Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 122 of 738
CVE-2023-53626HIGHCVSS 7.8v5.4.237v5.10.175+4 more2025-10-07
CVE-2023-53626 [HIGH] CWE-415 CVE-2023-53626: In the Linux kernel, the following vulnerability has been resolved:
ext4: fix possible double unloc
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix possible double unlock when moving a directory
nvdosv
CVE-2023-53619HIGHCVSS 7.8≥ 3.6, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-10-07
CVE-2023-53619 [HIGH] CWE-416 CVE-2023-53619: In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: Avoid nf_
In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: Avoid nf_ct_helper_hash uses after free
If nf_conntrack_init_start() fails (for example due to a
register_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini()
clean-up path frees the nf_ct_helper_hash map.
When built with NF_CONNTRACK=y, further netfilt
nvdosv
CVE-2023-53629HIGHCVSS 7.8≥ 5.14, < 6.1.20≥ 6.2, < 6.2.32025-10-07
CVE-2023-53629 [HIGH] CWE-416 CVE-2023-53629: In the Linux kernel, the following vulnerability has been resolved:
fs: dlm: fix use after free in
In the Linux kernel, the following vulnerability has been resolved:
fs: dlm: fix use after free in midcomms commit
While working on processing dlm message in softirq context I experienced
the following KASAN use-after-free warning:
[ 151.760477] ==================================================================
[ 151.761803] BUG: KASAN: use-after-fr
nvdosv
CVE-2023-53640HIGHCVSS 7.8≥ 5.12, < 5.15.114≥ 5.16, < 6.1.31+2 more2025-10-07
CVE-2023-53640 [HIGH] CWE-416 CVE-2023-53640: In the Linux kernel, the following vulnerability has been resolved:
ASoC: lpass: Fix for KASAN use_
In the Linux kernel, the following vulnerability has been resolved:
ASoC: lpass: Fix for KASAN use_after_free out of bounds
When we run syzkaller we get below Out of Bounds error.
"KASAN: slab-out-of-bounds Read in regcache_flat_read"
Below is the backtrace of the issue:
BUG: KASAN: slab-out-of-bounds in regcache_flat_read+0x10c/0x110
Read of siz
nvdosv
CVE-2022-50552HIGHCVSS 7.8≥ 4.19, < 5.19.17≥ 6.0, < 6.0.32025-10-07
CVE-2022-50552 [HIGH] CWE-416 CVE-2022-50552: In the Linux kernel, the following vulnerability has been resolved:
blk-mq: use quiesced elevator s
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: use quiesced elevator switch when reinitializing queues
The hctx's run_work may be racing with the elevator switch when
reinitializing hardware queues. The queue is merely frozen in this
context, but that only prevents requests from allocating and doesn't
stop the hctx work
nvdosv
CVE-2023-53618MEDIUMCVSS 5.5≥ 5.2.19, < 5.3≥ 5.3.4, < 5.15.127+3 more2025-10-07
CVE-2023-53618 [MEDIUM] CVE-2023-53618: In the Linux kernel, the following vulnerability has been resolved:
btrfs: reject invalid reloc tre
In the Linux kernel, the following vulnerability has been resolved:
btrfs: reject invalid reloc tree root keys with stack dump
[BUG]
Syzbot reported a crash that an ASSERT() got triggered inside
prepare_to_merge().
That ASSERT() makes sure the reloc tree is properly pointed back by its
subvolume tree.
[CAUSE]
After more debugging output, it turns out we
nvdosv
CVE-2023-53684MEDIUMCVSS 5.5≥ 5.11, < 5.15.106≥ 5.16, < 6.1.23+2 more2025-10-07
CVE-2023-53684 [MEDIUM] CVE-2023-53684: In the Linux kernel, the following vulnerability has been resolved:
xfrm: Zero padding when dumping
In the Linux kernel, the following vulnerability has been resolved:
xfrm: Zero padding when dumping algos and encap
When copying data to user-space we should ensure that only valid
data is copied over. Padding in structures may be filled with
random (possibly sensitve) data and should never be given directly
to user-space.
