Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 127 of 738
CVE-2022-50492HIGHCVSS 7.8≥ 3.12, < 6.0.7v6.12025-10-04
CVE-2022-50492 [HIGH] CWE-416 CVE-2022-50492: In the Linux kernel, the following vulnerability has been resolved:
drm/msm: fix use-after-free on
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: fix use-after-free on probe deferral
The bridge counter was never reset when tearing down the DRM device so
that stale pointers to deallocated structures would be accessed on the
next tear down (e.g. after a second late bind deferral).
Given enough bridges and a few probe d
nvdosv
CVE-2023-53543HIGHCVSS 7.8≥ 5.15.198, < 6.1.47≥ 6.2, < 6.4.12+1 more2025-10-04
CVE-2023-53543 [HIGH] CVE-2023-53543: In the Linux kernel, the following vulnerability has been resolved:
vdpa: Add max vqp attr to vdpa_
In the Linux kernel, the following vulnerability has been resolved:
vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check
The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info->attrs before entering into each handler
in vdpa
nvdosv
CVE-2023-53587HIGHCVSS 7.8≥ 3.10, < 4.14.315≥ 4.15, < 4.19.283+6 more2025-10-04
CVE-2023-53587 [HIGH] CWE-416 CVE-2023-53587: In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Sync IRQ works bef
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Sync IRQ works before buffer destruction
If something was written to the buffer just before destruction,
it may be possible (maybe not in a real system, but it did
happen in ARCH=um with time-travel) to destroy the ringbuffer
before the IRQ work ran, leading this KASAN
nvdosv
CVE-2023-53616HIGHCVSS 7.8≥ 2.6.12.1, < 4.14.326≥ 4.15, < 4.19.295+6 more2025-10-04
CVE-2023-53616 [HIGH] CWE-415 CVE-2023-53616: In the Linux kernel, the following vulnerability has been resolved:
jfs: fix invalid free of JFS_IP
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount
syzbot found an invalid-free in diUnmount:
BUG: KASAN: double-free in slab_free mm/slub.c:3661 [inline]
BUG: KASAN: double-free in __kmem_cache_free+0x71/0x110 mm/slub.c:3674
Free of addr ffff88806f410000 by task syz-exec
nvdosv
CVE-2023-53570HIGHCVSS 7.8≥ 5.16, < 6.1.46≥ 6.2, < 6.4.11+1 more2025-10-04
CVE-2023-53570 [HIGH] CWE-190 CVE-2023-53570: In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: fix integer over
In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()
nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the
number of MBSSID elements in the nested netlink attribute attrs, which can
lead to an integer overflow if a user of the nl80211 interface specif
nvdosv
CVE-2023-53613HIGHCVSS 7.8≥ 5.10, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-10-04
CVE-2023-53613 [HIGH] CWE-416 CVE-2023-53613: In the Linux kernel, the following vulnerability has been resolved:
dax: Fix dax_mapping_release()
In the Linux kernel, the following vulnerability has been resolved:
dax: Fix dax_mapping_release() use after free
A CONFIG_DEBUG_KOBJECT_RELEASE test of removing a device-dax region
provider (like modprobe -r dax_hmem) yields:
kobject: 'mapping0' (ffff93eb460e8800): kobject_release, parent 0000000000000000 (delayed 2000)
[..]
DEBUG_LOCKS_WARN_ON(1)
nvdosv
CVE-2022-50470HIGHCVSS 7.8≥ 3.2, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-04
CVE-2022-50470 [HIGH] CWE-415 CVE-2022-50470: In the Linux kernel, the following vulnerability has been resolved:
xhci: Remove device endpoints f
In the Linux kernel, the following vulnerability has been resolved:
xhci: Remove device endpoints from bandwidth list when freeing the device
Endpoints are normally deleted from the bandwidth list when they are
dropped, before the virt device is freed.
If xHC host is dying or being removed then the endpoints aren't dropped
cleanly due to functions
nvdosv
CVE-2023-53541HIGHCVSS 7.8≥ 4.2, < 4.14.326≥ 4.15, < 4.19.295+5 more2025-10-04
CVE-2023-53541 [HIGH] CWE-787 CVE-2023-53541: In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: brcmnand: Fix pot
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write
When the oob buffer length is not in multiple of words, the oob write
function does out-of-bounds read on the oob source buffer at the last
iteration. Fix that by always checking length limit on the oob buffer
r
nvdosv
CVE-2023-53537HIGHCVSS 7.8≥ 5.5, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-04
CVE-2023-53537 [HIGH] CWE-416 CVE-2023-53537: In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid use-after-fr
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid use-after-free for cached IPU bio
xfstest generic/019 reports a bug:
kernel BUG at mm/filemap.c:1619!
RIP: 0010:folio_end_writeback+0x8a/0x90
Call Trace:
end_page_writeback+0x1c/0x60
f2fs_write_end_io+0x199/0x420
bio_endio+0x104/0x180
submit_bio_noacct+0xa5/0x510
nvdosv
CVE-2022-50490HIGHCVSS 7.1≥ 5.11, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-10-04
CVE-2022-50490 [HIGH] CWE-125 CVE-2022-50490: In the Linux kernel, the following vulnerability has been resolved:
bpf: Propagate error from htab_
In the Linux kernel, the following vulnerability has been resolved:
bpf: Propagate error from htab_lock_bucket() to userspace
In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns
-EBUSY, it will go to next bucket. Going to next bucket may not only
skip the elements in current bucket silently, but also incur
out-of-bound memory acces
nvdosv
CVE-2025-39939HIGHCVSS 7.8≥ 6.15, < 6.16.9v6.172025-10-04
CVE-2025-39939 [HIGH] CWE-787 CVE-2025-39939: In the Linux kernel, the following vulnerability has been resolved:
iommu/s390: Fix memory corrupti
In the Linux kernel, the following vulnerability has been resolved:
iommu/s390: Fix memory corruption when using identity domain
zpci_get_iommu_ctrs() returns counter information to be reported as part
of device statistics; these counters are stored as part of the s390_domain.
