Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 140 of 738
CVE-2022-50466MEDIUMCVSS 5.5≥ 5.7, < 5.10.153≥ 5.11, < 5.15.77+2 more2025-10-01
CVE-2022-50466 [MEDIUM] CWE-401 CVE-2022-50466: In the Linux kernel, the following vulnerability has been resolved: fs/binfmt_elf: Fix memory leak In the Linux kernel, the following vulnerability has been resolved: fs/binfmt_elf: Fix memory leak in load_elf_binary() There is a memory leak reported by kmemleak: unreferenced object 0xffff88817104ef80 (size 224): comm "xfs_admin", pid 47165, jiffies 4298708825 (age 1333.476s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nvdosv
CVE-2023-53503MEDIUMCVSS 5.5≥ 3.11, < 5.10.181≥ 5.11, < 5.15.113+3 more2025-10-01
CVE-2023-53503 [MEDIUM] CWE-476 CVE-2023-53503: In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info() to fail Previously, ext4_get_group_info() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a malicious attaker (or fuzzer) modifies the superblock via the block device while it is the file system is
nvdosv
CVE-2023-53449MEDIUMCVSS 5.5≥ 5.3, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-01
CVE-2023-53449 [MEDIUM] CWE-401 CVE-2023-53449: In the Linux kernel, the following vulnerability has been resolved: s390/dasd: Fix potential memlea In the Linux kernel, the following vulnerability has been resolved: s390/dasd: Fix potential memleak in dasd_eckd_init() `dasd_reserve_req` is allocated before `dasd_vol_info_req`, and it also needs to be freed before the error returns, just like the other cases in this function.
nvdosv
CVE-2022-50462MEDIUMCVSS 5.5≥ 2.6.30, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-01
CVE-2022-50462 [MEDIUM] CWE-401 CVE-2022-50462: In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memo In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memory leak while module exiting Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, it need be freed when module exiting, call put_device() to give up reference, so that
nvdosv
CVE-2023-53527MEDIUMCVSS 5.5≥ 6.3, < 6.4.11v6.52025-10-01
CVE-2023-53527 [MEDIUM] CWE-401 CVE-2023-53527: In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Fix memory leak in In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Fix memory leak in tb_handle_dp_bandwidth_request() The memory allocated in tb_queue_dp_bandwidth_request() needs to be released once the request is handled to avoid leaking it.
nvdosv
CVE-2023-53475MEDIUMCVSS 5.5≥ 5.7, < 5.10.178≥ 5.11, < 5.15.107+3 more2025-10-01
CVE-2023-53475 [MEDIUM] CVE-2023-53475: In the Linux kernel, the following vulnerability has been resolved: usb: xhci: tegra: fix sleep in In the Linux kernel, the following vulnerability has been resolved: usb: xhci: tegra: fix sleep in atomic call When we set the dual-role port to Host mode, we observed the following splat: [ 167.057718] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:229 [ 167.057872] Workqueue: events tegra_xusb_usb_phy_work [ 167.057954] Ca
nvdosv
CVE-2022-50440MEDIUMCVSS 5.5≥ 3.2, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-01
CVE-2022-50440 [MEDIUM] CWE-476 CVE-2022-50440: In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate the box si In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate the box size for the snooped cursor Invalid userspace dma surface copies could potentially overflow the memcpy from the surface to the snooped image leading to crashes. To fix it the dimensions of the copybox have to be validated against the expected size of t
nvdosv
CVE-2023-53452MEDIUMCVSS 4.7≥ 5.16, < 6.1.28≥ 6.2, < 6.2.15+1 more2025-10-01
CVE-2023-53452 [MEDIUM] CWE-362 CVE-2023-53452: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential race In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential race condition between napi_init and napi_enable A race condition can happen if netdev is registered, but NAPI isn't initialized yet, and meanwhile user space starts the netdev that will enable NAPI. Then, it hits BUG_ON(): kernel BUG at net/core/dev.c:
nvdosv
CVE-2025-39910MEDIUMCVSS 5.5≥ 5.17, < 6.16.8v6.172025-10-01
CVE-2025-39910 [MEDIUM] CWE-667 CVE-2025-39910: In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc, mm/kasan: respect g In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() kasan_populate_vmalloc() and its helpers ignore the caller's gfp_mask and always allocate memory using the hardcoded GFP_KERNEL flag. This makes them inconsistent with vmalloc(), which was recently extended to supp
nvdosv
CVE-2025-39916MEDIUMCVSS 5.5≥ 6.0.12, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-10-01