This patch fixes the copying of
nvdosv
CVE-2023-53655MEDIUMCVSS 5.5≥ 5.8, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-07
CVE-2023-53655 [MEDIUM] CWE-674 CVE-2023-53655: In the Linux kernel, the following vulnerability has been resolved:
rcu: Avoid stack overflow due t
In the Linux kernel, the following vulnerability has been resolved:
rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed
Registering a kprobe on __rcu_irq_enter_check_tick() can cause kernel
stack overflow as shown below. This issue can be reproduced by enabling
CONFIG_NO_HZ_FULL and booting the kernel with argument "nohz_
nvdosv
CVE-2023-53658MEDIUMCVSS 5.5≥ 4.9, < 4.14.322≥ 4.15, < 4.19.291+5 more2025-10-07
CVE-2023-53658 [MEDIUM] CWE-476 CVE-2023-53658: In the Linux kernel, the following vulnerability has been resolved:
spi: bcm-qspi: return error if
In the Linux kernel, the following vulnerability has been resolved:
spi: bcm-qspi: return error if neither hif_mspi nor mspi is available
If neither a "hif_mspi" nor "mspi" resource is present, the driver will
just early exit in probe but still return success. Apart from not doing
anything meaningful, this would then also lead to a null pointer acc
nvdosv
CVE-2023-53678MEDIUMCVSS 5.5≥ 6.1, < 6.1.18≥ 6.2, < 6.2.52025-10-07
CVE-2023-53678 [MEDIUM] CWE-476 CVE-2023-53678: In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Fix system suspend wi
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Fix system suspend without fbdev being initialized
If fbdev is not initialized for some reason - in practice on platforms
without display - suspending fbdev should be skipped during system
suspend, fix this up. While at it add an assert that suspending fbdev
only happens
nvdosv
CVE-2023-53674MEDIUMCVSS 5.5≥ 5.11, < 5.15.121≥ 5.16, < 6.1.39+2 more2025-10-07
CVE-2023-53674 [MEDIUM] CWE-401 CVE-2023-53674: In the Linux kernel, the following vulnerability has been resolved:
clk: Fix memory leak in devm_cl
In the Linux kernel, the following vulnerability has been resolved:
clk: Fix memory leak in devm_clk_notifier_register()
devm_clk_notifier_register() allocates a devres resource for clk
notifier but didn't register that to the device, so the notifier didn't
get unregistered on device detach and the allocated resource was leaked.
Fix the issue by
nvdosv
CVE-2022-50510MEDIUMCVSS 5.5≥ 5.2, < 5.4.229≥ 5.5, < 5.10.163+3 more2025-10-07
CVE-2022-50510 [MEDIUM] CWE-401 CVE-2022-50510: In the Linux kernel, the following vulnerability has been resolved:
perf/smmuv3: Fix hotplug callba
In the Linux kernel, the following vulnerability has been resolved:
perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()
arm_smmu_pmu_init() won't remove the callback added by
cpuhp_setup_state_multi() when platform_driver_register() failed. Remove
the callback by cpuhp_remove_multi_state() in fail path.
Similar to the handling of arm_cc
nvdosv
CVE-2022-50538MEDIUMCVSS 5.5≥ 4.9, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-07
CVE-2022-50538 [MEDIUM] CWE-476 CVE-2022-50538: In the Linux kernel, the following vulnerability has been resolved:
vme: Fix error not catched in f
In the Linux kernel, the following vulnerability has been resolved:
vme: Fix error not catched in fake_init()
In fake_init(), __root_device_register() is possible to fail but it's
ignored, which can cause unregistering vme_root fail when exit.