The problem, however, is that the identity domain is not backed by an
s39
nvdosv
CVE-2023-53575HIGHCVSS 7.1≥ 6.2, < 6.4.72025-10-04
CVE-2023-53575 [HIGH] CWE-125 CVE-2023-53575: In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: fix potenti
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: fix potential array out of bounds access
Account for IWL_SEC_WEP_KEY_OFFSET when needed while verifying
key_len size in iwl_mvm_sec_key_add().
nvdosv
CVE-2023-53600HIGHCVSS 7.1≥ 5.9, < 5.10.191≥ 5.11, < 5.15.127+3 more2025-10-04
CVE-2023-53600 [HIGH] CWE-125 CVE-2023-53600: In the Linux kernel, the following vulnerability has been resolved:
tunnels: fix kasan splat when g
In the Linux kernel, the following vulnerability has been resolved:
tunnels: fix kasan splat when generating ipv4 pmtu error
If we try to emit an icmp error in response to a nonliner skb, we get
BUG: KASAN: slab-out-of-bounds in ip_compute_csum+0x134/0x220
Read of size 4 at addr ffff88811c50db00 by task iperf3/1691
CPU: 2 PID: 1691 Comm: iperf3 Not
nvdosv
CVE-2022-50508HIGHCVSS 7.1≥ 6.2, < 6.2.32025-10-04
CVE-2022-50508 [HIGH] CWE-125 CVE-2022-50508: In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt76x0: fix oob acc
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt76x0: fix oob access in mt76x0_phy_get_target_power
After 'commit ba45841ca5eb ("wifi: mt76: mt76x02: simplify struct
mt76x02_rate_power")', mt76x02 relies on ht[0-7] rate_power data for
vht mcs{0,7}, while it uses vth[0-1] rate_power for vht mcs {8,9}.
Fix a possible
nvdosv
CVE-2022-50499HIGHCVSS 7.8≥ 4.9.195, < 4.9.337≥ 4.14.147, < 4.14.303+7 more2025-10-04
CVE-2022-50499 [HIGH] CWE-415 CVE-2022-50499: In the Linux kernel, the following vulnerability has been resolved:
media: dvb-core: Fix double fre
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-core: Fix double free in dvb_register_device()
In function dvb_register_device() -> dvb_register_media_device() ->
dvb_create_media_entity(), dvb->entity is allocated and initialized. If
the initialization fails, it frees the dvb->entity, and return an error
code. The cal
nvdosv
CVE-2023-53569HIGHCVSS 7.8≥ 2.6.12.1, < 4.14.316≥ 4.15, < 4.19.284+6 more2025-10-04
CVE-2023-53569 [HIGH] CVE-2023-53569: In the Linux kernel, the following vulnerability has been resolved:
ext2: Check block size validity
In the Linux kernel, the following vulnerability has been resolved:
ext2: Check block size validity during mount
Check that log of block size stored in the superblock has sensible
value. Otherwise the shift computing the block size can overflow leading
to undefined behavior.
nvdosv
CVE-2023-53536HIGHCVSS 7.8≥ 5.8, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-04
CVE-2023-53536 [HIGH] CWE-416 CVE-2023-53536: In the Linux kernel, the following vulnerability has been resolved:
blk-crypto: make blk_crypto_evi
In the Linux kernel, the following vulnerability has been resolved:
blk-crypto: make blk_crypto_evict_key() more robust
If blk_crypto_evict_key() sees that the key is still in-use (due to a
bug) or that ->keyslot_evict failed, it currently just returns while
leaving the key linked into the keyslot management structures.
However, blk_crypto_evict_ke
nvdosv
CVE-2025-39952HIGHCVSS 7.8≥ 4.2, < 6.6.108≥ 6.7, < 6.12.49+2 more2025-10-04
CVE-2025-39952 [HIGH] CWE-787 CVE-2025-39952: In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: avoid buffer ov
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: avoid buffer overflow in WID string configuration
Fix the following copy overflow warning identified by Smatch checker.
drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()
error: '__memcpy()' 'cfg->s[i]->str' copy overflow (512 vs
nvdosv
CVE-2022-50488HIGHCVSS 7.8≥ 5.4.198, < 5.5≥ 5.10.121, < 5.10.175+4 more2025-10-04
CVE-2022-50488 [HIGH] CWE-416 CVE-2022-50488: In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix possible uaf fo
In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix possible uaf for 'bfqq->bic'
Our test report a uaf for 'bfqq->bic' in 5.10:
BUG: KASAN: use-after-free in bfq_select_queue+0x378/0xa30
CPU: 6 PID: 2318352 Comm: fsstress Kdump: loaded Not tainted 5.10.0-60.18.0.50.h602.kasan.eulerosv2r11.x86_64 #1
Hardware name: QE
nvdosv
CVE-2022-50478HIGHCVSS 7.1≥ 2.6.30, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50478 [HIGH] CWE-125 CVE-2022-50478: In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix shift-out-of-bounds
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()
Patch series "nilfs2: fix UBSAN shift-out-of-bounds warnings on mount
time".
The first patch fixes a bug reported by syzbot, and the second one fixes
the remaining bug of the same kind. Although they are triggered b
nvdosv