Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 174 of 745
CVE-2022-50269MEDIUMCVSS 5.5≥ 5.12, < 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-15
CVE-2022-50269 [MEDIUM] CWE-401 CVE-2022-50269: In the Linux kernel, the following vulnerability has been resolved:
drm/vkms: Fix memory leak in vk
In the Linux kernel, the following vulnerability has been resolved:
drm/vkms: Fix memory leak in vkms_init()
A memory leak was reported after the vkms module install failed.
unreferenced object 0xffff88810bc28520 (size 16):
comm "modprobe", pid 9662, jiffies 4298009455 (age 42.590s)
hex dump (first 16 bytes):
01 01 00 64 81 88 ff ff 00 00 dc 0a 8
nvdosv
CVE-2022-50291MEDIUMCVSS 5.5≥ 4.6, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-09-15
CVE-2022-50291 [MEDIUM] CVE-2022-50291: In the Linux kernel, the following vulnerability has been resolved:
kcm: annotate data-races around
In the Linux kernel, the following vulnerability has been resolved:
kcm: annotate data-races around kcm->rx_psock
kcm->rx_psock can be read locklessly in kcm_rfree().
Annotate the read and writes accordingly.
We do the same for kcm->rx_wait in the following patch.
syzbot reported:
BUG: KCSAN: data-race in kcm_rfree / unreserve_rx_kcm
write to 0xffff888
nvdosv
CVE-2022-50324MEDIUMCVSS 5.5≥ 2.6.24, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-15
CVE-2022-50324 [MEDIUM] CWE-401 CVE-2022-50324: In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: pxa2xx-flash: fix me
In the Linux kernel, the following vulnerability has been resolved:
mtd: maps: pxa2xx-flash: fix memory leak in probe
Free 'info' upon remapping error to avoid a memory leak.
[: Reword the commit log]
nvdosv
CVE-2023-53236MEDIUMCVSS 5.5≥ 6.2, < 6.2.11v6.32025-09-15
CVE-2023-53236 [MEDIUM] CVE-2023-53236: In the Linux kernel, the following vulnerability has been resolved:
iommufd: Do not corrupt the pfn
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Do not corrupt the pfn list when doing batch carry
If batch->end is 0 then setting npfns[0] before computing the new value of
pfns will fail to adjust the pfn and result in various page accounting
corruptions. It should be ordered after.
This seems to result in various kinds of
nvdosv
CVE-2023-53163MEDIUMCVSS 5.5≥ 5.15, < 5.15.87≥ 5.16, < 6.0.19+2 more2025-09-15
CVE-2023-53163 [MEDIUM] CVE-2023-53163: In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: don't hold ni_lock wh
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: don't hold ni_lock when calling truncate_setsize()
syzbot is reporting hung task at do_user_addr_fault() [1], for there is
a silent deadlock between PG_locked bit and ni_lock lock.
Since filemap_update_page() calls filemap_read_folio() after calling
folio_trylock() which will s
nvdosv
CVE-2022-50313MEDIUMCVSS 5.5≥ 4.19, < 5.4.289≥ 5.5, < 5.10.233+3 more2025-09-15
CVE-2022-50313 [MEDIUM] CVE-2022-50313: In the Linux kernel, the following vulnerability has been resolved:
erofs: fix order >= MAX_ORDER w
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
As syzbot reported [1], the root cause is that i_size field is a
signed type, and negative i_size is also less than EROFS_BLKSIZ.
As a consequence, it's handled as fast symlink unexpectedly.
Let's fall back to the gener
nvdosv
CVE-2022-50272MEDIUMCVSS 5.5≥ 2.6.34, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-15
CVE-2022-50272 [MEDIUM] CWE-476 CVE-2022-50272: In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: az6027: fix nul
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
Wei Chen reports a kernel bug as blew:
general protection fault, probably for non-canonical address
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
...
