Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 158 of 745
CVE-2023-53435MEDIUMCVSS 5.5≥ 2.6.28, < 4.14.316≥ 4.15, < 4.19.284+6 more2025-09-18
CVE-2023-53435 [MEDIUM] CWE-401 CVE-2023-53435: In the Linux kernel, the following vulnerability has been resolved:
cassini: Fix a memory leak in t
In the Linux kernel, the following vulnerability has been resolved:
cassini: Fix a memory leak in the error handling path of cas_init_one()
cas_saturn_firmware_init() allocates some memory using vmalloc(). This
memory is freed in the .remove() function but not it the error handling
path of the probe.
Add the missing vfree() to avoid a memory leak
nvdosv
CVE-2023-53403MEDIUMCVSS 5.5fixed in 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-18
CVE-2023-53403 [MEDIUM] CWE-401 CVE-2023-53403: In the Linux kernel, the following vulnerability has been resolved:
time/debug: Fix memory leak wit
In the Linux kernel, the following vulnerability has been resolved:
time/debug: Fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic at
once.
nvdosv
CVE-2023-53416MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-18
CVE-2023-53416 [MEDIUM] CWE-401 CVE-2023-53416: In the Linux kernel, the following vulnerability has been resolved:
USB: isp1362: fix memory leak w
In the Linux kernel, the following vulnerability has been resolved:
USB: isp1362: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
nvdosv
CVE-2023-53431MEDIUMCVSS 5.5≥ 2.6.25, < 4.19.281≥ 4.20, < 5.4.241+5 more2025-09-18
CVE-2023-53431 [MEDIUM] CVE-2023-53431: In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Handle enclosure wit
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Handle enclosure with just a primary component gracefully
This reverts commit 3fe97ff3d949 ("scsi: ses: Don't attach if enclosure
has no components") and introduces proper handling of case where there are
no detected secondary components, but primary component (enumerated in
nu
nvdosv
CVE-2022-50414MEDIUMCVSS 5.5≥ 2.6.39, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50414 [MEDIUM] CVE-2022-50414: In the Linux kernel, the following vulnerability has been resolved:
scsi: fcoe: Fix transport not d
In the Linux kernel, the following vulnerability has been resolved:
scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails
fcoe_init() calls fcoe_transport_attach(&fcoe_sw_transport), but when
fcoe_if_init() fails, &fcoe_sw_transport is not detached and leaves freed
&fcoe_sw_transport on fcoe_transports list. This causes panic when
reinserting
nvdosv
CVE-2023-53436MEDIUMCVSS 5.5≥ 4.2, < 4.14.323≥ 4.15, < 4.19.292+6 more2025-09-18
CVE-2023-53436 [MEDIUM] CWE-401 CVE-2023-53436: In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix possible memory
In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix possible memory leak if device_add() fails
If device_add() returns error, the name allocated by dev_set_name() needs
be freed. As the comment of device_add() says, put_device() should be used
to give up the reference in the error path. So fix this by calling
put_de
nvdosv
CVE-2023-53369MEDIUMCVSS 5.5≥ 2.6.29, < 5.4.253≥ 5.5, < 5.10.190+4 more2025-09-18
CVE-2023-53369 [MEDIUM] CVE-2023-53369: In the Linux kernel, the following vulnerability has been resolved:
net: dcb: choose correct policy
In the Linux kernel, the following vulnerability has been resolved:
net: dcb: choose correct policy to parse DCB_ATTR_BCN
The dcbnl_bcn_setcfg uses erroneous policy to parse tb[DCB_ATTR_BCN],
which is introduced in commit 859ee3c43812 ("DCB: Add support for DCB
BCN"). Please see the comment in below code
static int dcbnl_bcn_setcfg(...)
{
...
ret = nla_p
nvdosv
CVE-2023-53419MEDIUMCVSS 5.5fixed in 5.10.181≥ 5.11, < 5.15.113+2 more2025-09-18
CVE-2023-53419 [MEDIUM] CWE-476 CVE-2023-53419: In the Linux kernel, the following vulnerability has been resolved:
rcu: Protect rcu_print_task_exp
In the Linux kernel, the following vulnerability has been resolved:
rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access
For kernels built with CONFIG_PREEMPT_RCU=y, the following scenario can
result in a NULL-pointer dereference:
CPU1 CPU2
rcu_preempt_deferred_qs_irqrestore rcu_print_task_exp_stall
if (special.b.blocked) READ_ONCE(rnp->exp
nvdosv
CVE-2022-50392MEDIUMCVSS 5.5≥ 5.2, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-09-18
CVE-2022-50392 [MEDIUM] CVE-2022-50392: In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: mt8183: fix ref
In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: mt8183: fix refcount leak in mt8183_mt6358_ts3a227_max98357_dev_probe()
The node returned by of_parse_phandle() with refcount incremented,
of_node_put() needs be called when finish using it. So add it in the
error path in mt8183_mt6358_ts3a227_max98357_dev_probe().
nvdosv
CVE-2023-53380MEDIUMCVSS 5.5≥ 4.20, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-09-18
CVE-2023-53380 [MEDIUM] CWE-476 CVE-2023-53380: In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix null-ptr-deref o
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request
There are two check of 'mreplace' in raid10_sync_request(). In the first
check, 'need_replace' will be set and 'mreplace' will be used later if
no-Faulty 'mreplace' exists, In the second check, 'mreplace' will be
set
nvdosv
CVE-2022-50381MEDIUMCVSS 5.5fixed in 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50381 [MEDIUM] CWE-476 CVE-2022-50381: In the Linux kernel, the following vulnerability has been resolved:
md: fix a crash in mempool_free
In the Linux kernel, the following vulnerability has been resolved:
md: fix a crash in mempool_free
There's a crash in mempool_free when running the lvm test
shell/lvchange-rebuild-raid.sh.
