Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 130 of 738
CVE-2025-39950MEDIUMCVSS 5.5≥ 6.7, < 6.12.49≥ 6.13, < 6.16.9+1 more2025-10-04
CVE-2025-39950 [MEDIUM] CWE-476 CVE-2025-39950: In the Linux kernel, the following vulnerability has been resolved: net/tcp: Fix a NULL pointer der In the Linux kernel, the following vulnerability has been resolved: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR A NULL pointer dereference can occur in tcp_ao_finish_connect() during a connect() system call on a socket with a TCP-AO key added and TCP_REPAIR enabled. The function is called with skb being NULL and atte
nvdosv
CVE-2023-53567MEDIUMCVSS 5.5≥ 3.15, < 4.19.283≥ 4.20, < 5.4.243+5 more2025-10-04
CVE-2023-53567 [MEDIUM] CWE-401 CVE-2023-53567: In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error path. this is never retried later and so this is a permanent leak. To fix this, only skip hardware disa
nvdosv
CVE-2023-53599MEDIUMCVSS 5.5≥ 6.5, < 6.5.32025-10-04
CVE-2023-53599 [MEDIUM] CWE-476 CVE-2023-53599: In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix missing in In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390 Fix af_alg_alloc_areq() to initialise areq->first_rsgl.sgl.sgt.sgl to point to the scatterlist array in areq->first_rsgl.sgl.sgl. Without this, the gcm-aes-s390 driver will oops when it tries to do gcm_walk_start(
nvdosv
CVE-2025-39948MEDIUMCVSS 5.5≥ 6.6.78, < 6.7≥ 6.12.14, < 6.12.49+4 more2025-10-04
CVE-2025-39948 [MEDIUM] CWE-401 CVE-2025-39948: In the Linux kernel, the following vulnerability has been resolved: ice: fix Rx page leak on multi- In the Linux kernel, the following vulnerability has been resolved: ice: fix Rx page leak on multi-buffer frames The ice_put_rx_mbuf() function handles calling ice_put_rx_buf() for each buffer in the current frame. This function was introduced as part of handling multi-buffer XDP support in the ice driver. It works by iterating over the buffers f
nvdosv
CVE-2023-53547MEDIUMCVSS 5.5≥ 6.1, < 6.1.30≥ 6.2, < 6.3.42025-10-04
CVE-2023-53547 [MEDIUM] CVE-2023-53547: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix sdma v4 sw fini In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix sdma v4 sw fini error Fix sdma v4 sw fini error for sdma 4.2.2 to solve the following general protection fault [ +0.108196] general protection fault, probably for non-canonical address 0xd5e5a4ae79d24a32: 0000 [#1] PREEMPT SMP PTI [ +0.000018] RIP: 0010:free_fw_priv+0xd/0
nvdosv
CVE-2023-53589MEDIUMCVSS 5.5≥ 4.1, < 5.4.244≥ 5.5, < 5.10.181+4 more2025-10-04
CVE-2023-53589 [MEDIUM] CVE-2023-53589: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trust firmware n_channels If the firmware sends us a corrupted MCC response with n_channels much larger than the command response can be, we might copy far too much (uninitialized) memory and even crash if the n_channels is large enough to make it run out of the
nvdosv
CVE-2023-53553MEDIUMCVSS 5.5≥ 6.2, < 6.4.5v6.52025-10-04
CVE-2023-53553 [MEDIUM] CVE-2023-53553: In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: avoid struct memcp In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: avoid struct memcpy overrun warning A previous patch addressed the fortified memcpy warning for most builds, but I still see this one with gcc-9: In file included from include/linux/string.h:254, from drivers/hid/hid-hyperv.c:8: In function 'fortify_memcpy_chk', inlined from
nvdosv
CVE-2023-53562MEDIUMCVSS 5.5≥ 4.19.169, < 4.20≥ 5.4.91, < 5.5+5 more2025-10-04
CVE-2023-53562 [MEDIUM] CWE-401 CVE-2023-53562: In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix vram leak on bind In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix vram leak on bind errors Make sure to release the VRAM buffer also in a case a subcomponent fails to bind. Patchwork: https://patchwork.freedesktop.org/patch/525094/
nvdosv
CVE-2023-53561MEDIUMCVSS 5.5≥ 5.14, < 6.1.30≥ 6.2, < 6.3.4+1 more2025-10-04
CVE-2023-53561 [MEDIUM] CWE-476 CVE-2023-53561: In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: fix NULL point In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: fix NULL pointer dereference when removing device In suspend and resume cycle, the removal and rescan of device ends up in NULL pointer dereference. During driver initialization, if the ipc_imem_wwan_channel_init() fails to get the valid device capabilities it re
nvdosv
CVE-2022-50475MEDIUMCVSS 5.5≥ 5.14, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-10-04
CVE-2022-50475 [MEDIUM] CWE-476 CVE-2022-50475: In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" is valid when access sysfs node The "ib_port" structure must be set before adding the sysfs kobject, and reset after removing it, otherwise it may crash when accessing the sysfs node: Unable to handle kernel NULL pointer dereference at virtual address
nvdosv
CVE-2022-50471MEDIUMCVSS 5.5≥ 2.6.38, < 5.10.152≥ 5.11, < 5.15.75+2 more2025-10-04
CVE-2022-50471 [MEDIUM] CVE-2022-50471: In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Accommodate VMA spl In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Accommodate VMA splitting Prior to this commit, the gntdev driver code did not handle the following scenario correctly with paravirtualized (PV) Xen domains: * User process sets up a gntdev mapping composed of two grant mappings (i.e., two pages shared by another Xen domain).
