Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 138 of 738
CVE-2022-50420MEDIUMCVSS 5.5≥ 5.5, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-10-01
CVE-2022-50420 [MEDIUM] CWE-401 CVE-2022-50420: In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/hpre - fix re In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/hpre - fix resource leak in remove process In hpre_remove(), when the disable operation of qm sriov failed, the following logic should continue to be executed to release the remaining resources that have been allocated, instead of returning directly, otherwise th
nvdosv
CVE-2023-53480MEDIUMCVSS 5.5≥ 4.19, < 4.19.295≥ 4.20, < 5.4.257+4 more2025-10-01
CVE-2023-53480 [MEDIUM] CWE-476 CVE-2023-53480: In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for k In the Linux kernel, the following vulnerability has been resolved: kobject: Add sanity check for kset->kobj.ktype in kset_register() When I register a kset in the following way: static struct kset my_kset; kobject_set_name(&my_kset.kobj, "my_kset"); ret = kset_register(&my_kset); A null pointer dereference exception is occurred: [ 4453.568337] U
nvdosv
CVE-2023-53457MEDIUMCVSS 5.5≥ 2.6.12.1, < 4.14.324≥ 4.15, < 4.19.293+6 more2025-10-01
CVE-2023-53457 [MEDIUM] CWE-476 CVE-2023-53457: In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Fix null-ptr-deref Rea In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Fix null-ptr-deref Read in txBegin Syzkaller reported an issue where txBegin may be called on a superblock in a read-only mounted filesystem which leads to NULL pointer deref. This could be solved by checking if the filesystem is read-only before calling txBegin, and retu
nvdosv
CVE-2022-50452MEDIUMCVSS 5.5≥ 4.19, < 4.19.264≥ 4.20, < 5.4.221+4 more2025-10-01
CVE-2022-50452 [MEDIUM] CWE-476 CVE-2022-50452: In the Linux kernel, the following vulnerability has been resolved: net: sched: cake: fix null poin In the Linux kernel, the following vulnerability has been resolved: net: sched: cake: fix null pointer access issue when cake_init() fails When the default qdisc is cake, if the qdisc of dev_queue fails to be inited during mqprio_init(), cake_reset() is invoked to clear resources. In this case, the tins is NULL, and it will cause gpf issue. The p
nvdosv
CVE-2023-53450MEDIUMCVSS 5.5≥ 2.6.25, < 4.14.315≥ 4.15, < 4.19.283+7 more2025-10-01
CVE-2023-53450 [MEDIUM] CWE-617 CVE-2023-53450: In the Linux kernel, the following vulnerability has been resolved: ext4: remove a BUG_ON in ext4_m In the Linux kernel, the following vulnerability has been resolved: ext4: remove a BUG_ON in ext4_mb_release_group_pa() If a malicious fuzzer overwrites the ext4 superblock while it is mounted such that the s_first_data_block is set to a very large number, the calculation of the block group can underflow, and trigger a BUG_ON check. Change this to
nvdosv
CVE-2023-53517MEDIUMCVSS 5.5≥ 4.1, < 5.10.181≥ 5.11, < 5.15.113+3 more2025-10-01
CVE-2023-53517 [MEDIUM] CVE-2023-53517: In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_ In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's testing, without checking for the minimum mtu, l->mtu will be set to 4 in tipc_link_proto_rcv(), then n->lin
nvdosv
CVE-2023-53520MEDIUMCVSS 4.7≥ 5.7, < 6.1.55≥ 6.2, < 6.5.52025-10-01
CVE-2023-53520 [MEDIUM] CWE-362 CVE-2023-53520: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix hci_suspend_sync In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix hci_suspend_sync crash If hci_unregister_dev() frees the hci_dev object but hci_suspend_notifier may still be accessing it, it can cause the program to crash. Here's the call trace: [102152.653246] Call Trace: [102152.653254] hci_suspend_sync+0x109/0x301 [bluetooth]
nvdosv
CVE-2023-53518MEDIUMCVSS 5.5≥ 4.7, < 4.14.326≥ 4.15, < 4.19.295+6 more2025-10-01
CVE-2023-53518 [MEDIUM] CWE-401 CVE-2023-53518: In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Fix leak in devfr In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Fix leak in devfreq_dev_release() srcu_init_notifier_head() allocates resources that need to be released with a srcu_cleanup_notifier_head() call. Reported by kmemleak.
nvdosv
CVE-2023-53462MEDIUMCVSS 5.5≥ 5.9, < 5.10.195≥ 5.11, < 5.15.132+3 more2025-10-01
CVE-2023-53462 [MEDIUM] CWE-908 CVE-2023-53462: In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in fill_frame_info() Syzbot reports the following uninit-value access problem. BUG: KMSAN: uninit-value in fill_frame_info net/hsr/hsr_forward.c:601 [inline] BUG: KMSAN: uninit-value in hsr_forward_skb+0x9bd/0x30f0 net/hsr/hsr_forward.c:616 fill_frame
nvdosv
CVE-2023-53468MEDIUMCVSS 5.5≥ 2.6.27, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-01
CVE-2023-53468 [MEDIUM] CWE-401 CVE-2023-53468: In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in alloc In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in alloc_wbufs() kmemleak reported a sequence of memory leaks, and show them as following: unreferenced object 0xffff8881575f8400 (size 1024): comm "mount", pid 19625, jiffies 4297119604 (age 20.383s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00
nvdosv
CVE-2023-53488MEDIUMCVSS 5.5≥ 4.3, < 4.14.323≥ 4.15, < 4.19.292+6 more2025-10-01
CVE-2023-53488 [MEDIUM] CVE-2023-53488: In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix possible panic dur In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix possible panic during hotplug remove During hotplug remove it is possible that the update counters work might be pending, and may run after memory has been freed. Cancel the update counters work before freeing memory.
