Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 173 of 745
CVE-2023-53185MEDIUMCVSS 5.5≥ 2.6.35, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-09-15
CVE-2023-53185 [MEDIUM] CVE-2023-53185: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: don't allow to ove
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.
Reject such se
nvdosv
CVE-2022-50277MEDIUMCVSS 5.5≥ 5.18, < 6.0.18≥ 6.1, < 6.1.42025-09-15
CVE-2022-50277 [MEDIUM] CWE-476 CVE-2022-50277: In the Linux kernel, the following vulnerability has been resolved:
ext4: don't allow journal inode
In the Linux kernel, the following vulnerability has been resolved:
ext4: don't allow journal inode to have encrypt flag
Mounting a filesystem whose journal inode has the encrypt flag causes a
NULL dereference in fscrypt_limit_io_blocks() when the 'inlinecrypt'
mount option is used.
The problem is that when jbd2_journal_init_inode() calls bmap(),
nvdosv
CVE-2023-53190MEDIUMCVSS 5.5≥ 5.18, < 6.0.19≥ 6.1, < 6.1.5+1 more2025-09-15
CVE-2023-53190 [MEDIUM] CWE-401 CVE-2023-53190: In the Linux kernel, the following vulnerability has been resolved:
vxlan: Fix memory leaks in erro
In the Linux kernel, the following vulnerability has been resolved:
vxlan: Fix memory leaks in error path
The memory allocated by vxlan_vnigroup_init() is not freed in the error
path, leading to memory leaks [1]. Fix by calling
vxlan_vnigroup_uninit() in the error path.
The leaks can be reproduced by annotating gro_cells_init() with
ALLOW_ERROR_I
nvdosv
CVE-2023-53198MEDIUMCVSS 5.5≥ 5.18.18, < 5.19≥ 5.19.2, < 6.1.24+2 more2025-09-15
CVE-2023-53198 [MEDIUM] CWE-476 CVE-2023-53198: In the Linux kernel, the following vulnerability has been resolved:
raw: Fix NULL deref in raw_get_
In the Linux kernel, the following vulnerability has been resolved:
raw: Fix NULL deref in raw_get_next().
Dae R. Jeong reported a NULL deref in raw_get_next() [0].
It seems that the repro was running these sequences in parallel so
that one thread was iterating on a socket that was being freed in
another netns.
unshare(0x40060200)
r0 = syz_open_
nvdosv
CVE-2023-53221MEDIUMCVSS 5.5≥ 5.10.28, < 5.11≥ 5.11.11, < 5.12+4 more2025-09-15
CVE-2023-53221 [MEDIUM] CWE-401 CVE-2023-53221: In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix memleak due to fentry
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix memleak due to fentry attach failure
If it fails to attach fentry, the allocated bpf trampoline image will be
left in the system. That can be verified by checking /proc/kallsyms.
This meamleak can be verified by a simple bpf program as follows:
SEC("fentry/trap_init")
in
nvdosv
CVE-2023-53149MEDIUMCVSS 5.5≥ 4.7, < 6.2.16≥ 6.3, < 6.3.3+1 more2025-09-15
CVE-2023-53149 [MEDIUM] CWE-667 CVE-2023-53149: In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid deadlock in fs recl
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid deadlock in fs reclaim with page writeback
Ext4 has a filesystem wide lock protecting ext4_writepages() calls to
avoid races with switching of journalled data flag or inode format. This
lock can however cause a deadlock like:
CPU0 CPU1
ext4_writepages()
percpu_down_r
nvdosv
CVE-2023-53202MEDIUMCVSS 5.5≥ 5.11, < 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-15
CVE-2023-53202 [MEDIUM] CWE-401 CVE-2023-53202: In the Linux kernel, the following vulnerability has been resolved:
PM: domains: fix memory leak wi
In the Linux kernel, the following vulnerability has been resolved:
PM: domains: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
nvdosv
CVE-2022-50276MEDIUMCVSS 5.5≥ 5.0, < 5.4.229≥ 5.5, < 5.10.163+3 more2025-09-15
CVE-2022-50276 [MEDIUM] CWE-476 CVE-2022-50276: In the Linux kernel, the following vulnerability has been resolved:
power: supply: fix null pointer
In the Linux kernel, the following vulnerability has been resolved:
power: supply: fix null pointer dereferencing in power_supply_get_battery_info
when kmalloc() fail to allocate memory in kasprintf(), propname
will be NULL, strcmp() called by of_get_property() will cause
null pointer dereference.
So return ENOMEM if kasprintf() return NULL point
nvdosv
CVE-2023-53200MEDIUMCVSS 5.5≥ 4.2, < 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-15
CVE-2023-53200 [MEDIUM] CWE-401 CVE-2023-53200: In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: fix percpu
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: fix percpu counter block leak on error path when creating new netns
Here is the stack where we allocate percpu counter block:
+- ip6t_register_table
+-> translate_table # allocates percpu counter block
+-> xt_register_table # fails
there is no freeing of the
nvdosv
CVE-2022-50285MEDIUMCVSS 5.5≥ 4.3.6, < 4.4≥ 4.4.1, < 4.9.332+8 more2025-09-15
CVE-2022-50285 [MEDIUM] CVE-2022-50285: In the Linux kernel, the following vulnerability has been resolved:
mm,hugetlb: take hugetlb_lock b
In the Linux kernel, the following vulnerability has been resolved:
mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages
The h->*_huge_pages counters are protected by the hugetlb_lock, but
alloc_huge_page has a corner case where it can decrement the counter
outside of the lock.
