Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 154 of 745
CVE-2022-50411HIGHCVSS 7.8fixed in 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50411 [HIGH] CWE-416 CVE-2022-50411: In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix error code path in
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix error code path in acpi_ds_call_control_method()
A use-after-free in acpi_ps_parse_aml() after a failing invocaion of
acpi_ds_call_control_method() is reported by KASAN [1] and code
inspection reveals that next_walk_state pushed to the thread by
acpi_ds_create_walk_state(
nvdosv
CVE-2023-53427HIGHCVSS 7.8≥ 4.16, < 4.19.276≥ 4.20, < 5.4.235+4 more2025-09-18
CVE-2023-53427 [HIGH] CWE-416 CVE-2023-53427: In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix warning and UAF when
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix warning and UAF when destroy the MR list
If the MR allocate failed, the MR recovery work not initialized
and list not cleared. Then will be warning and UAF when release
the MR:
WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110
CPU: 4 PID: 8
nvdosv
CVE-2023-53414MEDIUMCVSS 5.5fixed in 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-18
CVE-2023-53414 [MEDIUM] CWE-401 CVE-2023-53414: In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix memory leak wit
In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic at
once.
nvdosv
CVE-2023-53438MEDIUMCVSS 5.5fixed in 6.1.53≥ 6.2, < 6.4.16+1 more2025-09-18
CVE-2023-53438 [MEDIUM] CVE-2023-53438: In the Linux kernel, the following vulnerability has been resolved:
x86/MCE: Always save CS registe
In the Linux kernel, the following vulnerability has been resolved:
x86/MCE: Always save CS register on AMD Zen IF Poison errors
The Instruction Fetch (IF) units on current AMD Zen-based systems do not
guarantee a synchronous #MC is delivered for poison consumption errors.
Therefore, MCG_STATUS[EIPV|RIPV] will not be set. However, the
microarchitecture do
nvdosv
CVE-2022-50379MEDIUMCVSS 4.7fixed in 4.19.262≥ 4.20, < 5.4.220+4 more2025-09-18
CVE-2022-50379 [MEDIUM] CWE-362 CVE-2022-50379: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race between quota e
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race between quota enable and quota rescan ioctl
When enabling quotas, at btrfs_quota_enable(), after committing the
transaction, we change fs_info->quota_root to point to the quota root we
created and set BTRFS_FS_QUOTA_ENABLED at fs_info->flags. Then we try
to start t
nvdosv
CVE-2023-53440MEDIUMCVSS 5.5≥ 3.17, < 4.14.313≥ 4.15, < 4.19.281+6 more2025-09-18
CVE-2023-53440 [MEDIUM] CWE-476 CVE-2023-53440: In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix sysfs interface lif
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix sysfs interface lifetime
The current nilfs2 sysfs support has issues with the timing of creation
and deletion of sysfs entries, potentially leading to null pointer
dereferences, use-after-free, and lockdep warnings.
Some of the sysfs attributes for nilfs2 per-filesyst
nvdosv
CVE-2023-53408MEDIUMCVSS 5.5fixed in 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-18
CVE-2023-53408 [MEDIUM] CWE-401 CVE-2023-53408: In the Linux kernel, the following vulnerability has been resolved:
trace/blktrace: fix memory leak
In the Linux kernel, the following vulnerability has been resolved:
trace/blktrace: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at onc
nvdosv
CVE-2023-53439MEDIUMCVSS 5.5≥ 5.19, < 6.1.30≥ 6.2, < 6.3.4+1 more2025-09-18
CVE-2023-53439 [MEDIUM] CWE-401 CVE-2023-53439: In the Linux kernel, the following vulnerability has been resolved:
net: skb_partial_csum_set() fix
In the Linux kernel, the following vulnerability has been resolved:
net: skb_partial_csum_set() fix against transport header magic value
skb->transport_header uses the special 0xFFFF value
to mark if the transport header was set or not.
We must prevent callers to accidentaly set skb->transport_header
to 0xFFFF. Note that only fuzzers can possibly
nvdosv
CVE-2023-53428MEDIUMCVSS 5.5≥ 6.2, < 6.4.16≥ 6.5, < 6.5.32025-09-18
CVE-2023-53428 [MEDIUM] CWE-674 CVE-2023-53428: In the Linux kernel, the following vulnerability has been resolved:
powercap: arm_scmi: Remove recu
In the Linux kernel, the following vulnerability has been resolved:
powercap: arm_scmi: Remove recursion while parsing zones
Powercap zones can be defined as arranged in a hierarchy of trees and when
registering a zone with powercap_register_zone(), the kernel powercap
subsystem expects this to happen starting from the root zones down to the
leave
nvdosv
CVE-2022-50390MEDIUMCVSS 5.5≥ 5.10, < 6.0.16≥ 6.1, < 6.1.22025-09-18
CVE-2022-50390 [MEDIUM] CVE-2022-50390: In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: fix undefined behavior
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED
Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned. The UBSAN warning calltrace like below:
UBSAN: shift-out-of-bounds in ./include/drm/ttm/ttm_tt.h:122:26
left shift of
nvdosv
CVE-2023-53425MEDIUMCVSS 5.5fixed in 4.14.324≥ 4.15, < 4.19.293+5 more2025-09-18
CVE-2023-53425 [MEDIUM] CWE-476 CVE-2023-53425: In the Linux kernel, the following vulnerability has been resolved:
media: platform: mediatek: vpu:
In the Linux kernel, the following vulnerability has been resolved:
media: platform: mediatek: vpu: fix NULL ptr dereference
If pdev is NULL, then it is still dereferenced.
