Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 166 of 745
CVE-2023-53317MEDIUMCVSS 5.5fixed in 4.19.283≥ 4.20, < 5.4.243+6 more2025-09-16
CVE-2023-53317 [MEDIUM] CVE-2023-53317: In the Linux kernel, the following vulnerability has been resolved: ext4: fix WARNING in mb_find_ex In the Linux kernel, the following vulnerability has been resolved: ext4: fix WARNING in mb_find_extent Syzbot found the following issue: EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! EXT4-fs (loop0): orphan cleanup on readonly fs ------------[ cut here ]------------ WARNING: C
nvdosv
CVE-2023-53334MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-16
CVE-2023-53334 [MEDIUM] CWE-401 CVE-2023-53334: In the Linux kernel, the following vulnerability has been resolved: USB: chipidea: fix memory leak In the Linux kernel, the following vulnerability has been resolved: USB: chipidea: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once.
nvdosv
CVE-2023-53273MEDIUMCVSS 5.5≥ 5.8, < 5.10.178≥ 5.11, < 5.15.107+3 more2025-09-16
CVE-2023-53273 [MEDIUM] CWE-476 CVE-2023-53273: In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for chann In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for channel allocation before looking up relids relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a
nvdosv
CVE-2023-53271MEDIUMCVSS 5.5≥ 4.9, < 4.14.308≥ 4.15, < 4.19.276+5 more2025-09-16
CVE-2023-53271 [MEDIUM] CWE-401 CVE-2023-53271: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix unreferenced object re In the Linux kernel, the following vulnerability has been resolved: ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() There is a memory leaks problem reported by kmemleak: unreferenced object 0xffff888102007a00 (size 128): comm "ubirsvol", pid 32090, jiffies 4298464136 (age 2361.231s) hex dump (first 32 bytes): ff ff ff ff
nvdosv
CVE-2023-53279MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-16
CVE-2023-53279 [MEDIUM] CWE-401 CVE-2023-53279: In the Linux kernel, the following vulnerability has been resolved: misc: vmw_balloon: fix memory l In the Linux kernel, the following vulnerability has been resolved: misc: vmw_balloon: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at
nvdosv
CVE-2025-39825MEDIUMCVSS 4.7≥ 5.13, < 6.1.150≥ 6.2, < 6.6.104+3 more2025-09-16
CVE-2025-39825 [MEDIUM] CWE-362 CVE-2025-39825: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with conc In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for outstanding I/O to complete as well as marking all existing open handles as deleted to prevent them f
nvdosv
CVE-2023-53278MEDIUMCVSS 5.5≥ 5.17, < 6.1.18≥ 6.2, < 6.2.52025-09-16
CVE-2023-53278 [MEDIUM] CWE-401 CVE-2023-53278: In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in ubifs In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in ubifs_sysfs_init() When insmod ubifs.ko, a kmemleak reported as below: unreferenced object 0xffff88817fb1a780 (size 8): comm "insmod", pid 25265, jiffies 4295239702 (age 100.130s) hex dump (first 8 bytes): 75 62 69 66 73 00 ff ff ubifs... backtrace: [] s
nvdosv
CVE-2023-53315MEDIUMCVSS 5.5≥ 5.6, < 5.10.181≥ 5.11, < 5.15.113+2 more2025-09-16
CVE-2023-53315 [MEDIUM] CWE-401 CVE-2023-53315: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix SKB corruptio In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix SKB corruption in REO destination ring While running traffics for a long time, randomly an RX descriptor filled with value "0" from REO destination ring is received. This descriptor which is invalid causes the wrong SKB (SKB stored in the IDR lookup with buffer i
nvdosv
CVE-2025-39808MEDIUMCVSS 5.5≥ 2.6.37, < 5.4.298≥ 5.5, < 5.10.242+6 more2025-09-16
CVE-2025-39808 [MEDIUM] CVE-2025-39808: In the Linux kernel, the following vulnerability has been resolved: HID: hid-ntrig: fix unable to h In the Linux kernel, the following vulnerability has been resolved: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() in ntrig_report_version(), hdev parameter passed from hid_probe(). sending descriptor to /dev/uhid can make hdev->dev.parent->parent to null if hdev->dev.parent->parent is null, usb_dev has invalid address(0xfffffff
nvdosv
CVE-2023-53332MEDIUMCVSS 5.5≥ 4.6, < 6.1.18≥ 6.2, < 6.2.52025-09-16
CVE-2023-53332 [MEDIUM] CWE-476 CVE-2023-53332: In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer de In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() If ipi_send_{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipi_send_verify() which is invoked from these functions does verify its 'data' parameter, resultin
nvdosv
CVE-2023-53329MEDIUMCVSS 4.7≥ 6.5, < 6.5.32025-09-16
CVE-2023-53329 [MEDIUM] CWE-362 CVE-2023-53329: In the Linux kernel, the following vulnerability has been resolved: workqueue: fix data race with t In the Linux kernel, the following vulnerability has been resolved: workqueue: fix data race with the pwq->stats[] increment KCSAN has discovered a data race in kernel/workqueue.c:2598: [ 1863.554079] ================================================================== [ 1863.554118] BUG: KCSAN: data-race in process_one_work / process_one_work [ 1
nvdosv
CVE-2023-53268MEDIUMCVSS 5.5≥ 5.5, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-09-16
CVE-2023-53268 [MEDIUM] CVE-2023-53268: In the Linux kernel, the following vulnerability has been resolved: ASoC: fsl_mqs: move of_node_put In the Linux kernel, the following vulnerability has been resolved: ASoC: fsl_mqs: move of_node_put() to the correct location of_node_put() should have been done directly after mqs_priv->regmap = syscon_node_to_regmap(gpr_np); otherwise it creates a reference leak on the success path. To fix this, of_node_put() is moved to the correct location, and chang
nvdosv
CVE-2023-53297MEDIUMCVSS 5.5fixed in 4.14.316≥ 4.15, < 4.19.284+5 more2025-09-16
CVE-2023-53297 [MEDIUM] CVE-2023-53297: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlo In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp conn->chan_lock isn't acquired before l2cap_get_chan_by_scid, if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance' is triggered.
