Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 83 of 724
CVE-2023-53835UNKNOWN≥ 0, < 5.10.181≥ 5.11.0, < 5.15.113+2 more2025-12-09
CVE-2023-53835 ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled In the Linux kernel, the following vulnerability has been resolved: ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled When a file system currently mounted read/only is remounted read/write, if we clear the SB_RDONLY flag too early, before the quota is initialized, and there is another process/thread constantl
osv
CVE-2023-53804UNKNOWN≥ 2.6.37, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-12-09
CVE-2023-53804 nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() During unmount process of nilfs2, nothing holds nilfs_root structure after nilfs2 detaches its writer in nilfs_detach_log_writer(). However, since nilfs_evict_inode() uses nilfs_root for some cleanup operations
osv
CVE-2023-53782UNKNOWN≥ 4.9.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-09
CVE-2023-53782 dccp: Fix out of bounds access in DCCP error handler dccp: Fix out of bounds access in DCCP error handler In the Linux kernel, the following vulnerability has been resolved: dccp: Fix out of bounds access in DCCP error handler There was a previous attempt to fix an out-of-bounds access in the DCCP error handlers, but that fix assumed that the error handlers only want to access the first 8 bytes of the DCCP header. Actually, they also look at the DCCP sequence number, which is s
osv
CVE-2025-40340UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-09
CVE-2025-40340 CVE-2025-40340: In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test. I saw an oops in xe_gem_fault when running the xe-fast-feedback testlist against the realtime kernel without debug options enabled. The panic happens after core_hotunplug unbind-rebind finishes. Presu
osv
CVE-2023-53783UNKNOWN≥ 5.4.0, < 5.4.235≥ 5.5.0, < 5.10.173+3 more2025-12-09
CVE-2023-53783 blk-iocost: fix divide by 0 error in calc_lcoefs() blk-iocost: fix divide by 0 error in calc_lcoefs() In the Linux kernel, the following vulnerability has been resolved: blk-iocost: fix divide by 0 error in calc_lcoefs() echo max of u64 to cost.model can cause divide by 0 error. # echo 8:0 rbps=18446744073709551615 > /sys/fs/cgroup/io.cost.model divide error: 0000 [#1] PREEMPT SMP RIP: 0010:calc_lcoefs+0x4c/0xc0 Call Trace: ioc_refresh_params+0x2b3/0x4f0 ioc_cost_model_write
osv
CVE-2025-40334UNKNOWN≥ 6.16.0, < 6.17.82025-12-09
CVE-2025-40334 drm/amdgpu: validate userq buffer virtual address and size drm/amdgpu: validate userq buffer virtual address and size In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate userq buffer virtual address and size It needs to validate the userq object virtual address to determine whether it is residented in a valid vm mapping.
osv
CVE-2023-53844UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-09
CVE-2023-53844 CVE-2023-53844: In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on swapout move error If moving the bo to system fo In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource on swapout move error If moving the bo to system for swapout failed, we were leaking a resource. Fix.
osv
CVE-2022-50637UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-09
CVE-2022-50637 CVE-2022-50637: In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut() If "cpu_dev" fails In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut() If "cpu_dev" fails to get opp table in qcom_cpufreq_hw_read_lut(), the program will return, resulting in "table" resource is not released.
