Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 158 of 745
CVE-2023-53435MEDIUMCVSS 5.5≥ 2.6.28, < 4.14.316≥ 4.15, < 4.19.284+6 more2025-09-18
CVE-2023-53435 [MEDIUM] CWE-401 CVE-2023-53435: In the Linux kernel, the following vulnerability has been resolved: cassini: Fix a memory leak in t In the Linux kernel, the following vulnerability has been resolved: cassini: Fix a memory leak in the error handling path of cas_init_one() cas_saturn_firmware_init() allocates some memory using vmalloc(). This memory is freed in the .remove() function but not it the error handling path of the probe. Add the missing vfree() to avoid a memory leak
nvdosv
CVE-2023-53403MEDIUMCVSS 5.5fixed in 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-18
CVE-2023-53403 [MEDIUM] CWE-401 CVE-2023-53403: In the Linux kernel, the following vulnerability has been resolved: time/debug: Fix memory leak wit In the Linux kernel, the following vulnerability has been resolved: time/debug: Fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once.
nvdosv
CVE-2023-53416MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-18
CVE-2023-53416 [MEDIUM] CWE-401 CVE-2023-53416: In the Linux kernel, the following vulnerability has been resolved: USB: isp1362: fix memory leak w In the Linux kernel, the following vulnerability has been resolved: USB: isp1362: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once.
nvdosv
CVE-2023-53431MEDIUMCVSS 5.5≥ 2.6.25, < 4.19.281≥ 4.20, < 5.4.241+5 more2025-09-18
CVE-2023-53431 [MEDIUM] CVE-2023-53431: In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Handle enclosure wit In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Handle enclosure with just a primary component gracefully This reverts commit 3fe97ff3d949 ("scsi: ses: Don't attach if enclosure has no components") and introduces proper handling of case where there are no detected secondary components, but primary component (enumerated in nu
nvdosv
CVE-2022-50414MEDIUMCVSS 5.5≥ 2.6.39, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50414 [MEDIUM] CVE-2022-50414: In the Linux kernel, the following vulnerability has been resolved: scsi: fcoe: Fix transport not d In the Linux kernel, the following vulnerability has been resolved: scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails fcoe_init() calls fcoe_transport_attach(&fcoe_sw_transport), but when fcoe_if_init() fails, &fcoe_sw_transport is not detached and leaves freed &fcoe_sw_transport on fcoe_transports list. This causes panic when reinserting
nvdosv
CVE-2023-53436MEDIUMCVSS 5.5≥ 4.2, < 4.14.323≥ 4.15, < 4.19.292+6 more2025-09-18
CVE-2023-53436 [MEDIUM] CWE-401 CVE-2023-53436: In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible memory In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible memory leak if device_add() fails If device_add() returns error, the name allocated by dev_set_name() needs be freed. As the comment of device_add() says, put_device() should be used to give up the reference in the error path. So fix this by calling put_de
nvdosv
CVE-2023-53369MEDIUMCVSS 5.5≥ 2.6.29, < 5.4.253≥ 5.5, < 5.10.190+4 more2025-09-18
CVE-2023-53369 [MEDIUM] CVE-2023-53369: In the Linux kernel, the following vulnerability has been resolved: net: dcb: choose correct policy In the Linux kernel, the following vulnerability has been resolved: net: dcb: choose correct policy to parse DCB_ATTR_BCN The dcbnl_bcn_setcfg uses erroneous policy to parse tb[DCB_ATTR_BCN], which is introduced in commit 859ee3c43812 ("DCB: Add support for DCB BCN"). Please see the comment in below code static int dcbnl_bcn_setcfg(...) { ... ret = nla_p
nvdosv
CVE-2023-53419MEDIUMCVSS 5.5fixed in 5.10.181≥ 5.11, < 5.15.113+2 more2025-09-18
CVE-2023-53419 [MEDIUM] CWE-476 CVE-2023-53419: In the Linux kernel, the following vulnerability has been resolved: rcu: Protect rcu_print_task_exp In the Linux kernel, the following vulnerability has been resolved: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access For kernels built with CONFIG_PREEMPT_RCU=y, the following scenario can result in a NULL-pointer dereference: CPU1 CPU2 rcu_preempt_deferred_qs_irqrestore rcu_print_task_exp_stall if (special.b.blocked) READ_ONCE(rnp->exp
nvdosv
CVE-2022-50392MEDIUMCVSS 5.5≥ 5.2, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-09-18
CVE-2022-50392 [MEDIUM] CVE-2022-50392: In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8183: fix ref In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8183: fix refcount leak in mt8183_mt6358_ts3a227_max98357_dev_probe() The node returned by of_parse_phandle() with refcount incremented, of_node_put() needs be called when finish using it. So add it in the error path in mt8183_mt6358_ts3a227_max98357_dev_probe().
