Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 165 of 745
CVE-2023-53266MEDIUMCVSS 5.5≥ 6.2, < 6.2.32025-09-16
CVE-2023-53266 [MEDIUM] CWE-401 CVE-2023-53266: In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Fix possible memor In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Fix possible memory leak of ffh_ctxt Allocated 'ffh_ctxt' memory leak is possible if the SMCCC version and conduit checks fail and -EOPNOTSUPP is returned without freeing the allocated memory. Fix the same by moving the allocation after the SMCCC version and conduit
nvdosv
CVE-2025-39820MEDIUMCVSS 5.5≥ 6.15, < 6.16.5v6.172025-09-16
CVE-2025-39820 [MEDIUM] CWE-476 CVE-2025-39820: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr che In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset The drm_atomic_get_new_connector_state() can return NULL if the connector is not part of the atomic state. Add a check to prevent a NULL pointer dereference. This follows the same pattern used in dpu_encoder_update_t
nvdosv
CVE-2023-53306MEDIUMCVSS 5.5≥ 6.2, < 6.2.11v6.32025-09-16
CVE-2023-53306 [MEDIUM] CVE-2023-53306: In the Linux kernel, the following vulnerability has been resolved: fsdax: force clear dirty mark i In the Linux kernel, the following vulnerability has been resolved: fsdax: force clear dirty mark if CoW XFS allows CoW on non-shared extents to combat fragmentation[1]. The old non-shared extent could be mwrited before, its dax entry is marked dirty. This results in a WARNing: [ 28.512349] ------------[ cut here ]------------ [ 28.512622] WARNING: CPU:
nvdosv
CVE-2025-39834MEDIUMCVSS 5.5≥ 6.12, < 6.16.5v6.172025-09-16
CVE-2025-39834 [MEDIUM] CWE-401 CVE-2025-39834: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow When an invalid stc_type is provided, the function allocates memory for shared_stc but jumps to unlock_and_out without freeing it, causing a memory leak. Fix by jumping to free_shared_stc label instead to e
nvdosv
CVE-2023-53310MEDIUMCVSS 4.7≥ 5.18, < 6.1.31≥ 6.2, < 6.3.5+1 more2025-09-16
CVE-2023-53310 [MEDIUM] CWE-362 CVE-2023-53310: In the Linux kernel, the following vulnerability has been resolved: power: supply: axp288_fuel_gaug In the Linux kernel, the following vulnerability has been resolved: power: supply: axp288_fuel_gauge: Fix external_power_changed race fuel_gauge_external_power_changed() dereferences info->bat, which gets sets in axp288_fuel_gauge_probe() like this: info->bat = devm_power_supply_register(dev, &fuel_gauge_desc, &psy_cfg); As soon as devm_power_su
nvdosv
CVE-2022-50347MEDIUMCVSS 5.5≥ 3.16, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-16
CVE-2022-50347 [MEDIUM] CWE-476 CVE-2022-50347: In the Linux kernel, the following vulnerability has been resolved: mmc: rtsx_usb_sdmmc: fix return In the Linux kernel, the following vulnerability has been resolved: mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So f
nvdosv
CVE-2023-53264MEDIUMCVSS 5.5≥ 5.18, < 6.1.39≥ 6.2, < 6.3.13+1 more2025-09-16
CVE-2023-53264 [MEDIUM] CWE-401 CVE-2023-53264: In the Linux kernel, the following vulnerability has been resolved: clk: imx: clk-imxrt1050: fix me In the Linux kernel, the following vulnerability has been resolved: clk: imx: clk-imxrt1050: fix memory leak in imxrt1050_clocks_probe Use devm_of_iomap() instead of of_iomap() to automatically handle the unused ioremap region. If any error occurs, regions allocated by kzalloc() will leak, but using devm_kzalloc() instead will automatically free t