This fixes this smatch warning:
drivers/media/platform/mediatek/vpu/mtk_vpu.c:570 vpu_load_firmware() warn: address of NULL pointer 'pdev'
nvdosv
CVE-2022-50398MEDIUMCVSS 5.5≥ 5.17, < 6.0.7v6.12025-09-18
CVE-2022-50398 [MEDIUM] CVE-2022-50398: In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dp: add atomic_check to
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dp: add atomic_check to bridge ops
DRM commit_tails() will disable downstream crtc/encoder/bridge if
both disable crtc is required and crtc->active is set before pushing
a new frame downstream.
There is a rare case that user space display manager issue an extra
screen update imme
nvdosv
CVE-2023-53393MEDIUMCVSS 5.5≥ 4.16, < 5.15.87≥ 5.16, < 6.0.19+2 more2025-09-18
CVE-2023-53393 [MEDIUM] CVE-2023-53393: In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx5: Fix mlx5_ib_get_hw_s
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device
Currently, when mlx5_ib_get_hw_stats() is used for device (port_num = 0),
there is a special handling in order to use the correct counters, but,
port_num is being passed down the stack without any change. Also, some
functions assume
nvdosv
CVE-2023-53444MEDIUMCVSS 5.5≥ 5.19, < 6.1.42≥ 6.2, < 6.4.7+1 more2025-09-18
CVE-2023-53444 [MEDIUM] CWE-476 CVE-2023-53444: In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: fix bulk_move corrupti
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: fix bulk_move corruption when adding a entry
When the resource is the first in the bulk_move range, adding it again
(thus moving it to the tail) will corrupt the list since the first
pointer is not moved. This eventually lead to null pointer deref in
ttm_lru_bulk_move_del
nvdosv
CVE-2022-50415MEDIUMCVSS 5.5≥ 2.6.15, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50415 [MEDIUM] CWE-476 CVE-2022-50415: In the Linux kernel, the following vulnerability has been resolved:
parisc: led: Fix potential null
In the Linux kernel, the following vulnerability has been resolved:
parisc: led: Fix potential null-ptr-deref in start_task()
start_task() calls create_singlethread_workqueue() and not checked the
ret value, which may return NULL. And a null-ptr-deref may happen:
start_task()
create_singlethread_workqueue() # failed, led_wq is NULL
queue_delayed_
nvdosv
CVE-2023-53442MEDIUMCVSS 5.5≥ 5.16, < 6.1.47≥ 6.2, < 6.4.12+1 more2025-09-18
CVE-2023-53442 [MEDIUM] CWE-476 CVE-2023-53442: In the Linux kernel, the following vulnerability has been resolved:
ice: Block switchdev mode when
In the Linux kernel, the following vulnerability has been resolved:
ice: Block switchdev mode when ADQ is active and vice versa
ADQ and switchdev are not supported simultaneously. Enabling both at the
same time can result in nullptr dereference.
To prevent this, check if ADQ is active when changing devlink mode to
switchdev mode, and check if swit
nvdosv
CVE-2022-50389MEDIUMCVSS 5.5≥ 4.0, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-09-18
CVE-2022-50389 [MEDIUM] CWE-401 CVE-2022-50389: In the Linux kernel, the following vulnerability has been resolved:
tpm: tpm_crb: Add the missed ac
In the Linux kernel, the following vulnerability has been resolved:
tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak
In crb_acpi_add(), we get the TPM2 table to retrieve information
like start method, and then assign them to the priv data, so the
TPM2 table is not used after the init, should be freed, call
acpi_put_table() to fix t
nvdosv
CVE-2023-53407MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-18
CVE-2023-53407 [MEDIUM] CWE-401 CVE-2023-53407: In the Linux kernel, the following vulnerability has been resolved:
USB: gadget: pxa27x_udc: fix me
In the Linux kernel, the following vulnerability has been resolved:
USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the log
nvdosv
CVE-2023-53396MEDIUMCVSS 5.5≥ 5.15.33, < 5.15.112≥ 5.16.19, < 5.17+3 more2025-09-18
CVE-2023-53396 [MEDIUM] CWE-401 CVE-2023-53396: In the Linux kernel, the following vulnerability has been resolved:
ubifs: Fix memory leak in do_re
In the Linux kernel, the following vulnerability has been resolved:
ubifs: Fix memory leak in do_rename
If renaming a file in an encrypted directory, function
fscrypt_setup_filename allocates memory for a file name. This name is
never used, and before returning to the caller the memory for it is not
freed.
When running kmemleak on it we see that
nvdosv
CVE-2022-50399MEDIUMCVSS 5.5≥ 4.12, < 4.18≥ 5.8, < 5.15.77+2 more2025-09-18
CVE-2022-50399 [MEDIUM] CWE-190 CVE-2022-50399: In the Linux kernel, the following vulnerability has been resolved:
media: atomisp: prevent integer
In the Linux kernel, the following vulnerability has been resolved:
media: atomisp: prevent integer overflow in sh_css_set_black_frame()
The "height" and "width" values come from the user so the "height * width"
multiplication can overflow.
nvdosv