Call Trace:
__i2c_transfer+0x77e/0x1930
nvdosv
CVE-2023-53166MEDIUMCVSS 4.7≥ 5.18, < 6.1.31≥ 6.2, < 6.3.5+1 more2025-09-15
CVE-2023-53166 [MEDIUM] CWE-362 CVE-2023-53166: In the Linux kernel, the following vulnerability has been resolved:
power: supply: bq25890: Fix ext
In the Linux kernel, the following vulnerability has been resolved:
power: supply: bq25890: Fix external_power_changed race
bq25890_charger_external_power_changed() dereferences bq->charger,
which gets sets in bq25890_power_supply_init() like this:
bq->charger = devm_power_supply_register(bq->dev, &bq->desc, &psy_cfg);
As soon as devm_power_supp
nvdosv
CVE-2022-50296MEDIUMCVSS 5.5fixed in 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-15
CVE-2022-50296 [MEDIUM] CVE-2022-50296: In the Linux kernel, the following vulnerability has been resolved:
UM: cpuinfo: Fix a warning for
In the Linux kernel, the following vulnerability has been resolved:
UM: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS is selected,
cpu_max_bits_warn() generates a runtime warning similar as below while
we show /proc/cpuinfo. Fix this by using nr_cpu_ids (the runtime limit)
instead of NR_CPUS t
nvdosv
CVE-2022-50326MEDIUMCVSS 5.5≥ 6.0, < 6.0.32025-09-15
CVE-2022-50326 [MEDIUM] CWE-401 CVE-2022-50326: In the Linux kernel, the following vulnerability has been resolved:
media: airspy: fix memory leak
In the Linux kernel, the following vulnerability has been resolved:
media: airspy: fix memory leak in airspy probe
The commit ca9dc8d06ab6 ("media: airspy: respect the DMA coherency
rules") moves variable buf from stack to heap, however, it only frees
buf in the error handling code, missing deallocation in the success
path.
Fix this by freeing buf
nvdosv
CVE-2022-50334MEDIUMCVSS 5.5fixed in 5.4.229≥ 5.5, < 5.10.163+3 more2025-09-15
CVE-2022-50334 [MEDIUM] CWE-476 CVE-2022-50334: In the Linux kernel, the following vulnerability has been resolved:
hugetlbfs: fix null-ptr-deref i
In the Linux kernel, the following vulnerability has been resolved:
hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
Syzkaller reports a null-ptr-deref bug as follows:
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
RIP: 0010:hugetlbfs_parse_param+0x1dd/0x8e0 fs/hugetlbfs/inode.c:1380
[...]
Call Trace:
vfs_parse_fs_
nvdosv
CVE-2025-39801MEDIUMCVSS 5.5≥ 3.2, < 5.15.190≥ 5.16, < 6.1.149+4 more2025-09-15
CVE-2025-39801 [MEDIUM] CWE-617 CVE-2025-39801: In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: Remove WARN_ON for d
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: Remove WARN_ON for device endpoint command timeouts
This commit addresses a rarely observed endpoint command timeout
which causes kernel panic due to warn when 'panic_on_warn' is enabled
and unnecessary call trace prints when 'panic_on_warn' is disabled.
