Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 146 of 738
CVE-2022-50408HIGHCVSS 7.8fixed in 4.14.296≥ 4.15, < 4.19.262+5 more2025-09-18
CVE-2022-50408 [HIGH] CWE-416 CVE-2022-50408: In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: fix use-after-f
In the Linux kernel, the following vulnerability has been resolved:
wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()
> ret = brcmf_proto_tx_queue_data(drvr, ifp->ifidx, skb);
may be schedule, and then complete before the line
> ndev->stats.tx_bytes += skb->len;
[ 46.912801] ======================================================
nvdosv
CVE-2023-53426HIGHCVSS 7.8≥ 5.15.33, < 5.15.132≥ 5.16.19, < 5.17+2 more2025-09-18
CVE-2023-53426 [HIGH] CWE-416 CVE-2023-53426: In the Linux kernel, the following vulnerability has been resolved:
xsk: Fix xsk_diag use-after-fre
In the Linux kernel, the following vulnerability has been resolved:
xsk: Fix xsk_diag use-after-free error during socket cleanup
Fix a use-after-free error that is possible if the xsk_diag interface
is used after the socket has been unbound from the device. This can
happen either due to the socket being closed or the device
disappearing. In the earl
nvdosv
CVE-2022-50394HIGHCVSS 7.1≥ 3.9, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50394 [HIGH] CWE-125 CVE-2022-50394: In the Linux kernel, the following vulnerability has been resolved:
i2c: ismt: Fix an out-of-bounds
In the Linux kernel, the following vulnerability has been resolved:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
When the driver does not check the data from the user, the variable
'data->block[0]' may be very large to cause an out-of-bounds bug.
The following log can reveal it:
[ 33.995542] i2c i2c-1: ioctl, cmd=0x720, arg=0x7ffcb3dc3a20
nvdosv
CVE-2023-53374HIGHCVSS 7.8≥ 6.3.8, < 6.4≥ 6.4.1, < 6.4.16+2 more2025-09-18
CVE-2023-53374 [HIGH] CWE-416 CVE-2023-53374: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: fail SCO/I
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early
Not calling hci_(dis)connect_cfm before deleting conn referred to by a
socket generally results to use-after-free.
When cleaning up SCO connections when the parent ACL is deleted too
early, use hci_conn_failed
nvdosv
CVE-2022-50384HIGHCVSS 7.8≥ 4.2, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50384 [HIGH] CWE-416 CVE-2022-50384: In the Linux kernel, the following vulnerability has been resolved:
staging: vme_user: Fix possible
In the Linux kernel, the following vulnerability has been resolved:
staging: vme_user: Fix possible UAF in tsi148_dma_list_add
Smatch report warning as follows:
drivers/staging/vme_user/vme_tsi148.c:1757 tsi148_dma_list_add() warn:
'&entry->list' not removed from list
In tsi148_dma_list_add(), the error path "goto err_dma" will not
remove entry->l
nvdosv
CVE-2023-53446HIGHCVSS 7.8≥ 4.11, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-09-18
CVE-2023-53446 [HIGH] CWE-416 CVE-2023-53446: In the Linux kernel, the following vulnerability has been resolved:
PCI/ASPM: Disable ASPM on MFD f
In the Linux kernel, the following vulnerability has been resolved:
PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free
Struct pcie_link_state->downstream is a pointer to the pci_dev of function
0. Previously we retained that pointer when removing function 0, and
subsequent ASPM policy changes dereferenced it, resulting in a
use-a
nvdosv
CVE-2023-53376HIGHCVSS 7.1≥ 5.14, < 6.1.18≥ 6.2, < 6.2.52025-09-18
CVE-2023-53376 [HIGH] CWE-125 CVE-2023-53376: In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Use number of bit
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Use number of bits to manage bitmap sizes
To allocate bitmaps, the mpi3mr driver calculates sizes of bitmaps using
byte as unit. However, bitmap helper functions assume that bitmaps are
allocated using unsigned long as unit. This gap causes memory access beyond
the bit
nvdosv
CVE-2022-50413HIGHCVSS 7.8≥ 6.0, < 6.0.32025-09-18
CVE-2022-50413 [HIGH] CWE-416 CVE-2022-50413: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix use-after-f
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix use-after-free
We've already freed the assoc_data at this point, so need
to use another copy of the AP (MLD) address instead.
nvdosv
CVE-2023-53377HIGHCVSS 7.8≥ 6.0.16, < 6.1.39≥ 6.2, < 6.3.13+1 more2025-09-18
CVE-2023-53377 [HIGH] CWE-416 CVE-2023-53377: In the Linux kernel, the following vulnerability has been resolved:
cifs: prevent use-after-free by
In the Linux kernel, the following vulnerability has been resolved:
cifs: prevent use-after-free by freeing the cfile later
In smb2_compound_op we have a possible use-after-free
which can cause hard to debug problems later on.