osv
CVE-2022-50661UNKNOWN≥ 5.9.0, < 5.10.180≥ 5.11.0, < 5.15.86+2 more2025-12-09
CVE-2022-50661 seccomp: Move copy_seccomp() to no failure path. seccomp: Move copy_seccomp() to no failure path. In the Linux kernel, the following vulnerability has been resolved: seccomp: Move copy_seccomp() to no failure path. Our syzbot instance reported memory leaks in do_seccomp() [0], similar to the report [1]. It shows that we miss freeing struct seccomp_filter and some objects included in it. We can reproduce the issue with the program below [2] which calls one seccomp() and two clo
osv
CVE-2023-53852UNKNOWN≥ 6.0.0, < 6.1.39≥ 6.2.0, < 6.3.13+1 more2025-12-09
CVE-2023-53852 nvme-core: fix memory leak in dhchap_secret_store nvme-core: fix memory leak in dhchap_secret_store In the Linux kernel, the following vulnerability has been resolved: nvme-core: fix memory leak in dhchap_secret_store Free dhchap_secret in nvme_ctrl_dhchap_secret_store() before we return fix following kmemleack:- unreferenced object 0xffff8886376ea800 (size 64): comm "check", pid 22048, jiffies 4344316705 (age 92.199s) hex dump (first 32 bytes): 44 48 48 43 2d 31 3a 30 30 3a 6
osv
CVE-2023-53807UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-09
CVE-2023-53807 CVE-2023-53807: In the Linux kernel, the following vulnerability has been resolved: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider() Smatch detected this In the Linux kernel, the following vulnerability has been resolved: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider() Smatch detected this potential error pointer dereference clk_wzrd_register_divider(). If devm_clk_hw_register() fails then it sets "hw" to an error pointer and then dereferences it on the
osv
CVE-2023-53830UNKNOWN≥ 0, < 6.1.25-12025-12-09
CVE-2023-53830 CVE-2023-53830: In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix memory leak when showing current settings When retriv In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix memory leak when showing current settings When retriving a item string with tlmi_setting(), the result has to be freed using kfree(). In current_value_show() however, malformed item strings are not freed, causing a memory
osv
CVE-2023-53746UNKNOWN≥ 4.20.0, < 5.4.240≥ 5.5.0, < 5.10.177+3 more2025-12-08
CVE-2023-53746 s390/vfio-ap: fix memory leak in vfio_ap device driver s390/vfio-ap: fix memory leak in vfio_ap device driver In the Linux kernel, the following vulnerability has been resolved: s390/vfio-ap: fix memory leak in vfio_ap device driver The device release callback function invoked to release the matrix device uses the dev_get_drvdata(device *dev) function to retrieve the pointer to the vfio_matrix_dev object in order to free its storage. The problem is, this object is not stored as
osv
CVE-2025-40296UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40296 CVE-2025-40296: In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Fix double free of GPIO device during unregister regulator_ In the Linux kernel, the following vulnerability has been resolved: platform/x86: int3472: Fix double free of GPIO device during unregister regulator_unregister() already frees the associated GPIO device. On ThinkPad X9 (Lunar Lake), this causes a double free issue that leads to random failures when other drivers (ty
osv
CVE-2025-40291UNKNOWN≥ 6.15.0, < 6.17.82025-12-08
CVE-2025-40291 io_uring: fix regbuf vector size truncation io_uring: fix regbuf vector size truncation In the Linux kernel, the following vulnerability has been resolved: io_uring: fix regbuf vector size truncation There is a report of io_estimate_bvec_size() truncating the calculated number of segments that leads to corruption issues. Check it doesn't overflow "int"s used later. Rough but simple, can be improved on top.
osv
CVE-2022-50627UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2022-50627 CVE-2022-50627: In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in m In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix monitor mode bringup crash When the interface is brought up in monitor mode, it leads to NULL pointer dereference crash. This crash happens when the packet type is extracted for a SKB. This extraction which is present in the receive
osv
CVE-2025-40294UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-08
CVE-2025-40294 CVE-2025-40294: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_mo In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern s
osv
CVE-2025-40311UNKNOWN≥ 5.8.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40311 accel/habanalabs: support mapping cb with vmalloc-backed coherent memory accel/habanalabs: support mapping cb with vmalloc-backed coherent memory In the Linux kernel, the following vulnerability has been resolved: accel/habanalabs: support mapping cb with vmalloc-backed coherent memory When IOMMU is enabled, dma_alloc_coherent() with GFP_USER may return addresses from the vmalloc range. If such an address is mapped without VM_MIXEDMAP, vm_insert_page() will trigger a BUG_ON due
osv
CVE-2022-50629UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-08
CVE-2022-50629 CVE-2022-50629: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when rsi_create_kthread() failed in rsi_coex_attach().
osv
CVE-2022-50628UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2022-50628 CVE-2022-50628: In the Linux kernel, the following vulnerability has been resolved: drm/gud: Fix UBSAN warning UBSAN complains about invalid value for bool: [ 101 In the Linux kernel, the following vulnerability has been resolved: drm/gud: Fix UBSAN warning UBSAN complains about invalid value for bool: [ 101.165172] [drm] Initialized gud 1.0.0 20200422 for 2-3.2:1.0 on minor 1 [ 101.213360] gud 2-3.2:1.0: [drm] fb1: guddrmfb frame buffer device [ 101.213426] usbcore: registered ne
osv