Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 125 of 738
CVE-2023-53663MEDIUMCVSS 5.5≥ 5.16, < 6.1.54≥ 6.2, < 6.5.42025-10-07
CVE-2023-53663 [MEDIUM] CVE-2023-53663: In the Linux kernel, the following vulnerability has been resolved:
KVM: nSVM: Check instead of ass
In the Linux kernel, the following vulnerability has been resolved:
KVM: nSVM: Check instead of asserting on nested TSC scaling support
Check for nested TSC scaling support on nested SVM VMRUN instead of
asserting that TSC scaling is exposed to L1 if L1's MSR_AMD64_TSC_RATIO
has diverged from KVM's default. Userspace can trigger the WARN at will
by writin
nvdosv
CVE-2023-53671MEDIUMCVSS 5.5≥ 5.19, < 6.1.16≥ 6.2, < 6.2.32025-10-07
CVE-2023-53671 [MEDIUM] CVE-2023-53671: In the Linux kernel, the following vulnerability has been resolved:
srcu: Delegate work to the boot
In the Linux kernel, the following vulnerability has been resolved:
srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL
Commit 994f706872e6 ("srcu: Make Tree SRCU able to operate without
snp_node array") assumes that cpu 0 is always online. However, there
really are situations when some other CPU is the boot CPU, for example,
when booting a kdump
nvdosv
CVE-2022-50520MEDIUMCVSS 5.5≥ 3.2.29, < 3.3≥ 3.2.60, < 3.3+11 more2025-10-07
CVE-2022-50520 [MEDIUM] CVE-2022-50520: In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: Fix PCI device refc
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()
As comment of pci_get_class() says, it returns a pci_device with its
refcount increased and decreased the refcount for the input parameter
@from if it is not NULL.
If we break the loop in radeon_atrm_get_bios() with 'pdev
nvdosv
CVE-2022-50549MEDIUMCVSS 5.5≥ 3.6, < 5.4.229≥ 5.5, < 5.10.163+3 more2025-10-07
CVE-2022-50549 [MEDIUM] CWE-667 CVE-2022-50549: In the Linux kernel, the following vulnerability has been resolved:
dm thin: Fix ABBA deadlock betw
In the Linux kernel, the following vulnerability has been resolved:
dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata
Following concurrent processes:
P1(drop cache) P2(kworker)
drop_caches_sysctl_handler
drop_slab
shrink_slab
down_read(&shrinker_rwsem) - LOCK A
do_shrink_slab
super_cache_scan
prune_icache_sb
dispose_list
e
nvdosv
CVE-2022-50534MEDIUMCVSS 5.5≥ 3.2, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-07
CVE-2022-50534 [MEDIUM] CVE-2022-50534: In the Linux kernel, the following vulnerability has been resolved:
dm thin: Use last transaction's
In the Linux kernel, the following vulnerability has been resolved:
dm thin: Use last transaction's pmd->root when commit failed
Recently we found a softlock up problem in dm thin pool btree lookup
code due to corrupted metadata:
Kernel panic - not syncing: softlockup: hung tasks
CPU: 7 PID: 2669225 Comm: kworker/u16:3
Hardware name: QEMU Standard PC (i4
nvdosv
CVE-2022-50513MEDIUMCVSS 5.5≥ 4.12, < 5.4.220≥ 5.5, < 5.10.150+3 more2025-10-07
CVE-2022-50513 [MEDIUM] CWE-401 CVE-2022-50513: In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix a poten
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()
In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated
in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly
released. Besides, considering there are only two error paths and the
fi
nvdosv
CVE-2022-50528MEDIUMCVSS 5.5≥ 5.14, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-10-07
CVE-2022-50528 [MEDIUM] CWE-401 CVE-2022-50528: In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix memory leakage
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix memory leakage
This patch fixes potential memory leakage and seg fault
in _gpuvm_import_dmabuf() function
nvdosv
CVE-2023-53660MEDIUMCVSS 5.5≥ 5.15, < 5.15.126≥ 5.16, < 6.1.45+2 more2025-10-07
CVE-2023-53660 [MEDIUM] CVE-2023-53660: In the Linux kernel, the following vulnerability has been resolved:
bpf, cpumap: Handle skb as well
In the Linux kernel, the following vulnerability has been resolved:
bpf, cpumap: Handle skb as well when clean up ptr_ring
The following warning was reported when running xdp_redirect_cpu with
both skb-mode and stress-mode enabled:
------------[ cut here ]------------
Incorrect XDP memory type (-2128176192) usage
WARNING: CPU: 7 PID: 1442 at net/core/xdp
nvdosv
CVE-2023-53617MEDIUMCVSS 5.5≥ 5.11, < 5.15.128≥ 5.16, < 6.1.47+2 more2025-10-07
CVE-2023-53617 [MEDIUM] CWE-401 CVE-2023-53617: In the Linux kernel, the following vulnerability has been resolved:
soc: aspeed: socinfo: Add kfree
In the Linux kernel, the following vulnerability has been resolved:
soc: aspeed: socinfo: Add kfree for kstrdup
Add kfree() in the later error handling in order to avoid memory leak.
nvdosv
CVE-2023-53665MEDIUMCVSS 5.5≥ 6.5, < 6.5.5v6.62025-10-07
CVE-2023-53665 [MEDIUM] CVE-2023-53665: In the Linux kernel, the following vulnerability has been resolved:
md: don't dereference mddev aft
In the Linux kernel, the following vulnerability has been resolved:
md: don't dereference mddev after export_rdev()
Except for initial reference, mddev->kobject is referenced by
rdev->kobject, and if the last rdev is freed, there is no guarantee that
mddev is still valid. Hence mddev should not be used anymore after
export_rdev().
