Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 161 of 745
CVE-2023-53339MEDIUMCVSS 5.5fixed in 4.19.293≥ 4.20, < 5.4.255+5 more2025-09-17
CVE-2023-53339 [MEDIUM] CWE-617 CVE-2023-53339: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix BUG_ON condition in In the Linux kernel, the following vulnerability has been resolved: btrfs: fix BUG_ON condition in btrfs_cancel_balance Pausing and canceling balance can race to interrupt balance lead to BUG_ON panic in btrfs_cancel_balance. The BUG_ON condition in btrfs_cancel_balance does not take this race scenario into account. However, the race condition has
nvdosv
CVE-2023-53368MEDIUMCVSS 4.7≥ 3.10, < 5.4.257≥ 5.5, < 5.10.195+4 more2025-09-17
CVE-2023-53368 [MEDIUM] CWE-362 CVE-2023-53368: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race issue between In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race issue between cpu buffer write and swap Warning happened in rb_end_commit() at code: if (RB_WARN_ON(cpu_buffer, !local_read(&cpu_buffer->committing))) WARNING: CPU: 0 PID: 139 at kernel/trace/ring_buffer.c:3142 rb_commit+0x402/0x4a0 Call Trace: ring_buffer_unloc
nvdosv
CVE-2023-53344MEDIUMCVSS 5.5≥ 4.8, < 4.14.312≥ 4.15, < 4.19.280+6 more2025-09-17
CVE-2023-53344 [MEDIUM] CWE-908 CVE-2023-53344: In the Linux kernel, the following vulnerability has been resolved: can: bcm: bcm_tx_setup(): fix K In the Linux kernel, the following vulnerability has been resolved: can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write Syzkaller reported the following issue: BUG: KMSAN: uninit-value in aio_rw_done fs/aio.c:1520 [inline] BUG: KMSAN: uninit-value in aio_write+0x899/0x950 fs/aio.c:1600 aio_rw_done fs/aio.c:1520 [inline] aio_write+0x899/
nvdosv
CVE-2023-53353MEDIUMCVSS 5.5≥ 5.1, < 6.3.42025-09-17
CVE-2023-53353 [MEDIUM] CWE-401 CVE-2023-53353: In the Linux kernel, the following vulnerability has been resolved: accel/habanalabs: postpone mem_ In the Linux kernel, the following vulnerability has been resolved: accel/habanalabs: postpone mem_mgr IDR destruction to hpriv_release() The memory manager IDR is currently destroyed when user releases the file descriptor. However, at this point the user context might be still held, and memory buffers might be still in use. Later on, calls to rel
nvdosv
CVE-2023-53362MEDIUMCVSS 5.5≥ 6.1, < 6.1.39≥ 6.2, < 6.4.42025-09-17
CVE-2023-53362 [MEDIUM] CVE-2023-53362: In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: don't assume child In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: don't assume child devices are all fsl-mc devices Changes in VFIO caused a pseudo-device to be created as child of fsl-mc devices causing a crash [1] when trying to bind a fsl-mc device to VFIO. Fix this by checking the device type when enumerating fsl-mc child devices. [1]
nvdosv
CVE-2022-50363MEDIUMCVSS 5.5≥ 6.0, < 6.0.6v6.12025-09-17
CVE-2022-50363 [MEDIUM] CWE-416 CVE-2022-50363: In the Linux kernel, the following vulnerability has been resolved: skmsg: pass gfp argument to all In the Linux kernel, the following vulnerability has been resolved: skmsg: pass gfp argument to alloc_sk_msg() syzbot found that alloc_sk_msg() could be called from a non sleepable context. sk_psock_verdict_recv() uses rcu_read_lock() protection. We need the callers to pass a gfp_t argument to avoid issues. syzbot report was: BUG: sleeping func
nvdosv
CVE-2022-50372MEDIUMCVSS 5.5≥ 5.16, < 6.0.6v6.12025-09-17
CVE-2022-50372 [MEDIUM] CWE-401 CVE-2022-50372: In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory leak when buil In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory leak when build ntlmssp negotiate blob failed There is a memory leak when mount cifs: unreferenced object 0xffff888166059600 (size 448): comm "mount.cifs", pid 51391, jiffies 4295596373 (age 330.596s) hex dump (first 32 bytes): fe 53 4d 42 40 00 00 00 00 00 00 00
nvdosv
CVE-2022-50357MEDIUMCVSS 5.5≥ 5.13, < 5.19.17≥ 6.0, < 6.0.32025-09-17
CVE-2022-50357 [MEDIUM] CWE-401 CVE-2022-50357: In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: fix some leaks In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: fix some leaks in probe The dwc3_get_properties() function calls: dwc->usb_psy = power_supply_get_by_name(usb_psy_name); so there is some additional clean up required on these error paths.
