Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 128 of 738
CVE-2023-53554HIGHCVSS 7.8≥ 4.12, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-10-04
CVE-2023-53554 [HIGH] CWE-787 CVE-2023-53554: In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buff In the Linux kernel, the following vulnerability has been resolved: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() The "exc->key_len" is a u16 that comes from the user. If it's over IW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.
nvdosv
CVE-2025-39945HIGHCVSS 7.8≥ 2.6.37, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-04
CVE-2025-39945 [HIGH] CWE-416 CVE-2025-39945: In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs i In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs in cnic_delete_task The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(), which does not guarantee that the delayed work item 'delete_task' has fully completed if it was already running. Additionally, the delayed work item is cyclic,
nvdosv
CVE-2023-53556HIGHCVSS 7.8≥ 3.14, < 5.4.251≥ 5.5, < 5.10.188+4 more2025-10-04
CVE-2023-53556 [HIGH] CWE-416 CVE-2023-53556: In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in fre In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave invalid pointers at dev->napi_list. Reproducer: [root@host ~]# cat repro.sh #!/bin/bash pf_dbsf="0000
nvdosv
CVE-2023-53560HIGHCVSS 7.8≥ 4.17, < 4.19.291≥ 4.20, < 5.4.251+5 more2025-10-04
CVE-2023-53560 [HIGH] CWE-416 CVE-2023-53560: In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histogr In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Add histograms to hist_vars if they have referenced variables Hist triggers can have referenced variables without having direct variables fields. This can be the case if referenced variables are added for trigger actions. In this case the newly added references w
nvdosv
CVE-2023-53596HIGHCVSS 7.8≥ 3.7, < 6.1.53≥ 6.2, < 6.4.16+1 more2025-10-04
CVE-2023-53596 [HIGH] CWE-415 CVE-2023-53596: In the Linux kernel, the following vulnerability has been resolved: drivers: base: Free devm resour In the Linux kernel, the following vulnerability has been resolved: drivers: base: Free devm resources when unregistering a device In the current code, devres_release_all() only gets called if the device has a bus and has been probed. This leads to issues when using bus-less or driver-less devices where the device might never get freed if a managed
nvdosv
CVE-2023-53578HIGHCVSS 7.8≥ 5.6, < 5.10.178≥ 5.11, < 5.15.108+3 more2025-10-04
CVE-2023-53578 [HIGH] CWE-908 CVE-2023-53578: In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Fix an uninit variab In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() Syzbot reported a bug as following: BUG: KMSAN: uninit-value in qrtr_tx_resume+0x185/0x1f0 net/qrtr/af_qrtr.c:230 qrtr_tx_resume+0x185/0x1f0 net/qrtr/af_qrtr.c:230 qrtr_endpoint_post+0xf85/0x11b0 net/qrtr/af_qrtr.c:51
nvdosv
CVE-2025-39943HIGHCVSS 7.1≥ 5.15.1, < 5.15.194≥ 5.16, < 6.1.154+5 more2025-10-04
CVE-2025-39943 [HIGH] CWE-125 CVE-2025-39943: In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate data In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer If data_offset and data_length of smb_direct_data_transfer struct are invalid, out of bounds issue could happen. This patch validate data_offset and data_length field in recv_done.
nvdosv
CVE-2023-53572HIGHCVSS 7.8≥ 5.11, < 5.15.121≥ 5.16, < 6.1.39+2 more2025-10-04
CVE-2023-53572 [HIGH] CWE-416 CVE-2023-53572: In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list i In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the loop.
nvdosv
CVE-2022-50497HIGHCVSS 7.1≥ 2.6.12.1, < 4.9.337≥ 4.10, < 4.14.303+7 more2025-10-04
CVE-2022-50497 [HIGH] CWE-125 CVE-2022-50497: In the Linux kernel, the following vulnerability has been resolved: binfmt_misc: fix shift-out-of-b In the Linux kernel, the following vulnerability has been resolved: binfmt_misc: fix shift-out-of-bounds in check_special_flags UBSAN reported a shift-out-of-bounds warning: left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x8d/0xcf lib/dump_stack.c:106 ubsan_epil
nvdosv
CVE-2023-53604HIGHCVSS 7.8≥ 4.12, < 4.14.315≥ 4.15, < 4.19.283+6 more2025-10-04
CVE-2023-53604 [HIGH] CVE-2023-53604: In the Linux kernel, the following vulnerability has been resolved: dm integrity: call kmem_cache_d In the Linux kernel, the following vulnerability has been resolved: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path Otherwise the journal_io_cache will leak if dm_register_target() fails.