CVE-2025-39916 [MEDIUM] CWE-369 CVE-2025-39916: In the Linux kernel, the following vulnerability has been resolved: mm/damon/reclaim: avoid divide- In the Linux kernel, the following vulnerability has been resolved: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() When creating a new scheme of DAMON_RECLAIM, the calculation of 'min_age_region' uses 'aggr_interval' as the divisor, which may lead to division-by-zero errors. Fix it by directly returning -EINVAL when suc
nvdosv
CVE-2023-53458MEDIUMCVSS 5.5≥ 3.18, < 5.15.113≥ 5.16, < 6.1.30+1 more2025-10-01
CVE-2023-53458 [MEDIUM] CWE-476 CVE-2023-53458: In the Linux kernel, the following vulnerability has been resolved: media: cx23885: Fix a null-ptr- In the Linux kernel, the following vulnerability has been resolved: media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() When the driver calls cx23885_risc_buffer() to prepare the buffer, the function call dma_alloc_coherent may fail, resulting in a empty buffer risc->cpu. Later when we free the buffer or access the buf
nvdosv
CVE-2025-39921MEDIUMCVSS 5.5≥ 6.14, < 6.16.6v6.172025-10-01
CVE-2025-39921 [MEDIUM] CVE-2025-39921: In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequency switches") the logic for checking the viability of op->max_freq in mchp_coreqspi_setup_clock() was copied in
nvdosv
CVE-2023-53455MEDIUMCVSS 5.5≥ 6.1, < 6.1.16≥ 6.2, < 6.2.32025-10-01
CVE-2023-53455 [MEDIUM] CVE-2023-53455: In the Linux kernel, the following vulnerability has been resolved: drm/vc4: drop all currently hel In the Linux kernel, the following vulnerability has been resolved: drm/vc4: drop all currently held locks if deadlock happens If vc4_hdmi_reset_link() returns -EDEADLK, it means that a deadlock happened in the locking context. This situation should be addressed by dropping all currently held locks and block until the contended lock becomes available. Cur
nvdosv
CVE-2023-53491MEDIUMCVSS 5.5≥ 2.6.30, < 6.4.42025-10-01
CVE-2023-53491 [MEDIUM] CVE-2023-53491: In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_pr In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need for a function attribute to control the omission of stack protectors on a per-function basis; at the time Cl
nvdosv
CVE-2025-39915MEDIUMCVSS 5.5≥ 6.14, < 6.16.8v6.172025-10-01
CVE-2025-39915 [MEDIUM] CWE-667 CVE-2025-39915: In the Linux kernel, the following vulnerability has been resolved: net: phy: transfer phy_config_i In the Linux kernel, the following vulnerability has been resolved: net: phy: transfer phy_config_inband() locking responsibility to phylink Problem description Lockdep reports a possible circular locking dependency (AB/BA) between &pl->state_mutex and &phy->lock, as follows. phylink_resolve() // acquires &pl->state_mutex -> phylink_major_config
nvdosv
CVE-2022-50448MEDIUMCVSS 5.5≥ 5.19, < 5.19.17≥ 6.0, < 6.0.32025-10-01
CVE-2022-50448 [MEDIUM] CVE-2022-50448: In the Linux kernel, the following vulnerability has been resolved: mm/uffd: fix warning without PT In the Linux kernel, the following vulnerability has been resolved: mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in When PTE_MARKER_UFFD_WP not configured, it's still possible to reach pte marker code and trigger an warning. Add a few CONFIG_PTE_MARKER_UFFD_WP ifdefs to make sure the code won't be reached when not compiled in.
nvdosv
CVE-2022-50443MEDIUMCVSS 5.5≥ 4.15, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-10-01
CVE-2022-50443 [MEDIUM] CVE-2022-50443: In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usag In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usage counter unbalance in poweron pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. We fix it by replacing it with the newest pm_runtime_resume_and_get to keep usage counter b
nvdosv
CVE-2023-53505MEDIUMCVSS 5.5≥ 4.2, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-10-01
CVE-2023-53505 [MEDIUM] CWE-401 CVE-2023-53505: In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix p In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.
nvdosv
CVE-2025-39902MEDIUMCVSS 5.5≥ 2.6.22, < 5.4.299≥ 5.5, < 5.10.243+6 more2025-10-01
CVE-2025-39902 [MEDIUM] CWE-476 CVE-2025-39902: In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metada In the Linux kernel, the following vulnerability has been resolved: mm/slub: avoid accessing metadata when pointer is invalid in object_err() object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since
nvdosv
CVE-2023-53529MEDIUMCVSS 5.5≥ 5.2, < 6.3.42025-10-01
CVE-2023-53529 [MEDIUM] CWE-401 CVE-2023-53529: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in rtw88_usb Kmemleak shows the following leak arising from routine in the usb probe routine: unreferenced object 0xffff895cb29bba00 (size 512): comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s) hex dump (first 32 bytes): 77 30 30 30
nvdosv