nvdosv
CVE-2022-50365MEDIUMCVSS 5.5≥ 4.9.194, < 4.9.337≥ 4.14.145, < 4.14.303+8 more2025-09-17
CVE-2022-50365 [MEDIUM] CVE-2022-50365: In the Linux kernel, the following vulnerability has been resolved: skbuff: Account for tail adjust In the Linux kernel, the following vulnerability has been resolved: skbuff: Account for tail adjustment during pull operations Extending the tail can have some unexpected side effects if a program uses a helper like BPF_FUNC_skb_pull_data to read partial content beyond the head skb headlen when all the skbs in the gso frag_list are linear with no head_fra
nvdosv
CVE-2022-50359MEDIUMCVSS 5.5fixed in 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-17
CVE-2022-50359 [MEDIUM] CWE-476 CVE-2022-50359: In the Linux kernel, the following vulnerability has been resolved: media: cx88: Fix a null-ptr-der In the Linux kernel, the following vulnerability has been resolved: media: cx88: Fix a null-ptr-deref bug in buffer_prepare() When the driver calls cx88_risc_buffer() to prepare the buffer, the function call may fail, resulting in a empty buffer and null-ptr-deref later in buffer_queue(). The following log can reveal it: [ 41.822762] general pro
nvdosv
CVE-2023-53346MEDIUMCVSS 5.5fixed in 5.4.235≥ 5.5, < 5.10.173+3 more2025-09-17
CVE-2023-53346 [MEDIUM] CWE-401 CVE-2023-53346: In the Linux kernel, the following vulnerability has been resolved: kernel/fail_function: fix memor In the Linux kernel, the following vulnerability has been resolved: kernel/fail_function: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic
nvdosv
CVE-2023-53349MEDIUMCVSS 5.5≥ 5.8, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-09-17
CVE-2023-53349 [MEDIUM] CWE-401 CVE-2023-53349: In the Linux kernel, the following vulnerability has been resolved: media: ov2740: Fix memleak in o In the Linux kernel, the following vulnerability has been resolved: media: ov2740: Fix memleak in ov2740_init_controls() There is a kmemleak when testing the media/i2c/ov2740.c with bpf mock device: unreferenced object 0xffff8881090e19e0 (size 16): comm "51-i2c-ov2740", pid 278, jiffies 4294781584 (age 23.613s) hex dump (first 16 bytes): 00 f3 7c
nvdosv
CVE-2023-53342MEDIUMCVSS 5.5≥ 6.1, < 6.1.46≥ 6.2, < 6.4.11+1 more2025-09-17
CVE-2023-53342 [MEDIUM] CVE-2023-53342: In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix han In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix handling IPv4 routes with nhid Fix handling IPv4 routes referencing a nexthop via its id by replacing calls to fib_info_nh() with fib_info_nhc(). Trying to add an IPv4 route referencing a nextop via nhid: $ ip link set up swp5 $ ip a a 10.0.0.1/24 dev swp5 $
nvdosv
CVE-2022-50360MEDIUMCVSS 5.5≥ 5.19, < 6.0.7v6.12025-09-17
CVE-2022-50360 [MEDIUM] CVE-2022-50360: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: fix aux-bus EP life In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: fix aux-bus EP lifetime Device-managed resources allocated post component bind must be tied to the lifetime of the aggregate DRM device or they will not necessarily be released when binding of the aggregate device is deferred. This can lead resource leaks or failure to bind t
nvdosv
CVE-2023-53322HIGHCVSS 7.8fixed in 4.14.322≥ 4.15, < 4.19.291+5 more2025-09-16
CVE-2023-53322 [HIGH] CWE-416 CVE-2023-53322: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Wait for io retu In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Wait for io return on terminate rport System crash due to use after free. Current code allows terminate_rport_io to exit before making sure all IOs has returned. For FCP-2 device, IO's can hang on in HW because driver has not tear down the session in FW at first sign
nvdosv
CVE-2023-53274HIGHCVSS 7.8≥ 6.4, < 6.4.10v6.52025-09-16
CVE-2023-53274 [HIGH] CWE-787 CVE-2023-53274: In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: mt8183: Add back In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: mt8183: Add back SSPM related clocks This reverts commit 860690a93ef23b567f781c1b631623e27190f101. On the MT8183, the SSPM related clocks were removed claiming a lack of usage. This however causes some issues when the driver was converted to the new simple-probe mech
nvdosv
CVE-2023-53316HIGHCVSS 7.8≥ 5.10, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-09-16
CVE-2023-53316 [HIGH] CWE-416 CVE-2023-53316: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources afte In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources after unregistering them The DP component's unbind operation walks through the submodules to unregister and clean things up. But if the unbind happens because the DP controller itself is being removed, all the memory for those submodules has just been free
nvdosv
CVE-2025-39824HIGHCVSS 7.8≥ 4.10, < 5.4.298≥ 5.5, < 5.10.242+6 more2025-09-16
CVE-2025-39824 [HIGH] CWE-416 CVE-2025-39824: In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAI In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called hidinput_connect() will eventually be called to set up the device with the input layer since the HID_CONNECT_DEFAULT connect mask is used. During hidinput_connect() all input and output reports are pr
nvdosv
CVE-2023-53282HIGHCVSS 7.8fixed in 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-16
CVE-2023-53282 [HIGH] CWE-416 CVE-2023-53282: In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix use-after-free In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write During the sysfs firmware write process, a use-after-free read warning is logged from the lpfc_wr_object() routine: BUG: KFENCE: use-after-free read in lpfc_wr_object+0x235/0x310 [lpfc] Use-after-free read a
nvdosv
CVE-2023-53333HIGHCVSS 7.1≥ 2.6.26, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-09-16
CVE-2023-53333 [HIGH] CWE-125 CVE-2023-53333: In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: dccp: cop In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one Eric Dumazet says: nf_conntrack_dccp_packet() has an unique: dh = skb_header_pointer(skb, dataoff, sizeof(_dh), &_dh); And nothing more is 'pulled' from the packet, depending on the content. dh->dcc
nvdosv