Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 77 of 724
CVE-2022-50668UNKNOWN≥ 4.6.0, < 4.19.270≥ 4.20.0, < 5.4.229+4 more2025-12-09
CVE-2022-50668 ext4: fix deadlock due to mbcache entry corruption
ext4: fix deadlock due to mbcache entry corruption
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix deadlock due to mbcache entry corruption
When manipulating xattr blocks, we can deadlock infinitely looping
inside ext4_xattr_block_set() where we constantly keep finding xattr
block for reuse in mbcache but we are unable to reuse it because its
reference count is too big. This happens because cache e
osv
CVE-2023-53847UNKNOWN≥ 2.6.16, < 4.14.323≥ 4.15.0, < 4.19.292+5 more2025-12-09
CVE-2023-53847 usb-storage: alauda: Fix uninit-value in alauda_check_media()
usb-storage: alauda: Fix uninit-value in alauda_check_media()
In the Linux kernel, the following vulnerability has been resolved:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
Syzbot got KMSAN to complain about access to an uninitialized value in
the alauda subdriver of usb-storage:
BUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0
drivers/usb/storage/alauda.c:1137
CPU: 0 PID: 12279 Comm: usb
osv
CVE-2022-50660UNKNOWN≥ 2.6.33, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-09
CVE-2022-50660 wifi: ipw2200: fix memory leak in ipw_wdev_init()
wifi: ipw2200: fix memory leak in ipw_wdev_init()
In the Linux kernel, the following vulnerability has been resolved:
wifi: ipw2200: fix memory leak in ipw_wdev_init()
In the error path of ipw_wdev_init(), exception value is returned, and
the memory applied for in the function is not released. Also the memory
is not released in ipw_pci_probe(). As a result, memory leakage occurs.
So memory release needs to be added to the error
osv
CVE-2023-53854UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-09
CVE-2023-53854 CVE-2023-53854: In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8186: Fix use-after-free in driver remove path When devm runs fu
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8186: Fix use-after-free in driver remove path When devm runs function in the "remove" path for a device it runs them in the reverse order. That means that if you have parts of your driver that aren't using devm or are using "roll y
osv
CVE-2022-50670UNKNOWN≥ 2.6.29, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-09
CVE-2022-50670 mmc: omap_hsmmc: fix return value check of mmc_add_host()
mmc: omap_hsmmc: fix return value check of mmc_add_host()
In the Linux kernel, the following vulnerability has been resolved:
mmc: omap_hsmmc: fix return value check of mmc_add_host()
mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
delete device, but it's not ad
osv
CVE-2022-50663UNKNOWN≥ 5.13.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-09
CVE-2022-50663 net: stmmac: fix possible memory leak in stmmac_dvr_probe()
net: stmmac: fix possible memory leak in stmmac_dvr_probe()
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: fix possible memory leak in stmmac_dvr_probe()
The bitmap_free() should be called to free priv->af_xdp_zc_qps
when create_singlethread_workqueue() fails, otherwise there will
be a memory leak, so we add the err path error_wq_init to fix it.
osv
CVE-2023-53863UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-09
CVE-2023-53863 CVE-2023-53863: In the Linux kernel, the following vulnerability has been resolved: netlink: do not hard code device address lenth in fdb dumps syzbot reports that so
In the Linux kernel, the following vulnerability has been resolved: netlink: do not hard code device address lenth in fdb dumps syzbot reports that some netdev devices do not have a six bytes address [1] Replace ETH_ALEN by dev->addr_len. [1] (Case of a device where dev->addr_len = 4) BUG: KMSAN: kernel-infoleak in i
osv
CVE-2022-50657UNKNOWN≥ 0, < 6.0.7-12025-12-09
CVE-2022-50657 CVE-2022-50657: In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is d
In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is due to the missing memcpy during kasan_init. Could you please check whether this patch is helpful? When doing kasan_populate, the new allocated base_pud/base_p4d should
osv
CVE-2023-53860UNKNOWN≥ 5.19.0, < 6.1.55≥ 6.2.0, < 6.5.52025-12-09
CVE-2023-53860 dm: don't attempt to queue IO under RCU protection
dm: don't attempt to queue IO under RCU protection
In the Linux kernel, the following vulnerability has been resolved:
dm: don't attempt to queue IO under RCU protection
dm looks up the table for IO based on the request type, with an
assumption that if the request is marked REQ_NOWAIT, it's fine to
attempt to submit that IO while under RCU read lock protection. This
is not OK, as REQ_NOWAIT just means that we should not be slee
osv
CVE-2023-53846UNKNOWN≥ 3.8.0, < 6.4.102025-12-09
CVE-2023-53846 f2fs: fix to do sanity check on direct node in truncate_dnode()
f2fs: fix to do sanity check on direct node in truncate_dnode()
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to do sanity check on direct node in truncate_dnode()
syzbot reports below bug:
BUG: KASAN: slab-use-after-free in f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574
Read of size 4 at addr ffff88802a25c000 by task syz-executor148/5000