It is seen duri
nvdosv
CVE-2022-50298MEDIUMCVSS 5.5≥ 5.11, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-09-15
CVE-2022-50298 [MEDIUM] CVE-2022-50298: In the Linux kernel, the following vulnerability has been resolved:
slimbus: qcom-ngd: cleanup in p
In the Linux kernel, the following vulnerability has been resolved:
slimbus: qcom-ngd: cleanup in probe error path
Add proper error path in probe() to cleanup resources previously
acquired/allocated to fix warnings visible during probe deferral:
notifier callback qcom_slim_ngd_ssr_notify already registered
WARNING: CPU: 6 PID: 70 at kernel/notifier.c:28
nvdosv
CVE-2023-53171MEDIUMCVSS 5.5≥ 3.6, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-09-15
CVE-2023-53171 [MEDIUM] CVE-2023-53171: In the Linux kernel, the following vulnerability has been resolved:
vfio/type1: prevent underflow o
In the Linux kernel, the following vulnerability has been resolved:
vfio/type1: prevent underflow of locked_vm via exec()
When a vfio container is preserved across exec, the task does not change,
but it gets a new mm with locked_vm=0, and loses the count from existing
dma mappings. If the user later unmaps a dma mapping, locked_vm underflows
to a large un
nvdosv
CVE-2023-53188MEDIUMCVSS 4.7≥ 4.3, < 5.4.293≥ 5.5, < 5.10.237+4 more2025-09-15
CVE-2023-53188 [MEDIUM] CWE-362 CVE-2023-53188: In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix race on p
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix race on port output
assume the following setup on a single machine:
1. An openvswitch instance with one bridge and default flows
2. two network namespaces "server" and "client"
3. two ovs interfaces "server" and "client" on the bridge
4. for each ovs interfac
nvdosv
CVE-2022-50337MEDIUMCVSS 5.5≥ 5.9, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-09-15
CVE-2022-50337 [MEDIUM] CVE-2022-50337: In the Linux kernel, the following vulnerability has been resolved:
ocxl: fix pci device refcount l
In the Linux kernel, the following vulnerability has been resolved:
ocxl: fix pci device refcount leak when calling get_function_0()
get_function_0() calls pci_get_domain_bus_and_slot(), as comment
says, it returns a pci device with refcount increment, so after
using it, pci_dev_put() needs be called.
Get the device reference when get_function_0() is not
nvdosv
CVE-2023-53242MEDIUMCVSS 5.5≥ 4.20.1, < 5.4.235≥ 5.5, < 5.10.173+4 more2025-09-15
CVE-2023-53242 [MEDIUM] CVE-2023-53242: In the Linux kernel, the following vulnerability has been resolved:
thermal/drivers/hisi: Drop seco
In the Linux kernel, the following vulnerability has been resolved:
thermal/drivers/hisi: Drop second sensor hi3660
The commit 74c8e6bffbe1 ("driver core: Add __alloc_size hint to devm
allocators") exposes a panic "BRK handler: Fatal exception" on the
hi3660_thermal_probe funciton.
This is because the function allocates memory for only one
sensors array e
nvdosv
CVE-2023-53209MEDIUMCVSS 5.5fixed in 6.1.42≥ 6.2, < 6.4.72025-09-15
CVE-2023-53209 [MEDIUM] CWE-476 CVE-2023-53209: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211_hwsim: Fix possi
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211_hwsim: Fix possible NULL dereference
In a call to mac80211_hwsim_select_tx_link() the sta pointer might
be NULL, thus need to check that it is not NULL before accessing it.
nvdosv
CVE-2023-53195MEDIUMCVSS 5.5≥ 6.1, < 6.1.39≥ 6.2, < 6.4.42025-09-15
CVE-2023-53195 [MEDIUM] CWE-401 CVE-2023-53195: In the Linux kernel, the following vulnerability has been resolved:
mlxsw: minimal: fix potential m
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: minimal: fix potential memory leak in mlxsw_m_linecards_init
The line cards array is not freed in the error path of
mlxsw_m_linecards_init(), which can lead to a memory leak. Fix by
freeing the array in the error path, thereby making the error path
identical to mlxsw_m_line
nvdosv
CVE-2022-50242MEDIUMCVSS 5.5≥ 3.10, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-15
CVE-2022-50242 [MEDIUM] CWE-401 CVE-2022-50242: In the Linux kernel, the following vulnerability has been resolved:
drivers: net: qlcnic: Fix poten
In the Linux kernel, the following vulnerability has been resolved:
drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init()
If vp alloc failed in qlcnic_sriov_init(), all previously allocated vp
needs to be freed.
nvdosv