Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 163 of 745
CVE-2025-39823HIGHCVSS 7.8≥ 4.19, < 5.4.298≥ 5.5, < 5.10.242+6 more2025-09-16
CVE-2025-39823 [HIGH] CWE-129 CVE-2025-39823: In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospe In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.
nvdosv
CVE-2025-39826HIGHCVSS 7.0≥ 2.6.12.1, < 6.1.150≥ 6.2, < 6.6.104+4 more2025-09-16
CVE-2025-39826 [HIGH] CWE-416 CVE-2025-39826: In the Linux kernel, the following vulnerability has been resolved: net: rose: convert 'use' field In the Linux kernel, the following vulnerability has been resolved: net: rose: convert 'use' field to refcount_t The 'use' field in struct rose_neigh is used as a reference counter but lacks atomicity. This can lead to race conditions where a rose_neigh structure is freed while still being referenced by other code paths. For example, when rose_neigh
nvdosv
CVE-2023-53285HIGHCVSS 7.8fixed in 4.14.315≥ 4.15, < 4.19.283+7 more2025-09-16
CVE-2023-53285 [HIGH] CVE-2023-53285: In the Linux kernel, the following vulnerability has been resolved: ext4: add bounds checking in ge In the Linux kernel, the following vulnerability has been resolved: ext4: add bounds checking in get_max_inline_xattr_value_size() Normally the extended attributes in the inode body would have been checked when the inode is first opened, but if someone is writing to the block device while the file system is mounted, it's possible for the inode table to get
nvdosv
CVE-2023-53320HIGHCVSS 7.8≥ 5.19, < 6.1.16≥ 6.2, < 6.2.32025-09-16
CVE-2023-53320 [HIGH] CWE-787 CVE-2023-53320: In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix issues in mpi In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() The function mpi3mr_get_all_tgt_info() has four issues: 1) It calculates valid entry length in alltgt_info assuming the header part of the struct mpi3mr_device_map_info would equal to sizeof(u32). The correct size is sizeof(u64)
nvdosv
CVE-2025-39836HIGHCVSS 7.8≥ 6.8, < 6.12.45≥ 6.13, < 6.16.5+1 more2025-09-16
CVE-2025-39836 [HIGH] CWE-787 CVE-2025-39836: In the Linux kernel, the following vulnerability has been resolved: efi: stmm: Fix incorrect buffer In the Linux kernel, the following vulnerability has been resolved: efi: stmm: Fix incorrect buffer allocation method The communication buffer allocated by setup_mm_hdr() is later on passed to tee_shm_register_kernel_buf(). The latter expects those buffers to be contiguous pages, but setup_mm_hdr() just uses kmalloc(). That can cause various corrupt
nvdosv
CVE-2023-53269MEDIUMCVSS 5.5≥ 6.0, < 6.1.24≥ 6.2, < 6.2.11+1 more2025-09-16
CVE-2023-53269 [MEDIUM] CVE-2023-53269: In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that blo In the Linux kernel, the following vulnerability has been resolved: block: ublk: make sure that block size is set correctly block size is one very key setting for block layer, and bad block size could panic kernel easily. Make sure that block size is set correctly. Meantime if ublk_validate_params() fails, clear ub->params so that disk is prevented from
nvdosv
CVE-2023-53267MEDIUMCVSS 5.5≥ 5.19, < 6.1.18≥ 6.2, < 6.2.52025-09-16
CVE-2023-53267 [MEDIUM] CWE-401 CVE-2023-53267: In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: fix memory In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: fix memory leak in xlnx_add_cb_for_notify_event() The kfree() should be called when memory fails to be allocated for cb_data in xlnx_add_cb_for_notify_event(), otherwise there will be a memory leak, so add kfree() to fix it.
nvdosv
CVE-2022-50340MEDIUMCVSS 5.5≥ 4.13, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-09-16
CVE-2022-50340 [MEDIUM] CWE-617 CVE-2022-50340: In the Linux kernel, the following vulnerability has been resolved: media: vimc: Fix wrong function In the Linux kernel, the following vulnerability has been resolved: media: vimc: Fix wrong function called when vimc_init() fails In vimc_init(), when platform_driver_register(&vimc_pdrv) fails, platform_driver_unregister(&vimc_pdrv) is wrongly called rather than platform_device_unregister(&vimc_pdev), which causes kernel warning: Unexpected driv
nvdosv
CVE-2023-53292MEDIUMCVSS 5.5fixed in 6.4.72025-09-16
CVE-2023-53292 [MEDIUM] CWE-476 CVE-2023-53292: In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix NULL dereference on In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix NULL dereference on q->elevator in blk_mq_elv_switch_none After grabbing q->sysfs_lock, q->elevator may become NULL because of elevator switch. Fix the NULL dereference on q->elevator by checking it with lock.
