Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 81 of 724
CVE-2023-53798UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-09
CVE-2023-53798 CVE-2023-53798: In the Linux kernel, the following vulnerability has been resolved: ethtool: Fix uninitialized number of lanes It is not possible to set the number of In the Linux kernel, the following vulnerability has been resolved: ethtool: Fix uninitialized number of lanes It is not possible to set the number of lanes when setting link modes using the legacy IOCTL ethtool interface. Since 'struct ethtool_link_ksettings' is not initialized in this path, drivers receive an unini
osv
CVE-2023-53834UNKNOWN≥ 4.5.0, < 5.15.127≥ 5.16.0, < 6.1.46+1 more2025-12-09
CVE-2023-53834 iio: adc: ina2xx: avoid NULL pointer dereference on OF device match iio: adc: ina2xx: avoid NULL pointer dereference on OF device match In the Linux kernel, the following vulnerability has been resolved: iio: adc: ina2xx: avoid NULL pointer dereference on OF device match The affected lines were resulting in a NULL pointer dereference on our platform because the device tree contained the following list of compatible strings: power-sensor@40 { compatible = "ti,ina232", "ti,ina23
osv
CVE-2023-53792UNKNOWN≥ 6.0.0, < 6.1.39≥ 6.2.0, < 6.3.13+1 more2025-12-09
CVE-2023-53792 nvme-core: fix memory leak in dhchap_ctrl_secret nvme-core: fix memory leak in dhchap_ctrl_secret In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_ctrl_secret Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we return when nvme_auth_generate_key() returns error.
osv
CVE-2022-50644UNKNOWN≥ 3.16.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-09
CVE-2022-50644 clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sync in some error paths.
osv
CVE-2022-50674UNKNOWN≥ 5.19.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-09
CVE-2022-50674 riscv: vdso: fix NULL deference in vdso_join_timens() when vfork riscv: vdso: fix NULL deference in vdso_join_timens() when vfork In the Linux kernel, the following vulnerability has been resolved: riscv: vdso: fix NULL deference in vdso_join_timens() when vfork Testing tools/testing/selftests/timens/vfork_exec.c got below kernel log: [ 6.838454] Unable to handle kernel access to user memory without uaccess routines at virtual address 0000000000000020 [ 6.842255] Oops [#1] [ 6
osv
CVE-2022-50675UNKNOWN≥ 0, < 6.0.3-12025-12-09
CVE-2022-50675 CVE-2022-50675: In the Linux kernel, the following vulnerability has been resolved: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored Prior to co In the Linux kernel, the following vulnerability has been resolved: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored Prior to commit 69e3b846d8a7 ("arm64: mte: Sync tags for pages where PTE is untagged"), mte_sync_tags() was only called for pte_tagged() entries (those mapped with PROT_MTE). Ther
osv
CVE-2023-53853UNKNOWN≥ 3.12.0, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-12-09
CVE-2023-53853 netlink: annotate accesses to nlk->cb_running netlink: annotate accesses to nlk->cb_running In the Linux kernel, the following vulnerability has been resolved: netlink: annotate accesses to nlk->cb_running Both netlink_recvmsg() and netlink_native_seq_show() read nlk->cb_running locklessly. Use READ_ONCE() there. Add corresponding WRITE_ONCE() to netlink_dump() and __netlink_dump_start() syzbot reported: BUG: KCSAN: data-race in __netlink_dump_start / netlink_recvmsg write t
osv
CVE-2023-53811UNKNOWN≥ 5.14.0, < 5.15.99≥ 5.16.0, < 6.1.16+1 more2025-12-09
CVE-2023-53811 RDMA/irdma: Cap MSIX used to online CPUs + 1 RDMA/irdma: Cap MSIX used to online CPUs + 1 In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Cap MSIX used to online CPUs + 1 The irdma driver can use a maximum number of msix vectors equal to num_online_cpus() + 1 and the kernel warning stack below is shown if that number is exceeded. The kernel throws a warning as the driver tries to update the affinity hint with a CPU mask greater than the max CPU
osv
CVE-2023-53838UNKNOWN≥ 0, < 6.1.20-12025-12-09
CVE-2023-53838 CVE-2023-53838: In the Linux kernel, the following vulnerability has been resolved: f2fs: synchronize atomic write aborts To fix a race condition between atomic write In the Linux kernel, the following vulnerability has been resolved: f2fs: synchronize atomic write aborts To fix a race condition between atomic write aborts, I use the inode lock and make COW inode to be re-usable thoroughout the whole atomic file inode lifetime.