This was revealed during stress testing with KASAN enabled
kernel. Fixing it by moving the cfile free call to
a few lines b
nvdosv
CVE-2022-50419HIGHCVSS 7.8≥ 2.6.19, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-18
CVE-2022-50419 [HIGH] CWE-415 CVE-2022-50419: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sysfs: Fix attem
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
device_add shall not be called multiple times as stated in its
documentation:
'Do not call this routine or device_register() more than once for
any device structure'
Syzkaller reports a bug as follows [1]:
----
nvdosv
CVE-2022-50401HIGHCVSS 7.8≥ 4.4.229, < 4.5≥ 4.9.229, < 4.9.337+7 more2025-09-18
CVE-2022-50401 [HIGH] CWE-415 CVE-2022-50401: In the Linux kernel, the following vulnerability has been resolved:
nfsd: under NFSv4.1, fix double
In the Linux kernel, the following vulnerability has been resolved:
nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure
On error situation `clp->cl_cb_conn.cb_xprt` should not be given
a reference to the xprt otherwise both client cleanup and the
error handling path of the caller call to put it. Better to
delay handing over the refere
nvdosv
CVE-2022-50417HIGHCVSS 7.8≥ 5.2, < 5.10.163≥ 5.11, < 5.15.87+3 more2025-09-18
CVE-2022-50417 [HIGH] CWE-416 CVE-2022-50417: In the Linux kernel, the following vulnerability has been resolved:
drm/panfrost: Fix GEM handle cr
In the Linux kernel, the following vulnerability has been resolved:
drm/panfrost: Fix GEM handle creation ref-counting
panfrost_gem_create_with_handle() previously returned a BO but with the
only reference being from the handle, which user space could in theory
guess and release, causing a use-after-free. Additionally if the call to
panfrost_gem_map
nvdosv
CVE-2023-53398HIGHCVSS 7.8≥ 6.0, < 6.1.18≥ 6.2, < 6.2.52025-09-18
CVE-2023-53398 [HIGH] CWE-416 CVE-2023-53398: In the Linux kernel, the following vulnerability has been resolved:
mlx5: fix possible ptp queue fi
In the Linux kernel, the following vulnerability has been resolved:
mlx5: fix possible ptp queue fifo use-after-free
Fifo indexes are not checked during pop operations and it leads to
potential use-after-free when poping from empty queue. Such case was
possible during re-sync action. WARN_ON_ONCE covers future cases.
There were out-of-order cqe spo
nvdosv
CVE-2023-53432HIGHCVSS 7.8fixed in 5.15.128≥ 5.16, < 6.1.47+1 more2025-09-18
CVE-2023-53432 [HIGH] CWE-416 CVE-2023-53432: In the Linux kernel, the following vulnerability has been resolved:
firewire: net: fix use after fr
In the Linux kernel, the following vulnerability has been resolved:
firewire: net: fix use after free in fwnet_finish_incoming_packet()
The netif_rx() function frees the skb so we can't dereference it to
save the skb->len.
nvdosv
CVE-2023-53392HIGHCVSS 7.1≥ 5.16.1, < 6.1.25≥ 6.2, < 6.2.12+2 more2025-09-18
CVE-2023-53392 [HIGH] CVE-2023-53392: In the Linux kernel, the following vulnerability has been resolved:
HID: intel-ish-hid: Fix kernel
In the Linux kernel, the following vulnerability has been resolved:
HID: intel-ish-hid: Fix kernel panic during warm reset
During warm reset device->fw_client is set to NULL. If a bus driver is
registered after this NULL setting and before new firmware clients are
enumerated by ISHTP, kernel panic will result in the function
ishtp_cl_bus_match(). This is bec
nvdosv
CVE-2022-50378HIGHCVSS 7.8≥ 4.10, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-09-18
CVE-2022-50378 [HIGH] CWE-416 CVE-2022-50378: In the Linux kernel, the following vulnerability has been resolved:
drm/meson: reorder driver deini
In the Linux kernel, the following vulnerability has been resolved:
drm/meson: reorder driver deinit sequence to fix use-after-free bug
Unloading the driver triggers the following KASAN warning:
[ +0.006275] =============================================================
[ +0.000029] BUG: KASAN: use-after-free in __list_del_entry_valid+0xe0/0x1a0
[ +
nvdosv
CVE-2023-53395HIGHCVSS 7.8fixed in 4.14.326≥ 4.15, < 4.19.295+5 more2025-09-18
CVE-2023-53395 [HIGH] CWE-129 CVE-2023-53395: In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Add AML_NO_OPERAND_RESO
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer
ACPICA commit 90310989a0790032f5a0140741ff09b545af4bc5
According to the ACPI specification 19.6.134, no argument is required to be passed for ASL Timer instruction. For taking care of no argument, AML_NO_OPERAND_RESOLVE flag is added
nvdosv
CVE-2023-53420HIGHCVSS 7.1≥ 5.15, < 5.15.121≥ 5.16, < 6.1.39+1 more2025-09-18
CVE-2023-53420 [HIGH] CWE-125 CVE-2023-53420: In the Linux kernel, the following vulnerability has been resolved:
ntfs: Fix panic about slab-out-
In the Linux kernel, the following vulnerability has been resolved:
ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()
Here is a BUG report from syzbot:
BUG: KASAN: slab-out-of-bounds in ntfs_list_ea fs/ntfs3/xattr.c:191 [inline]
BUG: KASAN: slab-out-of-bounds in ntfs_listxattr+0x401/0x570 fs/ntfs3/xattr.c:710
Read of size 1 at add
nvdosv
CVE-2023-53372HIGHCVSS 7.8≥ 4.16, < 4.19.281≥ 4.20, < 5.4.241+5 more2025-09-18
CVE-2023-53372 [HIGH] CWE-787 CVE-2023-53372: In the Linux kernel, the following vulnerability has been resolved:
sctp: fix a potential overflow
In the Linux kernel, the following vulnerability has been resolved:
sctp: fix a potential overflow in sctp_ifwdtsn_skip
Currently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only
checks the pos against the end of the chunk. However, the data left for
the last pos may be < sizeof(struct sctp_ifwdtsn_skip), and dereference
it as struct s
nvdosv
CVE-2022-50411HIGHCVSS 7.8fixed in 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50411 [HIGH] CWE-416 CVE-2022-50411: In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix error code path in
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix error code path in acpi_ds_call_control_method()
A use-after-free in acpi_ps_parse_aml() after a failing invocaion of
acpi_ds_call_control_method() is reported by KASAN [1] and code
inspection reveals that next_walk_state pushed to the thread by
acpi_ds_create_walk_state(
nvdosv