nvdosv
CVE-2023-53323MEDIUMCVSS 5.5≥ 5.15, < 6.1.40≥ 6.2, < 6.4.52025-09-16
CVE-2023-53323 [MEDIUM] CWE-617 CVE-2023-53323: In the Linux kernel, the following vulnerability has been resolved: ext2/dax: Fix ext2_setsize when In the Linux kernel, the following vulnerability has been resolved: ext2/dax: Fix ext2_setsize when len is page aligned PAGE_ALIGN(x) macro gives the next highest value which is multiple of pagesize. But if x is already page aligned then it simply returns x. So, if x passed is 0 in dax_zero_range() function, that means the length gets passed as 0
nvdosv
CVE-2025-39814MEDIUMCVSS 5.5≥ 6.16, < 6.16.5v6.172025-09-16
CVE-2025-39814 [MEDIUM] CWE-476 CVE-2025-39814: In the Linux kernel, the following vulnerability has been resolved: ice: fix NULL pointer dereferen In the Linux kernel, the following vulnerability has been resolved: ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset Issuing a reset when the driver is loaded without RDMA support, will results in a crash as it attempts to remove RDMA's non-existent auxbus device: echo 1 > /sys/class/net//device/reset BUG: kernel NULL pointer de
nvdosv
CVE-2023-53280MEDIUMCVSS 5.5≥ 4.14, < 5.4.251≥ 5.5, < 5.10.188+3 more2025-09-16
CVE-2023-53280 [MEDIUM] CWE-476 CVE-2023-53280: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Remove unused nv In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue System crash when qla2x00_start_sp(sp) returns error code EGAIN and wake_up gets called for uninitialized wait queue sp->nvme_ls_waitq. qla2xxx [0000:37:00.1]-2121:5: Returning existing qpair of ffff8ae2c0513400 for idx=0 qla2
nvdosv
CVE-2023-53295MEDIUMCVSS 5.5fixed in 4.14.308≥ 4.15, < 4.19.276+5 more2025-09-16
CVE-2023-53295 [MEDIUM] CVE-2023-53295: In the Linux kernel, the following vulnerability has been resolved: udf: Do not update file length In the Linux kernel, the following vulnerability has been resolved: udf: Do not update file length for failed writes to inline files When write to inline file fails (or happens only partly), we still updated length of inline data as if the whole write succeeded. Fix the update of length of inline data to happen only if the write succeeds.
nvdosv
CVE-2025-39812MEDIUMCVSS 5.5≥ 2.6.12.1, < 5.4.298≥ 5.5, < 5.10.242+7 more2025-09-16
CVE-2025-39812 [MEDIUM] CWE-908 CVE-2025-39812: In the Linux kernel, the following vulnerability has been resolved: sctp: initialize more fields in In the Linux kernel, the following vulnerability has been resolved: sctp: initialize more fields in sctp_v6_from_sk() syzbot found that sin6_scope_id was not properly initialized, leading to undefined behavior. Clear sin6_scope_id and sin6_flowinfo. BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649 __sctp_v6_cmp_addr
nvdosv
CVE-2025-39830MEDIUMCVSS 5.5≥ 6.12, < 6.16.5v6.172025-09-16
CVE-2025-39830 [MEDIUM] CWE-401 CVE-2025-39830: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path In the error path of hws_pool_buddy_init(), the buddy allocator cleanup doesn't free the allocator structure itself, causing a memory leak. Add the missing kfree() to properly release all allocated memory.