osv
CVE-2025-40327UNKNOWN≥ 0, < 6.17.8-12025-12-09
CVE-2025-40327 CVE-2025-40327: In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix system hang caused by cpu-clock usage cpu-clock usage by the async- In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix system hang caused by cpu-clock usage cpu-clock usage by the async-profiler tool can trigger a system hang, which got bisected back to the following commit by Octavia Togami: 18dbcbfabfff ("perf: Fix the POLL_HUP delivery breakage") ca
osv
CVE-2023-53808UNKNOWN≥ 4.0.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-09
CVE-2023-53808 wifi: mwifiex: fix memory leak in mwifiex_histogram_read() wifi: mwifiex: fix memory leak in mwifiex_histogram_read() In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() Always free the zeroed page on return from 'mwifiex_histogram_read()'.
osv
CVE-2023-53826UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-09
CVE-2023-53826 CVE-2023-53826: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entry In the Linux kernel, the following vulnerability has been resolved: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() Wear-leveling entry could be freed in error path, which may be accessed again in eraseblk_count_seq_show(), for example: __erase_worker eraseblk_count_seq_show wl = ubi->lookuptbl[*block_nu
osv
CVE-2023-53836UNKNOWN≥ 5.13.0, < 5.15.189≥ 5.16.0, < 6.1.54+1 more2025-12-09
CVE-2023-53836 bpf, sockmap: Fix skb refcnt race after locking changes bpf, sockmap: Fix skb refcnt race after locking changes In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix skb refcnt race after locking changes There is a race where skb's from the sk_psock_backlog can be referenced after userspace side has already skb_consumed() the sk_buff and its refcnt dropped to zer0 causing use after free. The flow is the following: while ((skb = skb_peek(&psock-
osv
CVE-2022-50672UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-09
CVE-2022-50672 CVE-2022-50672: In the Linux kernel, the following vulnerability has been resolved: mailbox: zynq-ipi: fix error handling while device_register() fails If device_regi In the Linux kernel, the following vulnerability has been resolved: mailbox: zynq-ipi: fix error handling while device_register() fails If device_register() fails, it has two issues: 1. The name allocated by dev_set_name() is leaked. 2. The parent of device is not NULL, device_unregister() is called in zynqmp_ipi_fre
osv
CVE-2022-50676UNKNOWN≥ 4.8.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-09
CVE-2022-50676 net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks() net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks() In the Linux kernel, the following vulnerability has been resolved: net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks() syzbot is reporting lockdep warning at rds_tcp_reset_callbacks() [1], for commit ac3615e7f3cffe2a ("RDS: TCP: Reduce code duplication in rds_tcp_reset_callbacks()")
osv
CVE-2023-53813UNKNOWN≥ 6.4.0, < 6.4.82025-12-09
CVE-2023-53813 ext4: fix rbtree traversal bug in ext4_mb_use_preallocated ext4: fix rbtree traversal bug in ext4_mb_use_preallocated In the Linux kernel, the following vulnerability has been resolved: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated During allocations, while looking for preallocations(PA) in the per inode rbtree, we can't do a direct traversal of the tree because ext4_mb_discard_group_preallocation() can paralelly mark the pa deleted and that can cause direct traver
osv
CVE-2025-40332UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-09
CVE-2025-40332 CVE-2025-40332: In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix mmap write lock not release If mmap write lock is taken while drai In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix mmap write lock not release If mmap write lock is taken while draining retry fault, mmap write lock is not released because svm_range_restore_pages calls mmap_read_unlock then returns. This causes deadlock and system hangs later becau
osv
CVE-2022-50652UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-09
CVE-2022-50652 CVE-2022-50652: In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b ("uio: fix a sleep-in-atomic-context bug in uio_dmem_genirq_irqcontrol()") started calling disable_irq() without holding the spinlock because it can sleep. However, that
osv
CVE-2022-50669UNKNOWN≥ 5.2.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-09
CVE-2022-50669 misc: ocxl: fix possible name leak in ocxl_file_register_afu() misc: ocxl: fix possible name leak in ocxl_file_register_afu() In the Linux kernel, the following vulnerability has been resolved: misc: ocxl: fix possible name leak in ocxl_file_register_afu() If device_register() returns error in ocxl_file_register_afu(), the name allocated by dev_set_name() need be freed. As comment of device_register() says, it should use put_device() to give up the reference in the error path.
osv
CVE-2023-53793UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-09
CVE-2023-53793 CVE-2023-53793: In the Linux kernel, the following vulnerability has been resolved: perf tool x86: Fix perf_env memory leak Found by leak sanitizer: ``` ==1632594==ER In the Linux kernel, the following vulnerability has been resolved: perf tool x86: Fix perf_env memory leak Found by leak sanitizer: ``` ==1632594==ERROR: LeakSanitizer: detected memory leaks Direct leak of 21 byte(s) in 1 object(s) allocated from: #0 0x7f2953a7077b in __interceptor_strdup ../../../../src/libsanitize
osv