nvdosv
CVE-2023-53296MEDIUMCVSS 5.5≥ 4.15, < 4.19.281≥ 4.20, < 5.4.241+5 more2025-09-16
CVE-2023-53296 [MEDIUM] CWE-476 CVE-2023-53296: In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number after wait_for_sndbuf This patch fixes a corner case where the asoc out stream count may change after wait_for_sndbuf. When the main thread in the client starts a connection, if its out stream count is set to N while the in stream count in the server
nvdosv
CVE-2023-53328MEDIUMCVSS 5.5≥ 5.15, < 5.15.128≥ 5.16, < 6.1.47+1 more2025-09-16
CVE-2023-53328 [MEDIUM] CWE-476 CVE-2023-53328: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Enhance sanity check In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Enhance sanity check while generating attr_list ni_create_attr_list uses WARN_ON to catch error cases while generating attribute list, which only prints out stack trace and may not be enough. This repalces them with more proper error handling flow. [ 59.666332] BUG: kern
nvdosv
CVE-2023-53318MEDIUMCVSS 5.5fixed in 4.14.316≥ 4.15, < 4.19.284+5 more2025-09-16
CVE-2023-53318 [MEDIUM] CWE-401 CVE-2023-53318: In the Linux kernel, the following vulnerability has been resolved: recordmcount: Fix memory leaks In the Linux kernel, the following vulnerability has been resolved: recordmcount: Fix memory leaks in the uwrite function Common realloc mistake: 'file_append' nulled but not freed upon failure
nvdosv
CVE-2022-50349MEDIUMCVSS 5.5≥ 2.6.22, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-16
CVE-2022-50349 [MEDIUM] CWE-401 CVE-2022-50349: In the Linux kernel, the following vulnerability has been resolved: misc: tifm: fix possible memory In the Linux kernel, the following vulnerability has been resolved: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() If device_register() returns error in tifm_7xx1_switch_media(), name of kobject which is allocated in dev_set_name() called in device_add() is leaked. Never directly free @dev after calling device_register(), even i
nvdosv
CVE-2025-39832MEDIUMCVSS 5.5≥ 6.5, < 6.6.104≥ 6.7, < 6.12.45+2 more2025-09-16
CVE-2025-39832 [MEDIUM] CWE-667 CVE-2025-39832: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix lockdep assertion In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix lockdep assertion on sync reset unload event Fix lockdep assertion triggered during sync reset unload event. When the sync reset flow is initiated using the devlink reload fw_activate option, the PF already holds the devlink lock while handling unload event. In this
nvdosv
CVE-2023-53300MEDIUMCVSS 5.5≥ 5.16, < 6.1.28≥ 6.2, < 6.2.15+1 more2025-09-16
CVE-2023-53300 [MEDIUM] CWE-401 CVE-2023-53300: In the Linux kernel, the following vulnerability has been resolved: media: hi846: Fix memleak in hi In the Linux kernel, the following vulnerability has been resolved: media: hi846: Fix memleak in hi846_init_controls() hi846_init_controls doesn't clean the allocated ctrl_hdlr in case there is a failure, which causes memleak. Add v4l2_ctrl_handler_free to free the resource properly.
nvdosv
CVE-2023-53276MEDIUMCVSS 5.5fixed in 4.14.315≥ 4.15, < 4.19.283+6 more2025-09-16
CVE-2023-53276 [MEDIUM] CWE-401 CVE-2023-53276: In the Linux kernel, the following vulnerability has been resolved: ubifs: Free memory for tmpfile In the Linux kernel, the following vulnerability has been resolved: ubifs: Free memory for tmpfile name When opening a ubifs tmpfile on an encrypted directory, function fscrypt_setup_filename allocates memory for the name that is to be stored in the directory entry, but after the name has been copied to the directory entry inode, the memory is not
nvdosv
CVE-2023-53319MEDIUMCVSS 5.5≥ 6.4, < 6.4.8v6.52025-09-16
CVE-2023-53319 [MEDIUM] CVE-2023-53319: In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Handle kvm_arm_init In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Handle kvm_arm_init failure correctly in finalize_pkvm Currently there is no synchronisation between finalize_pkvm() and kvm_arm_init() initcalls. The finalize_pkvm() proceeds happily even if kvm_arm_init() fails resulting in the following warning on all the CPUs and eventuall
nvdosv
CVE-2023-53302MEDIUMCVSS 5.5≥ 2.6.24, < 4.19.276≥ 4.20, < 5.4.235+4 more2025-09-16
CVE-2023-53302 [MEDIUM] CWE-476 CVE-2023-53302: In the Linux kernel, the following vulnerability has been resolved: wifi: iwl4965: Add missing chec In the Linux kernel, the following vulnerability has been resolved: wifi: iwl4965: Add missing check for create_singlethread_workqueue() Add the check for the return value of the create_singlethread_workqueue() in order to avoid NULL pointer dereference.
nvdosv
CVE-2022-50352MEDIUMCVSS 5.5≥ 4.4, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-09-16
CVE-2022-50352 [MEDIUM] CWE-401 CVE-2022-50352: In the Linux kernel, the following vulnerability has been resolved: net: hns: fix possible memory l In the Linux kernel, the following vulnerability has been resolved: net: hns: fix possible memory leak in hnae_ae_register() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in
nvdosv
CVE-2023-53291MEDIUMCVSS 5.5≥ 5.6, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-09-16
CVE-2023-53291 [MEDIUM] CVE-2023-53291: In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_ In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Running the 'kfree_rcu_test' test case [1] results in a splat [2]. The root cause is the kfree_scale_thread thread(s) continue running after unloading the rcuscale module. This commit fixes that isue by invoking kfre
nvdosv
Linux Kernel vulnerabilities | cvebase