nvdosv
CVE-2025-39944HIGHCVSS 7.8≥ 6.1, < 6.1.154≥ 6.2, < 6.6.108+3 more2025-10-04
CVE-2025-39944 [HIGH] CWE-416 CVE-2025-39944: In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-fre In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() The original code relies on cancel_delayed_work() in otx2_ptp_destroy(), which does not ensure that the delayed work item synctstamp_work has fully completed if it was already running. This leads to use-after-free scenarios
nvdosv
CVE-2023-53577HIGHCVSS 7.8≥ 4.15, < 5.15.126≥ 5.16, < 6.1.45+2 more2025-10-04
CVE-2023-53577 [HIGH] CWE-401 CVE-2023-53577: In the Linux kernel, the following vulnerability has been resolved: bpf, cpumap: Make sure kthread In the Linux kernel, the following vulnerability has been resolved: bpf, cpumap: Make sure kthread is running before map update returns The following warning was reported when running stress-mode enabled xdp_redirect_cpu with some RT threads: ------------[ cut here ]------------ WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135 CPU: 4 PID: 65 Comm:
nvdosv
CVE-2022-50496HIGHCVSS 7.8≥ 3.9, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50496 [HIGH] CWE-416 CVE-2022-50496: In the Linux kernel, the following vulnerability has been resolved: dm cache: Fix UAF in destroy() In the Linux kernel, the following vulnerability has been resolved: dm cache: Fix UAF in destroy() Dm_cache also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in destroy().
nvdosv
CVE-2023-53608HIGHCVSS 7.8≥ 2.6.30, < 4.14.313≥ 4.15, < 4.19.281+6 more2025-10-04
CVE-2023-53608 [HIGH] CWE-416 CVE-2023-53608: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of st In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() The finalization of nilfs_segctor_thread() can race with nilfs_segctor_kill_thread() which terminates that thread, potentially causing a use-after-free BUG as KASAN detected. At the end of nilfs_segctor_thr
nvdosv
CVE-2023-53552HIGHCVSS 7.8≥ 6.0, < 6.1.54≥ 6.2, < 6.5.42025-10-04
CVE-2023-53552 [HIGH] CWE-416 CVE-2023-53552: In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references
nvdosv
CVE-2023-53544HIGHCVSS 7.8≥ 2.6.33, < 4.14.308≥ 4.15, < 6.1.16+1 more2025-10-04
CVE-2023-53544 [HIGH] CWE-416 CVE-2023-53544: In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use a In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use after free The remove function first frees the clks and only then calls cpufreq_unregister_driver(). If one of the cpufreq callbacks is called just before cpufreq_unregister_driver() is run, the freed clks might be used.
nvdosv
CVE-2025-39951HIGHCVSS 7.8≥ 5.5, < 5.10.245≥ 5.11, < 5.15.194+5 more2025-10-04
CVE-2025-39951 [HIGH] CWE-416 CVE-2025-39951: In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-f In the Linux kernel, the following vulnerability has been resolved: um: virtio_uml: Fix use-after-free after put_device in probe When register_virtio_device() fails in virtio_uml_probe(), the code sets vu_dev->registered = 1 even though the device was not successfully registered. This can lead to use-after-free or other issues.
nvdosv
CVE-2025-39935HIGHCVSS 7.8≥ 6.13, < 6.16.9v6.172025-10-04
CVE-2025-39935 [HIGH] CWE-787 CVE-2025-39935: In the Linux kernel, the following vulnerability has been resolved: ASoC: codec: sma1307: Fix memor In the Linux kernel, the following vulnerability has been resolved: ASoC: codec: sma1307: Fix memory corruption in sma1307_setting_loaded() The sma1307->set.header_size is how many integers are in the header (there are 8 of them) but instead of allocating space of 8 integers we allocate 8 bytes. This leads to memory corruption when we copy data it o
nvdosv
CVE-2022-50485MEDIUMCVSS 5.5≥ 3.10, < 5.4.229≥ 5.5, < 5.10.163+3 more2025-10-04
CVE-2022-50485 [MEDIUM] CVE-2022-50485: In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag to In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode There are many places that will get unhappy (and crash) when ext4_iget() returns a bad inode. However, if iget the boot loader inode, allows a bad inode to be returned, because the inode may not be initialized. This mechanism ca
nvdosv
CVE-2022-50505MEDIUMCVSS 5.5≥ 4.14, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-10-04
CVE-2022-50505 [MEDIUM] CVE-2022-50505: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refco In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it before returning from ppr_n
nvdosv