nvdosv
CVE-2023-53281MEDIUMCVSS 5.5≥ 5.15.47, < 5.15.111≥ 5.17.15, < 5.18+3 more2025-09-16
CVE-2023-53281 [MEDIUM] CWE-667 CVE-2023-53281: In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8723bs: Fi In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() Commit 041879b12ddb ("drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle()") besides fixing the deadlock also modified _rtw_join_timeout_handler() to use spin_[un]lock_irq() instead of sp
nvdosv
CVE-2023-53277MEDIUMCVSS 5.5≥ 2.6.24, < 4.19.276≥ 4.20, < 5.4.235+4 more2025-09-16
CVE-2023-53277 [MEDIUM] CWE-476 CVE-2023-53277: In the Linux kernel, the following vulnerability has been resolved: wifi: iwl3945: Add missing chec In the Linux kernel, the following vulnerability has been resolved: wifi: iwl3945: Add missing check for create_singlethread_workqueue Add the check for the return value of the create_singlethread_workqueue in order to avoid NULL pointer dereference.
nvdosv
CVE-2025-39827MEDIUMCVSS 5.5≥ 2.6.12.1, < 6.1.150≥ 6.2, < 6.6.104+4 more2025-09-16
CVE-2025-39827 [MEDIUM] CVE-2025-39827: In the Linux kernel, the following vulnerability has been resolved: net: rose: include node referen In the Linux kernel, the following vulnerability has been resolved: net: rose: include node references in rose_neigh refcount Current implementation maintains two separate reference counting mechanisms: the 'count' field in struct rose_neigh tracks references from rose_node structures, while the 'use' field (now refcount_t) tracks references from rose_soc
nvdosv
CVE-2023-53284MEDIUMCVSS 5.5≥ 5.19, < 6.1.16≥ 6.2, < 6.2.32025-09-16
CVE-2023-53284 [MEDIUM] CWE-476 CVE-2023-53284: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null ret In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() Because of the possilble failure of devm_kzalloc(), dpu_wb_conn might be NULL and will cause null pointer dereference later. Therefore, it might be better to check it and directly return -ENOMEM. Patchw
nvdosv
CVE-2025-39829MEDIUMCVSS 5.5≥ 2.6.30, < 6.12.45≥ 6.13, < 6.16.5+1 more2025-09-16
CVE-2025-39829 [MEDIUM] CVE-2025-39829: In the Linux kernel, the following vulnerability has been resolved: trace/fgraph: Fix the warning c In the Linux kernel, the following vulnerability has been resolved: trace/fgraph: Fix the warning caused by missing unregister notifier This warning was triggered during testing on v6.16: notifier callback ftrace_suspend_notifier_call already registered WARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0 ... Call Trace: blo
nvdosv
CVE-2025-39813MEDIUMCVSS 4.7≥ 2.6.28, < 5.4.298≥ 5.5, < 5.10.242+6 more2025-09-16
CVE-2025-39813 [MEDIUM] CWE-362 CVE-2025-39813: In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix potential warning i In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump When calling ftrace_dump_one() concurrently with reading trace_pipe, a WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race condition. The issue occurs because: CPU0 (ftrace_dump) CPU1 (reader) e
nvdosv
CVE-2022-50342MEDIUMCVSS 5.5≥ 5.11, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-09-16
CVE-2022-50342 [MEDIUM] CWE-401 CVE-2022-50342: In the Linux kernel, the following vulnerability has been resolved: floppy: Fix memory leak in do_f In the Linux kernel, the following vulnerability has been resolved: floppy: Fix memory leak in do_floppy_init() A memory leak was reported when floppy_alloc_disk() failed in do_floppy_init(). unreferenced object 0xffff888115ed25a0 (size 8): comm "modprobe", pid 727, jiffies 4295051278 (age 25.529s) hex dump (first 8 bytes): 00 ac 67 5b 81 88 ff f
nvdosv