This could lead to a corrupted value of h->resv_huge_pages, w
nvdosv
CVE-2023-53178MEDIUMCVSS 4.7≥ 3.11, < 6.1.30≥ 6.2, < 6.3.4+1 more2025-09-15
CVE-2023-53178 [MEDIUM] CWE-362 CVE-2023-53178: In the Linux kernel, the following vulnerability has been resolved:
mm: fix zswap writeback race co
In the Linux kernel, the following vulnerability has been resolved:
mm: fix zswap writeback race condition
The zswap writeback mechanism can cause a race condition resulting in
memory corruption, where a swapped out page gets swapped in with data that
was written to a different page.
The race unfolds like this:
1. a page with data A and swap offs
nvdosv
CVE-2022-50265MEDIUMCVSS 5.5≥ 4.6, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-09-15
CVE-2022-50265 [MEDIUM] CVE-2022-50265: In the Linux kernel, the following vulnerability has been resolved:
kcm: annotate data-races around
In the Linux kernel, the following vulnerability has been resolved:
kcm: annotate data-races around kcm->rx_wait
kcm->rx_psock can be read locklessly in kcm_rfree().
Annotate the read and writes accordingly.
syzbot reported:
BUG: KCSAN: data-race in kcm_rcv_strparser / kcm_rfree
write to 0xffff88810784e3d0 of 1 bytes by task 1823 on cpu 1:
reserve_rx_k
nvdosv
CVE-2023-53246MEDIUMCVSS 5.5fixed in 4.14.312≥ 4.15, < 4.19.280+6 more2025-09-15
CVE-2023-53246 [MEDIUM] CWE-476 CVE-2023-53246: In the Linux kernel, the following vulnerability has been resolved:
cifs: fix DFS traversal oops wi
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL
When compiled with CONFIG_CIFS_DFS_UPCALL disabled, cifs_dfs_d_automount
is NULL. cifs.ko logic for mapping CIFS_FATTR_DFS_REFERRAL attributes to
S_AUTOMOUNT and corresponding dentry flags is retained regardless of
CONFIG
nvdosv
CVE-2022-50323MEDIUMCVSS 5.5≥ 5.15.68, < 5.15.77≥ 5.19.9, < 6.0+3 more2025-09-15
CVE-2022-50323 [MEDIUM] CVE-2022-50323: In the Linux kernel, the following vulnerability has been resolved:
net: do not sense pfmemalloc st
In the Linux kernel, the following vulnerability has been resolved:
net: do not sense pfmemalloc status in skb_append_pagefrags()
skb_append_pagefrags() is used by af_unix and udp sendpage()
implementation so far.
In commit 326140063946 ("tcp: TX zerocopy should not sense
pfmemalloc status") we explained why we should not sense
pfmemalloc status for page
nvdosv
CVE-2023-53229MEDIUMCVSS 5.5≥ 3.14, < 4.14.313≥ 4.15, < 4.19.281+6 more2025-09-15
CVE-2023-53229 [MEDIUM] CVE-2023-53229: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix invalid drv
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta
Avoid potential data corruption issues caused by uninitialized driver
private data structures.
nvdosv
CVE-2023-53172MEDIUMCVSS 5.5v6.32025-09-15
CVE-2023-53172 [MEDIUM] CVE-2023-53172: In the Linux kernel, the following vulnerability has been resolved:
fsverity: reject FS_IOC_ENABLE_
In the Linux kernel, the following vulnerability has been resolved:
fsverity: reject FS_IOC_ENABLE_VERITY on mode 3 fds
Commit 56124d6c87fd ("fsverity: support enabling with tree block size f_mode & FMODE_READ))' in __kernel_read() became
reachable by fuzz tests. This happens if FS_IOC_ENABLE_VERITY is called
on a fd opened with access mode 3, which means
nvdosv
CVE-2022-50289MEDIUMCVSS 5.5≥ 2.6.27, < 4.9.337≥ 4.10, < 4.14.303+7 more2025-09-15
CVE-2022-50289 [MEDIUM] CWE-401 CVE-2022-50289: In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix memory leak in ocfs2
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix memory leak in ocfs2_stack_glue_init()
ocfs2_table_header should be free in ocfs2_stack_glue_init() if
ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak.
BUG: memory leak
unreferenced object 0xffff88810eeb5800 (size 128):
comm "modprobe", pid 4507, jiff
nvdosv
CVE-2022-50308MEDIUMCVSS 5.5≥ 5.10, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-09-15
CVE-2022-50308 [MEDIUM] CWE-476 CVE-2022-50308: In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: Add checks for devm
In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: Add checks for devm_kcalloc
As the devm_kcalloc may return NULL, the return value needs to be checked
to avoid NULL poineter dereference.
nvdosv
CVE-2022-50259MEDIUMCVSS 4.7≥ 5.4.14, < 5.4.229≥ 5.5.1, < 5.10.163+4 more2025-09-15
CVE-2022-50259 [MEDIUM] CWE-362 CVE-2022-50259: In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: fix race in sock_
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: fix race in sock_map_free()
sock_map_free() calls release_sock(sk) without owning a reference
on the socket. This can cause use-after-free as syzbot found [1]
Jakub Sitnicki already took care of a similar issue
in sock_hash_free() in commit 75e68e5bf2c7 ("bpf, sockh
nvdosv
CVE-2023-53250MEDIUMCVSS 5.5≥ 4.9.318, < 4.10≥ 4.14.283, < 4.15+7 more2025-09-15
CVE-2023-53250 [MEDIUM] CWE-476 CVE-2023-53250: In the Linux kernel, the following vulnerability has been resolved:
firmware: dmi-sysfs: Fix null-p
In the Linux kernel, the following vulnerability has been resolved:
firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle
KASAN reported a null-ptr-deref error:
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 1373 Comm: modprobe
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
RIP: 0010:dmi_s
nvdosv