50749 acct: fix potential integer overflow in encode_comp_t()
acct: fix potential integer overflow in encode_comp_t()
In the Linux kernel, the following vulnerability has been resolved:
acct: fix potential integer overflow in encode_comp_t()
The integer overflow is descripted with following codes:
> 317 static comp_t encode_comp_t(u64 value)
> 318 {
> 319 int exp, rnd;
......
> 341 exp 342 exp += value;
> 343 return exp;
> 344 }
Currently comp_t is defined as type of '__u16', but th
osv
CVE-2023-53991UNKNOWN≥ 5.7.0, < 5.10.173≥ 5.11.0, < 5.15.99+2 more2025-12-24
CVE-2023-53991 drm/msm/dpu: Disallow unallocated resources to be returned
drm/msm/dpu: Disallow unallocated resources to be returned
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Disallow unallocated resources to be returned
In the event that the topology requests resources that have not been
created by the system (because they are typically not represented in
dpu_mdss_cfg ^1), the resource(s) in global_state (in this case DSC
blocks, until their allocation/
osv
CVE-2022-50762UNKNOWN≥ 0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50762 fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
syzbot reported UBSAN error as below:
[ 76.901829][ T6677] ================================================================================
[ 76.903908][ T6677] UBSAN: shift-out-of-bounds in fs/ntfs3/super.c:675:13
[ 76.905363][ T6677] shift expone
osv
CVE-2023-54145UNKNOWN≥ 0, < 6.1.112-1≥ 0, < 6.4.11-12025-12-24
CVE-2023-54145 CVE-2023-54145: In the Linux kernel, the following vulnerability has been resolved: bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log It's trivial for
In the Linux kernel, the following vulnerability has been resolved: bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log It's trivial for user to trigger "verifier log line truncated" warning, as verifier has a fixed-sized buffer of 1024 bytes (as of now), and there are at least two pieces of user-provid
osv
CVE-2023-54005UNKNOWN≥ 4.14.0, < 4.14.324≥ 4.15.0, < 4.19.292+5 more2025-12-24
CVE-2023-54005 binder: fix memory leak in binder_init()
binder: fix memory leak in binder_init()
In the Linux kernel, the following vulnerability has been resolved:
binder: fix memory leak in binder_init()
In binder_init(), the destruction of binder_alloc_shrinker_init() is not
performed in the wrong path, which will cause memory leaks. So this commit
introduces binder_alloc_shrinker_exit() and calls it in the wrong path to
fix that.
osv
CVE-2023-54085UNKNOWN≥ 6.2.0, < 6.2.122025-12-24
CVE-2023-54085 mptcp: fix NULL pointer dereference on fastopen early fallback
mptcp: fix NULL pointer dereference on fastopen early fallback
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix NULL pointer dereference on fastopen early fallback
In case of early fallback to TCP, subflow_syn_recv_sock() deletes
the subflow context before returning the newly allocated sock to
the caller.
The fastopen path does not cope with the above unconditionally
dereferencing the
osv
CVE-2023-54060UNKNOWN≥ 0, < 6.4.11-12025-12-24
CVE-2023-54060 CVE-2023-54060: In the Linux kernel, the following vulnerability has been resolved: iommufd: Set end correctly when doing batch carry Even though the test suite cover
In the Linux kernel, the following vulnerability has been resolved: iommufd: Set end correctly when doing batch carry Even though the test suite covers this it somehow became obscured that this wasn't working. The test iommufd_ioas.mock_domain.access_domain_destory would blow up rarely. end should be set to 1 because
osv
CVE-2023-54014UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54014 CVE-2023-54014: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() Klocwork reported w
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() Klocwork reported warning of rport maybe NULL and will be dereferenced. rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced. Check valid rport returned by fc_bsg_to
osv