This problem can be tri
nvdosv
CVE-2023-53669MEDIUMCVSS 5.5≥ 5.19, < 6.1.29≥ 6.2, < 6.2.16+1 more2025-10-07
CVE-2023-53669 [MEDIUM] CWE-401 CVE-2023-53669: In the Linux kernel, the following vulnerability has been resolved:
tcp: fix skb_copy_ubufs() vs BI
In the Linux kernel, the following vulnerability has been resolved:
tcp: fix skb_copy_ubufs() vs BIG TCP
David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy
using hugepages, and skb length bigger than ~68 KB.
skb_copy_ubufs() assumed it could copy all payload using up to
MAX_SKB_FRAGS order-0 pages.
This assumption broke w
nvdosv
CVE-2022-50554MEDIUMCVSS 5.5≥ 4.18, < 6.0.16≥ 6.1, < 6.1.22025-10-07
CVE-2022-50554 [MEDIUM] CVE-2022-50554: In the Linux kernel, the following vulnerability has been resolved:
blk-mq: avoid double ->queue_rq
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: avoid double ->queue_rq() because of early timeout
David Jeffery found one double ->queue_rq() issue, so far it can
be triggered in VM use case because of long vmexit latency or preempt
latency of vCPU pthread or long page fault in vCPU pthread, then block
IO req could be timed ou
nvdosv
CVE-2023-53653MEDIUMCVSS 5.5≥ 5.18, < 6.1.53≥ 6.2, < 6.4.16+1 more2025-10-07
CVE-2023-53653 [MEDIUM] CWE-476 CVE-2023-53653: In the Linux kernel, the following vulnerability has been resolved:
media: amphion: fix REVERSE_INU
In the Linux kernel, the following vulnerability has been resolved:
media: amphion: fix REVERSE_INULL issues reported by coverity
null-checking of a pointor is suggested before dereferencing it
nvdosv
CVE-2023-53647MEDIUMCVSS 5.5≥ 4.3, < 6.1.53≥ 6.2, < 6.4.16+1 more2025-10-07
CVE-2023-53647 [MEDIUM] CWE-476 CVE-2023-53647: In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Don't deref
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Don't dereference ACPI root object handle
Since the commit referenced in the Fixes: tag below the VMBus client driver
is walking the ACPI namespace up from the VMBus ACPI device to the ACPI
namespace root object trying to find Hyper-V MMIO ranges.
However, if
nvdosv
CVE-2023-53620MEDIUMCVSS 5.5≥ 2.6.12.1, < 6.1.30≥ 6.2, < 6.3.4+1 more2025-10-07
CVE-2023-53620 [MEDIUM] CWE-667 CVE-2023-53620: In the Linux kernel, the following vulnerability has been resolved:
md: fix soft lockup in status_r
In the Linux kernel, the following vulnerability has been resolved:
md: fix soft lockup in status_resync
status_resync() will calculate 'curr_resync - recovery_active' to show
user a progress bar like following:
[============>........] resync = 61.4%
'curr_resync' and 'recovery_active' is updated in md_do_sync(), and
status_resync() can read the
nvdosv
CVE-2023-53624MEDIUMCVSS 5.5≥ 3.12, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-07
CVE-2023-53624 [MEDIUM] CWE-190 CVE-2023-53624: In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_fq: fix integer
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_fq: fix integer overflow of "credit"
if sch_fq is configured with "initial quantum" having values greater than
INT_MAX, the first assignment of "credit" does signed integer overflow to
a very negative value.
In this situation, the syzkaller script provided by Cristop
nvdosv
CVE-2022-50537MEDIUMCVSS 5.5≥ 5.10.65, < 5.10.163≥ 5.13, < 5.15.86+2 more2025-10-07
CVE-2022-50537 [MEDIUM] CWE-401 CVE-2022-50537: In the Linux kernel, the following vulnerability has been resolved:
firmware: raspberrypi: fix poss
In the Linux kernel, the following vulnerability has been resolved:
firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe()
In rpi_firmware_probe(), if mbox_request_channel() fails, the 'fw' will
not be freed through rpi_firmware_delete(), fix this leak by calling
kfree() in the error path.
nvdosv
CVE-2022-50544MEDIUMCVSS 5.5≥ 2.6.35, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-07
CVE-2022-50544 [MEDIUM] CWE-401 CVE-2022-50544: In the Linux kernel, the following vulnerability has been resolved:
usb: host: xhci: Fix potential
In the Linux kernel, the following vulnerability has been resolved:
usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()
xhci_alloc_stream_info() allocates stream context array for stream_info
->stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs,
stream_info->stream_ctx_array is not released, which will lead to
nvdosv
CVE-2023-53632MEDIUMCVSS 5.5≥ 6.3.1, < 6.4.11v6.3+1 more2025-10-07
CVE-2023-53632 [MEDIUM] CVE-2023-53632: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Take RTNL lock when
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()
Hold RTNL lock when calling xdp_set_features() with a registered netdev,
as the call triggers the netdev notifiers. This could happen when
switching from uplink rep to nic profile for example.
This resolves the follow
nvdosv
CVE-2023-53657MEDIUMCVSS 5.5≥ 5.16, < 6.1.55≥ 6.2, < 6.5.52025-10-07
CVE-2023-53657 [MEDIUM] CWE-476 CVE-2023-53657: In the Linux kernel, the following vulnerability has been resolved:
ice: Don't tx before switchdev
In the Linux kernel, the following vulnerability has been resolved:
ice: Don't tx before switchdev is fully configured
There is possibility that ice_eswitch_port_start_xmit might be
called while some resources are still not allocated which might
cause NULL pointer dereference. Fix this by checking if switchdev
configuration was finished.
nvdosv