nvdosv
CVE-2023-53557MEDIUMCVSS 5.5≥ 5.18, < 6.1.40≥ 6.2, < 6.4.5+1 more2025-10-04
CVE-2023-53557 [MEDIUM] CVE-2023-53557: In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after t In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-canonical address \ 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI ... Call Trace: fprobe_handler+0x
nvdosv
CVE-2025-39949MEDIUMCVSS 5.5≥ 4.18, < 5.10.245≥ 5.11, < 5.15.194+5 more2025-10-04
CVE-2025-39949 [MEDIUM] CVE-2025-39949: In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many pro In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many protection override GRC elements In the protection override dump path, the firmware can return far too many GRC elements, resulting in attempting to write past the end of the previously-kmalloc'ed dump buffer. This will result in a kernel panic with reason: B
nvdosv
CVE-2023-53539MEDIUMCVSS 5.5≥ 4.8.1, < 6.1.53≥ 6.2, < 6.4.16+2 more2025-10-04
CVE-2023-53539 [MEDIUM] CVE-2023-53539: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped by the IP layer in rxe_requester() the call to rxe_xmit_packet() can fail with err == -EAGAIN. To recover, the state of the wqe is restored to the state before the packet was sent so it can be resent. However,
nvdosv
CVE-2023-53609MEDIUMCVSS 5.5≥ 6.2, < 6.3.4v6.42025-10-04
CVE-2023-53609 [MEDIUM] CVE-2023-53609: In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do no In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed" The "atomic_inc(&cmd->device->iorequest_cnt)" in scsi_queue_rq() would cause kernel panic because cmd->device may be freed after returning from scsi_dispatch_cmd(). This reverts commit cfee29ffb45b1
nvdosv
CVE-2023-53533MEDIUMCVSS 5.5≥ 5.0, < 5.4.243≥ 5.5, < 5.10.180+4 more2025-10-04
CVE-2023-53533 [MEDIUM] CVE-2023-53533: In the Linux kernel, the following vulnerability has been resolved: Input: raspberrypi-ts - fix ref In the Linux kernel, the following vulnerability has been resolved: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe rpi_firmware_get() take reference, we need to release it in error paths as well. Use devm_rpi_firmware_get() helper to handling the resources. Also remove the existing rpi_firmware_put().
nvdosv
CVE-2022-50472MEDIUMCVSS 5.5≥ 5.2, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-10-04
CVE-2022-50472 [MEDIUM] CVE-2022-50472: In the Linux kernel, the following vulnerability has been resolved: IB/mad: Don't call to function In the Linux kernel, the following vulnerability has been resolved: IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220 CPU
nvdosv
CVE-2025-39934MEDIUMCVSS 5.5≥ 5.11, < 5.15.194≥ 5.16, < 6.1.154+4 more2025-10-04
CVE-2025-39934 [MEDIUM] CWE-476 CVE-2025-39934: In the Linux kernel, the following vulnerability has been resolved: drm: bridge: anx7625: Fix NULL In the Linux kernel, the following vulnerability has been resolved: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ If the interrupt occurs before resource initialization is complete, the interrupt handler/worker may access uninitialized data such as the I2C tcpc_client device, potentially leading to NULL pointer dereference.
nvdosv
CVE-2023-53563MEDIUMCVSS 5.5≥ 6.1, < 6.1.53≥ 6.2, < 6.4.16+1 more2025-10-04
CVE-2023-53563 [MEDIUM] CVE-2023-53563: In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate-ut: Fix ker In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver After loading the amd-pstate-ut driver, amd_pstate_ut_check_perf() and amd_pstate_ut_check_freq() use cpufreq_cpu_get() to get the policy of the CPU and mark it as busy. In these functions, cpufreq_cpu_put() should be used
nvdosv
CVE-2023-53548MEDIUMCVSS 5.5≥ 2.6.14, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-10-04
CVE-2023-53548 [MEDIUM] CVE-2023-53548: In the Linux kernel, the following vulnerability has been resolved: net: usbnet: Fix WARNING in usb In the Linux kernel, the following vulnerability has been resolved: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb The syzbot fuzzer identified a problem in the usbnet driver: usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0 PID: 754 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504 Modules linked
nvdosv