Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 83 of 724
CVE-2023-53835UNKNOWN≥ 0, < 5.10.181≥ 5.11.0, < 5.15.113+2 more2025-12-09
CVE-2023-53835 ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
In the Linux kernel, the following vulnerability has been resolved:
ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
When a file system currently mounted read/only is remounted
read/write, if we clear the SB_RDONLY flag too early, before the quota
is initialized, and there is another process/thread constantl
osv
CVE-2023-53804UNKNOWN≥ 2.6.37, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-12-09
CVE-2023-53804 nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
During unmount process of nilfs2, nothing holds nilfs_root structure after
nilfs2 detaches its writer in nilfs_detach_log_writer(). However, since
nilfs_evict_inode() uses nilfs_root for some cleanup operations
osv
CVE-2023-53782UNKNOWN≥ 4.9.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-09
CVE-2023-53782 dccp: Fix out of bounds access in DCCP error handler
dccp: Fix out of bounds access in DCCP error handler
In the Linux kernel, the following vulnerability has been resolved:
dccp: Fix out of bounds access in DCCP error handler
There was a previous attempt to fix an out-of-bounds access in the DCCP
error handlers, but that fix assumed that the error handlers only want
to access the first 8 bytes of the DCCP header. Actually, they also look
at the DCCP sequence number, which is s
osv
CVE-2025-40340UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-09
CVE-2025-40340 CVE-2025-40340: In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test. I saw an oops in xe_gem_fault when running the xe-fast-feedback testlist against the realtime kernel without debug options enabled. The panic happens after core_hotunplug unbind-rebind finishes. Presu
osv
CVE-2023-53783UNKNOWN≥ 5.4.0, < 5.4.235≥ 5.5.0, < 5.10.173+3 more2025-12-09
CVE-2023-53783 blk-iocost: fix divide by 0 error in calc_lcoefs()
blk-iocost: fix divide by 0 error in calc_lcoefs()
In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: fix divide by 0 error in calc_lcoefs()
echo max of u64 to cost.model can cause divide by 0 error.
# echo 8:0 rbps=18446744073709551615 > /sys/fs/cgroup/io.cost.model
divide error: 0000 [#1] PREEMPT SMP
RIP: 0010:calc_lcoefs+0x4c/0xc0
Call Trace:
ioc_refresh_params+0x2b3/0x4f0
ioc_cost_model_write
osv
CVE-2025-40334UNKNOWN≥ 6.16.0, < 6.17.82025-12-09
CVE-2025-40334 drm/amdgpu: validate userq buffer virtual address and size
drm/amdgpu: validate userq buffer virtual address and size
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: validate userq buffer virtual address and size
It needs to validate the userq object virtual address to
determine whether it is residented in a valid vm mapping.
osv
CVE-2023-53844UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-09
CVE-2023-53844 CVE-2023-53844: In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on swapout move error If moving the bo to system fo
In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on swapout move error If moving the bo to system for swapout failed, we were leaking a resource. Fix.
osv
CVE-2022-50637UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-09
CVE-2022-50637 CVE-2022-50637: In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut() If "cpu_dev" fails
In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut() If "cpu_dev" fails to get opp table in qcom_cpufreq_hw_read_lut(), the program will return, resulting in "table" resource is not released.
osv
CVE-2022-50661UNKNOWN≥ 5.9.0, < 5.10.180≥ 5.11.0, < 5.15.86+2 more2025-12-09
CVE-2022-50661 seccomp: Move copy_seccomp() to no failure path.
seccomp: Move copy_seccomp() to no failure path.
In the Linux kernel, the following vulnerability has been resolved:
seccomp: Move copy_seccomp() to no failure path.
Our syzbot instance reported memory leaks in do_seccomp() [0], similar
to the report [1]. It shows that we miss freeing struct seccomp_filter
and some objects included in it.