The reason for the crash is this:
* super_written calls atomic_dec_and_test(&mddev->pending_writes) and
wake_up(&mddev->sb_wait). Then it calls rdev_dec_pendi
nvdosv
CVE-2023-53401MEDIUMCVSS 4.7≥ 5.9, < 6.1.45≥ 6.2, < 6.4.102025-09-18
CVE-2023-53401 [MEDIUM] CWE-476 CVE-2023-53401: In the Linux kernel, the following vulnerability has been resolved:
mm: kmem: fix a NULL pointer de
In the Linux kernel, the following vulnerability has been resolved:
mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
KCSAN found an issue in obj_stock_flush_required():
stock->cached_objcg can be reset between the check and dereference:
BUG: KCSAN: data-race in drain_all_stock / drain_obj_stock
write to 0xffff888237c2a2f8 o
nvdosv
CVE-2023-53375MEDIUMCVSS 5.5≥ 5.2, < 5.4.241≥ 5.5, < 5.10.178+4 more2025-09-18
CVE-2023-53375 [MEDIUM] CWE-401 CVE-2023-53375: In the Linux kernel, the following vulnerability has been resolved:
tracing: Free error logs of tra
In the Linux kernel, the following vulnerability has been resolved:
tracing: Free error logs of tracing instances
When a tracing instance is removed, the error messages that hold errors
that occurred in the instance needs to be freed. The following reports a
memory leak:
# cd /sys/kernel/tracing
# mkdir instances/foo
# echo 'hist:keys=x' > instan
nvdosv
CVE-2023-53434MEDIUMCVSS 5.5≥ 5.16, < 6.1.30≥ 6.2, < 6.3.42025-09-18
CVE-2023-53434 [MEDIUM] CVE-2023-53434: In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_dsp_rproc: Add
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_dsp_rproc: Add custom memory copy implementation for i.MX DSP Cores
The IRAM is part of the HiFi DSP.
According to hardware specification only 32-bits write are allowed
otherwise we get a Kernel panic.
Therefore add a custom memory copy and memset functions to deal with
th
nvdosv
CVE-2023-53429MEDIUMCVSS 5.5fixed in 6.4.72025-09-18
CVE-2023-53429 [MEDIUM] CVE-2023-53429: In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't check PageError in
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't check PageError in __extent_writepage
__extent_writepage currenly sets PageError whenever any error happens,
and the also checks for PageError to decide if to call error handling.
This leads to very unclear responsibility for cleaning up on errors.
In the VM and generic write
nvdosv
CVE-2022-50397UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-09-18
CVE-2022-50397 CVE-2022-50397: In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: reject zero-sized raw_sendmsg() syzbot is hitting skb_assert_len()
In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: reject zero-sized raw_sendmsg() syzbot is hitting skb_assert_len() warning at raw_sendmsg() for ieee802154 socket. What commit dc633700f00f726e ("net/af_packet: check len when min_header_len equals to 0") does also applies to ieee8021
osv
CVE-2022-50377UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-09-18
CVE-2022-50377 CVE-2022-50377: In the Linux kernel, the following vulnerability has been resolved:
ext4: check and assert if marking an no_delete evicting inode dirty
In ext4_evic
In the Linux kernel, the following vulnerability has been resolved:
ext4: check and assert if marking an no_delete evicting inode dirty
In ext4_evict_inode(), if we evicting an inode in the 'no_delete' path,
it cannot be raced by another mark_inode_dirty(). If it happens,
someone else may accidentally dirty it with
osv
CVE-2022-50403UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-09-18
CVE-2022-50403 CVE-2022-50403: In the Linux kernel, the following vulnerability has been resolved:
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
Shifting si
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned. The UBSAN warning calltrace like below:
UBSAN: shift-out-of-bounds in fs/ext4/ext4.
osv
CVE-2023-53358HIGHCVSS 7.0≥ 5.15, < 5.15.145≥ 5.16, < 6.1.28+2 more2025-09-17
CVE-2023-53358 [HIGH] CWE-416 CVE-2023-53358: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix racy issue under coc
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect
There is UAF issue under cocurrent smb2 tree disconnect.
This patch introduce TREE_CONN_EXPIRE flags for tcon to avoid cocurrent
access.
nvdosv
CVE-2023-53338HIGHCVSS 7.8≥ 4.10, < 5.4.257≥ 5.5, < 5.10.195+4 more2025-09-17
CVE-2023-53338 [HIGH] CWE-416 CVE-2023-53338: In the Linux kernel, the following vulnerability has been resolved:
lwt: Fix return values of BPF x
In the Linux kernel, the following vulnerability has been resolved:
lwt: Fix return values of BPF xmit ops
BPF encap ops can return different types of positive values, such like
NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function
skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return
values would be treated implicitly
nvdosv