nvdosv
CVE-2023-53380MEDIUMCVSS 5.5≥ 4.20, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-09-18
CVE-2023-53380 [MEDIUM] CWE-476 CVE-2023-53380: In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix null-ptr-deref o In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request There are two check of 'mreplace' in raid10_sync_request(). In the first check, 'need_replace' will be set and 'mreplace' will be used later if no-Faulty 'mreplace' exists, In the second check, 'mreplace' will be set
nvdosv
CVE-2022-50381MEDIUMCVSS 5.5fixed in 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-18
CVE-2022-50381 [MEDIUM] CWE-476 CVE-2022-50381: In the Linux kernel, the following vulnerability has been resolved: md: fix a crash in mempool_free In the Linux kernel, the following vulnerability has been resolved: md: fix a crash in mempool_free There's a crash in mempool_free when running the lvm test shell/lvchange-rebuild-raid.sh. The reason for the crash is this: * super_written calls atomic_dec_and_test(&mddev->pending_writes) and wake_up(&mddev->sb_wait). Then it calls rdev_dec_pendi
nvdosv
CVE-2023-53401MEDIUMCVSS 4.7≥ 5.9, < 6.1.45≥ 6.2, < 6.4.102025-09-18
CVE-2023-53401 [MEDIUM] CWE-476 CVE-2023-53401: In the Linux kernel, the following vulnerability has been resolved: mm: kmem: fix a NULL pointer de In the Linux kernel, the following vulnerability has been resolved: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() KCSAN found an issue in obj_stock_flush_required(): stock->cached_objcg can be reset between the check and dereference: BUG: KCSAN: data-race in drain_all_stock / drain_obj_stock write to 0xffff888237c2a2f8 o
nvdosv
CVE-2023-53375MEDIUMCVSS 5.5≥ 5.2, < 5.4.241≥ 5.5, < 5.10.178+4 more2025-09-18
CVE-2023-53375 [MEDIUM] CWE-401 CVE-2023-53375: In the Linux kernel, the following vulnerability has been resolved: tracing: Free error logs of tra In the Linux kernel, the following vulnerability has been resolved: tracing: Free error logs of tracing instances When a tracing instance is removed, the error messages that hold errors that occurred in the instance needs to be freed. The following reports a memory leak: # cd /sys/kernel/tracing # mkdir instances/foo # echo 'hist:keys=x' > instan
nvdosv
CVE-2023-53434MEDIUMCVSS 5.5≥ 5.16, < 6.1.30≥ 6.2, < 6.3.42025-09-18
CVE-2023-53434 [MEDIUM] CVE-2023-53434: In the Linux kernel, the following vulnerability has been resolved: remoteproc: imx_dsp_rproc: Add In the Linux kernel, the following vulnerability has been resolved: remoteproc: imx_dsp_rproc: Add custom memory copy implementation for i.MX DSP Cores The IRAM is part of the HiFi DSP. According to hardware specification only 32-bits write are allowed otherwise we get a Kernel panic. Therefore add a custom memory copy and memset functions to deal with th
nvdosv
CVE-2023-53429MEDIUMCVSS 5.5fixed in 6.4.72025-09-18
CVE-2023-53429 [MEDIUM] CVE-2023-53429: In the Linux kernel, the following vulnerability has been resolved: btrfs: don't check PageError in In the Linux kernel, the following vulnerability has been resolved: btrfs: don't check PageError in __extent_writepage __extent_writepage currenly sets PageError whenever any error happens, and the also checks for PageError to decide if to call error handling. This leads to very unclear responsibility for cleaning up on errors. In the VM and generic write
nvdosv
CVE-2022-50397UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-09-18
CVE-2022-50397 CVE-2022-50397: In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: reject zero-sized raw_sendmsg() syzbot is hitting skb_assert_len() In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: reject zero-sized raw_sendmsg() syzbot is hitting skb_assert_len() warning at raw_sendmsg() for ieee802154 socket. What commit dc633700f00f726e ("net/af_packet: check len when min_header_len equals to 0") does also applies to ieee8021
osv
CVE-2022-50377UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-09-18
CVE-2022-50377 CVE-2022-50377: In the Linux kernel, the following vulnerability has been resolved: ext4: check and assert if marking an no_delete evicting inode dirty In ext4_evic In the Linux kernel, the following vulnerability has been resolved: ext4: check and assert if marking an no_delete evicting inode dirty In ext4_evict_inode(), if we evicting an inode in the 'no_delete' path, it cannot be raced by another mark_inode_dirty(). If it happens, someone else may accidentally dirty it with
osv
CVE-2022-50403UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-09-18
CVE-2022-50403 CVE-2022-50403: In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting si In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning calltrace like below: UBSAN: shift-out-of-bounds in fs/ext4/ext4.
osv
CVE-2023-53358HIGHCVSS 7.0≥ 5.15, < 5.15.145≥ 5.16, < 6.1.28+2 more2025-09-17
CVE-2023-53358 [HIGH] CWE-416 CVE-2023-53358: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue under coc In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue under cocurrent smb2 tree disconnect There is UAF issue under cocurrent smb2 tree disconnect. This patch introduce TREE_CONN_EXPIRE flags for tcon to avoid cocurrent access.
nvdosv
CVE-2023-53338HIGHCVSS 7.8≥ 4.10, < 5.4.257≥ 5.5, < 5.10.195+4 more2025-09-17
CVE-2023-53338 [HIGH] CWE-416 CVE-2023-53338: In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF x In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF xmit ops BPF encap ops can return different types of positive values, such like NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return values would be treated implicitly
nvdosv