We can reproduce the issue with the program below [2] which calls one
seccomp() and two clo
osv
CVE-2023-53852UNKNOWN≥ 6.0.0, < 6.1.39≥ 6.2.0, < 6.3.13+1 more2025-12-09
CVE-2023-53852 nvme-core: fix memory leak in dhchap_secret_store
nvme-core: fix memory leak in dhchap_secret_store
In the Linux kernel, the following vulnerability has been resolved:
nvme-core: fix memory leak in dhchap_secret_store
Free dhchap_secret in nvme_ctrl_dhchap_secret_store() before we return
fix following kmemleack:-
unreferenced object 0xffff8886376ea800 (size 64):
comm "check", pid 22048, jiffies 4344316705 (age 92.199s)
hex dump (first 32 bytes):
44 48 48 43 2d 31 3a 30 30 3a 6
osv
CVE-2023-53807UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-09
CVE-2023-53807 CVE-2023-53807: In the Linux kernel, the following vulnerability has been resolved: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider() Smatch detected this
In the Linux kernel, the following vulnerability has been resolved: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider() Smatch detected this potential error pointer dereference clk_wzrd_register_divider(). If devm_clk_hw_register() fails then it sets "hw" to an error pointer and then dereferences it on the
osv
CVE-2023-53830UNKNOWN≥ 0, < 6.1.25-12025-12-09
CVE-2023-53830 CVE-2023-53830: In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix memory leak when showing current settings When retriv
In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix memory leak when showing current settings When retriving a item string with tlmi_setting(), the result has to be freed using kfree(). In current_value_show() however, malformed item strings are not freed, causing a memory
osv
CVE-2023-53746UNKNOWN≥ 4.20.0, < 5.4.240≥ 5.5.0, < 5.10.177+3 more2025-12-08
CVE-2023-53746 s390/vfio-ap: fix memory leak in vfio_ap device driver
s390/vfio-ap: fix memory leak in vfio_ap device driver
In the Linux kernel, the following vulnerability has been resolved:
s390/vfio-ap: fix memory leak in vfio_ap device driver
The device release callback function invoked to release the matrix device
uses the dev_get_drvdata(device *dev) function to retrieve the
pointer to the vfio_matrix_dev object in order to free its storage. The
problem is, this object is not stored as
osv
CVE-2025-40296UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40296 CVE-2025-40296: In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Fix double free of GPIO device during unregister regulator_
In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Fix double free of GPIO device during unregister regulator_unregister() already frees the associated GPIO device. On ThinkPad X9 (Lunar Lake), this causes a double free issue that leads to random failures when other drivers (ty
osv
CVE-2025-40291UNKNOWN≥ 6.15.0, < 6.17.82025-12-08
CVE-2025-40291 io_uring: fix regbuf vector size truncation
io_uring: fix regbuf vector size truncation
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix regbuf vector size truncation
There is a report of io_estimate_bvec_size() truncating the calculated
number of segments that leads to corruption issues. Check it doesn't
overflow "int"s used later. Rough but simple, can be improved on top.
osv
CVE-2022-50627UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2022-50627 CVE-2022-50627: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in m
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in monitor mode, it leads to NULL pointer dereference crash. This crash happens when the packet type is extracted for a SKB. This extraction which is present in the receive
osv
CVE-2025-40294UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-08
CVE-2025-40294 CVE-2025-40294: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_mo
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern s
osv
CVE-2025-40311UNKNOWN≥ 5.8.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40311 accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
In the Linux kernel, the following vulnerability has been resolved:
accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
When IOMMU is enabled, dma_alloc_coherent() with GFP_USER may return
addresses from the vmalloc range. If such an address is mapped without
VM_MIXEDMAP, vm_insert_page() will trigger a BUG_ON due
osv
CVE-2022-50629UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-08
CVE-2022-50629 CVE-2022-50629: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when
In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when rsi_create_kthread() failed in rsi_coex_attach().
osv
CVE-2022-50628UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2022-50628 CVE-2022-50628: In the Linux kernel, the following vulnerability has been resolved: drm/gud: Fix UBSAN warning UBSAN complains about invalid value for bool: [ 101
In the Linux kernel, the following vulnerability has been resolved: drm/gud: Fix UBSAN warning UBSAN complains about invalid value for bool: [ 101.165172] [drm] Initialized gud 1.0.0 20200422 for 2-3.2:1.0 on minor 1 [ 101.213360] gud 2-3.2:1.0: [drm] fb1: guddrmfb frame buffer device [ 101.213426] usbcore: registered ne
osv