nvdosv
CVE-2022-50341MEDIUMCVSS 5.5fixed in 5.4.229≥ 5.5, < 5.10.163+3 more2025-09-16
CVE-2022-50341 [MEDIUM] CVE-2022-50341: In the Linux kernel, the following vulnerability has been resolved: cifs: fix oops during encryptio In the Linux kernel, the following vulnerability has been resolved: cifs: fix oops during encryption When running xfstests against Azure the following oops occurred on an arm64 system Unable to handle kernel write to read-only memory at virtual address ffff0001221cf000 Mem abort info: ESR = 0x9600004f EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, F
nvdosv
CVE-2022-50344MEDIUMCVSS 5.5fixed in 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-16
CVE-2022-50344 [MEDIUM] CWE-476 CVE-2022-50344: In the Linux kernel, the following vulnerability has been resolved: ext4: fix null-ptr-deref in ext In the Linux kernel, the following vulnerability has been resolved: ext4: fix null-ptr-deref in ext4_write_info I caught a null-ptr-deref bug as follows: KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 1 PID: 1589 Comm: umount Not tainted 5.10.0-02219-dirty #339 RIP: 0010:ext4_write_info+0x53/0x1b0 [...] Call Trace: dqu
nvdosv
CVE-2023-53330MEDIUMCVSS 5.5≥ 2.6.35, < 4.14.303≥ 4.15, < 4.19.270+6 more2025-09-16
CVE-2023-53330 [MEDIUM] CWE-401 CVE-2023-53330: In the Linux kernel, the following vulnerability has been resolved: caif: fix memory leak in cfctrl In the Linux kernel, the following vulnerability has been resolved: caif: fix memory leak in cfctrl_linkup_request() When linktype is unknown or kzalloc failed in cfctrl_linkup_request(), pkt is not released. Add release process to error path.
nvdosv
CVE-2025-39822MEDIUMCVSS 5.5≥ 6.12, < 6.16.5v6.172025-09-16
CVE-2025-39822 [MEDIUM] CVE-2025-39822: In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: fix signedness i In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: fix signedness in this_len calculation When importing and using buffers, buf->len is considered unsigned. However, buf->len is converted to signed int when committing. This can lead to unexpected behavior if the buffer is large enough to be interpreted as a negative value.
nvdosv
CVE-2023-53298MEDIUMCVSS 5.5≥ 3.13, < 4.14.308≥ 4.15, < 4.19.276+5 more2025-09-16
CVE-2023-53298 [MEDIUM] CWE-401 CVE-2023-53298: In the Linux kernel, the following vulnerability has been resolved: nfc: fix memory leak of se_io c In the Linux kernel, the following vulnerability has been resolved: nfc: fix memory leak of se_io context in nfc_genl_se_io The callback context for sending/receiving APDUs to/from the selected secure element is allocated inside nfc_genl_se_io and supposed to be eventually freed in se_io_cb callback function. However, there are several error paths
nvdosv
CVE-2023-53288MEDIUMCVSS 5.5fixed in 5.4.251≥ 5.5, < 5.10.188+4 more2025-09-16
CVE-2023-53288 [MEDIUM] CWE-401 CVE-2023-53288: In the Linux kernel, the following vulnerability has been resolved: drm/client: Fix memory leak in In the Linux kernel, the following vulnerability has been resolved: drm/client: Fix memory leak in drm_client_modeset_probe When a new mode is set to modeset->mode, the previous mode should be freed. This fixes the following kmemleak report: drm_mode_duplicate+0x45/0x220 [drm] drm_client_modeset_probe+0x944/0xf50 [drm] __drm_fb_helper_initial_conf
nvdosv
CVE-2023-53326MEDIUMCVSS 5.5≥ 4.8, < 5.10.177≥ 5.11, < 5.15.106+3 more2025-09-16
CVE-2023-53326 [MEDIUM] CWE-476 CVE-2023-53326: In the Linux kernel, the following vulnerability has been resolved: powerpc: Don't try to copy PPR In the Linux kernel, the following vulnerability has been resolved: powerpc: Don't try to copy PPR for task with NULL pt_regs powerpc sets up PF_KTHREAD and PF_IO_WORKER with a NULL pt_regs, which from my (arguably very short) checking is not commonly done for other archs. This is fine, except when PF_IO_WORKER's have been created and the task does
nvdosv