nvdosv
CVE-2022-50429MEDIUMCVSS 5.5≥ 5.5, < 5.10.150≥ 5.11, < 5.15.75+2 more2025-10-01
CVE-2022-50429 [MEDIUM] CVE-2022-50429: In the Linux kernel, the following vulnerability has been resolved: memory: of: Fix refcount leak b In the Linux kernel, the following vulnerability has been resolved: memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() We should add the of_node_put() when breaking out of for_each_child_of_node() as it will automatically increase and decrease the refcount.
nvdosv
CVE-2022-50459MEDIUMCVSS 5.5≥ 5.8.14, < 5.9≥ 5.9.1, < 5.10.150+4 more2025-10-01
CVE-2022-50459 [MEDIUM] CWE-476 CVE-2022-50459: In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: iscsi_tcp: Fix nul In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() Fix a NULL pointer crash that occurs when we are freeing the socket at the same time we access it via sysfs. The problem is that: 1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take the fr
nvdosv
CVE-2022-50435MEDIUMCVSS 5.5≥ 5.5, < 5.10.150≥ 5.11, < 5.15.75+2 more2025-10-01
CVE-2022-50435 [MEDIUM] CVE-2022-50435: In the Linux kernel, the following vulnerability has been resolved: ext4: avoid crash when inline d In the Linux kernel, the following vulnerability has been resolved: ext4: avoid crash when inline data creation follows DIO write When inode is created and written to using direct IO, there is nothing to clear the EXT4_STATE_MAY_INLINE_DATA flag. Thus when inode gets truncated later to say 1 byte and written using normal write, we will try to store the da
nvdosv
CVE-2023-53526MEDIUMCVSS 5.5≥ 5.15.129, < 5.15.132≥ 6.1.50, < 6.1.54+3 more2025-10-01
CVE-2023-53526 [MEDIUM] CVE-2023-53526: In the Linux kernel, the following vulnerability has been resolved: jbd2: check 'jh->b_transaction' In the Linux kernel, the following vulnerability has been resolved: jbd2: check 'jh->b_transaction' before removing it from checkpoint Following process will corrupt ext4 image: Step 1: jbd2_journal_commit_transaction __jbd2_journal_insert_checkpoint(jh, commit_transaction) // Put jh into trans1->t_checkpoint_list journal->j_checkpoint_transactions = comm
nvdosv
CVE-2023-53497MEDIUMCVSS 5.5≥ 6.2, < 6.2.15≥ 6.3, < 6.3.22025-10-01
CVE-2023-53497 [MEDIUM] CWE-476 CVE-2023-53497: In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_str In the Linux kernel, the following vulnerability has been resolved: media: vsp1: Replace vb2_is_streaming() with vb2_start_streaming_called() The vsp1 driver uses the vb2_is_streaming() function in its .buf_queue() handler to check if the .start_streaming() operation has been called, and decide whether to just add the buffer to an internal queue,
nvdosv
CVE-2025-39918MEDIUMCVSS 5.5≥ 6.12, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39918 [MEDIUM] CVE-2025-39918: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list cor In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list corruption Never leave scheduled wcid entries on the temporary on-stack list
nvdosv
CVE-2023-53531MEDIUMCVSS 5.5≥ 5.16, < 6.1.54≥ 6.2, < 6.5.42025-10-01
CVE-2023-53531 [MEDIUM] CWE-476 CVE-2023-53531: In the Linux kernel, the following vulnerability has been resolved: null_blk: fix poll request time In the Linux kernel, the following vulnerability has been resolved: null_blk: fix poll request timeout handling When doing io_uring benchmark on /dev/nullb0, it's easy to crash the kernel if poll requests timeout triggered, as reported by David. [1] BUG: kernel NULL pointer dereference, address: 0000000000000008 Workqueue: kblockd blk_mq_timeout_
nvdosv
CVE-2025-39899MEDIUMCVSS 5.5≥ 6.8, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39899 [MEDIUM] CVE-2025-39899: In the Linux kernel, the following vulnerability has been resolved: mm/userfaultfd: fix kmap_local In the Linux kernel, the following vulnerability has been resolved: mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE With CONFIG_HIGHPTE on 32-bit ARM, move_pages_pte() maps PTE pages using kmap_local_page(), which requires unmapping in Last-In-First-Out order. The current code maps dst_pte first, then src_pte, but unmaps them in the same o
nvdosv
CVE-2023-53499MEDIUMCVSS 5.5≥ 4.16, < 5.15.113≥ 5.16, < 6.1.30+2 more2025-10-01
CVE-2023-53499 [MEDIUM] CVE-2023-53499: In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix error unwinding In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix error unwinding of XDP initialization When initializing XDP in virtnet_open(), some rq xdp initialization may hit an error causing net device open failed. However, previous rqs have already initialized XDP and enabled NAPI, which is not the expected behavior. Need to roll
nvdosv