CPU: 1 PID: 5000 Comm: sy
osv
CVE-2023-53823UNKNOWN≥ 0, < 6.4.4-12025-12-09
CVE-2023-53823 CVE-2023-53823: In the Linux kernel, the following vulnerability has been resolved: block/rq_qos: protect rq_qos apis with a new lock commit 50e34d78815e ("block: dis
In the Linux kernel, the following vulnerability has been resolved: block/rq_qos: protect rq_qos apis with a new lock commit 50e34d78815e ("block: disable the elevator int del_gendisk") move rq_qos_exit() from disk_release() to del_gendisk(), this will introduce some problems: 1) If rq_qos_add() is triggered by enabl
osv
CVE-2022-50653UNKNOWN≥ 2.6.27, < 4.19.270≥ 4.20.0, < 5.4.229+4 more2025-12-09
CVE-2022-50653 mmc: atmel-mci: fix return value check of mmc_add_host()
mmc: atmel-mci: fix return value check of mmc_add_host()
In the Linux kernel, the following vulnerability has been resolved:
mmc: atmel-mci: fix return value check of mmc_add_host()
mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
delete device, but it's not added
osv
CVE-2022-50650UNKNOWN≥ 0, < 6.0.3-12025-12-09
CVE-2022-50650 CVE-2022-50650: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference state management for synchronous callbacks Currently, verifier
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference state management for synchronous callbacks Currently, verifier verifies callback functions (sync and async) as if they will be executed once, (i.e. it explores execution state as if the function was being called once). The next insn
osv
CVE-2023-53780UNKNOWN≥ 4.15.0, < 6.1.16≥ 6.2.0, < 6.2.32025-12-09
CVE-2023-53780 drm/amd/display: fix FCLK pstate change underflow
drm/amd/display: fix FCLK pstate change underflow
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix FCLK pstate change underflow
[Why]
Currently we set FCLK p-state change
watermark calculated based on dummy
p-state latency when UCLK p-state is
not supported
[How]
Calculate FCLK p-state change watermark
based on on FCLK pstate change latency
in case UCLK p-state is not supported
osv
CVE-2025-40337UNKNOWN≥ 3.2.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-09
CVE-2025-40337 net: stmmac: Correctly handle Rx checksum offload errors
net: stmmac: Correctly handle Rx checksum offload errors
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: Correctly handle Rx checksum offload errors
The stmmac_rx function would previously set skb->ip_summed to
CHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled
and the packet was of a known IP ethertype.
However, this logic failed to check if the hardware had actually
rep
osv
CVE-2023-53864UNKNOWN≥ 5.19.0, < 6.1.54≥ 6.2.0, < 6.5.42025-12-09
CVE-2023-53864 drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()
drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()
In the Linux kernel, the following vulnerability has been resolved:
drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()
When disabling overlay plane in mxsfb_plane_overlay_atomic_update(),
overlay plane's framebuffer pointer is NULL. So, dereferencing it would
cause a kernel Oops(NULL pointer dereferencing). Fix t
osv
CVE-2023-53843UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.13-12025-12-09
CVE-2023-53843 CVE-2023-53843: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: reject negative ifindex Recent changes in net-next (commit 759ab
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: reject negative ifindex Recent changes in net-next (commit 759ab1edb56c ("net: store netdevs in an xarray")) refactored the handling of pre-assigned ifindexes and let syzbot surface a latent problem in ovs. ovs does not validate ifi
osv
CVE-2025-40338UNKNOWN≥ 5.19.0, < 6.17.82025-12-09
CVE-2025-40338 ASoC: Intel: avs: Do not share the name pointer between components
ASoC: Intel: avs: Do not share the name pointer between components
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Do not share the name pointer between components
By sharing 'name' directly, tearing down components may lead to
use-after-free errors. Duplicate the name to avoid that.
At the same time, update the order of operations - since commit
cee28113db17 ("ASoC: dmaeng
osv
CVE-2023-53866UNKNOWN≥ 0, < 6.1.20-12025-12-09
CVE-2023-53866 CVE-2023-53866: In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-compress: Reposition and add pcm_mutex If panic_on_warn is set and compr
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-compress: Reposition and add pcm_mutex If panic_on_warn is set and compress stream(DPCM) is started, then kernel panic occurred because card->pcm_mutex isn't held appropriately. In the following functions, warning were issued at this line "
osv
CVE-2023-53850UNKNOWN≥ 4.15.0, < 6.1.42≥ 6.2.0, < 6.4.72025-12-09
CVE-2023-53850 iavf: use internal state to free traffic IRQs
iavf: use internal state to free traffic IRQs
In the Linux kernel, the following vulnerability has been resolved:
iavf: use internal state to free traffic IRQs
If the system tries to close the netdev while iavf_reset_task() is
running, __LINK_STATE_START will be cleared and netif_running() will
return false in iavf_reinit_interrupt_scheme(). This will result in
iavf_free_traffic_irqs() not being called and a leak as follows:
[7632.
osv