general protection fault,
probably for non-canonical address 0xdffffc000000008c
KASAN: null-ptr-deref in
nvdosv
CVE-2022-50523MEDIUMCVSS 5.5≥ 3.17, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-07
CVE-2022-50523 [MEDIUM] CWE-401 CVE-2022-50523: In the Linux kernel, the following vulnerability has been resolved:
clk: rockchip: Fix memory leak
In the Linux kernel, the following vulnerability has been resolved:
clk: rockchip: Fix memory leak in rockchip_clk_register_pll()
If clk_register() fails, @pll->rate_table may have allocated memory by
kmemdup(), so it needs to be freed, otherwise will cause memory leak
issue, this patch fixes it.
nvdosv
CVE-2023-53672MEDIUMCVSS 5.5≥ 3.9.1, < 4.14.326≥ 4.15, < 4.19.295+6 more2025-10-07
CVE-2023-53672 [MEDIUM] CVE-2023-53672: In the Linux kernel, the following vulnerability has been resolved:
btrfs: output extra debug info
In the Linux kernel, the following vulnerability has been resolved:
btrfs: output extra debug info if we failed to find an inline backref
[BUG]
Syzbot reported several warning triggered inside
lookup_inline_extent_backref().
[CAUSE]
As usual, the reproducer doesn't reliably trigger locally here, but at
least we know the WARN_ON() is triggered when an inli
nvdosv
CVE-2023-53625MEDIUMCVSS 5.5≥ 4.16, < 5.10.163≥ 5.11, < 5.15.87+3 more2025-10-07
CVE-2023-53625 [MEDIUM] CWE-476 CVE-2023-53625: In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gvt: fix vgpu debugfs
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gvt: fix vgpu debugfs clean in remove
Check carefully on root debugfs available when destroying vgpu,
e.g in remove case drm minor's debugfs root might already be destroyed,
which led to kernel oops like below.
Console: switching to colour dummy device 80x25
i915 0000:00:
nvdosv
CVE-2022-50511MEDIUMCVSS 5.5≥ 2.6.23.1, < 5.4.229≥ 5.5, < 5.10.163+4 more2025-10-07
CVE-2022-50511 [MEDIUM] CVE-2022-50511: In the Linux kernel, the following vulnerability has been resolved:
lib/fonts: fix undefined behavi
In the Linux kernel, the following vulnerability has been resolved:
lib/fonts: fix undefined behavior in bit shift for get_default_font
Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned. The UBSAN warning calltrace like below:
UBSAN: shift-out-of-bounds in lib/fonts/fonts.c:139:20
left shift of 1 by 31 places c
nvdosv
CVE-2023-53687MEDIUMCVSS 5.5≥ 3.3, < 4.14.322≥ 4.15, < 4.19.291+5 more2025-10-07
CVE-2023-53687 [MEDIUM] CWE-401 CVE-2023-53687: In the Linux kernel, the following vulnerability has been resolved:
tty: serial: samsung_tty: Fix a
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk
When the best clk is searched, we iterate over all possible clk.
If we find a better match, the previous one, if any, needs to be freed.
If a better match has already been found, we still ne
nvdosv
CVE-2022-50539MEDIUMCVSS 5.5≥ 3.18, < 6.1.16≥ 6.2, < 6.2.32025-10-07
CVE-2022-50539 [MEDIUM] CVE-2022-50539: In the Linux kernel, the following vulnerability has been resolved:
ARM: OMAP2+: omap4-common: Fix
In the Linux kernel, the following vulnerability has been resolved:
ARM: OMAP2+: omap4-common: Fix refcount leak bug
In omap4_sram_init(), of_find_compatible_node() will return a node
pointer with refcount incremented. We should use of_node_put() when
it is not used anymore.
nvdosv
CVE-2022-50525MEDIUMCVSS 5.5≥ 3.12, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-07
CVE-2022-50525 [MEDIUM] CWE-401 CVE-2022-50525: In the Linux kernel, the following vulnerability has been resolved:
iommu/fsl_pamu: Fix resource le
In the Linux kernel, the following vulnerability has been resolved:
iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe()
The fsl_pamu_probe() returns directly when create_csd() failed, leaving
irq and memories unreleased.
Fix by jumping to error if create_csd() returns error.
nvdosv