Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 131 of 738
CVE-2023-53584MEDIUMCVSS 5.5≥ 2.6.27, < 6.1.18≥ 6.2, < 6.2.52025-10-04
CVE-2023-53584 [MEDIUM] CWE-617 CVE-2023-53584: In the Linux kernel, the following vulnerability has been resolved:
ubifs: ubifs_releasepage: Remov
In the Linux kernel, the following vulnerability has been resolved:
ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process
There are two states for ubifs writing pages:
1. Dirty, Private
2. Not Dirty, Not Private
The normal process cannot go to ubifs_releasepage() which means there
exists pages being private but not dirty. Reprodu
nvdosv
CVE-2023-53606MEDIUMCVSS 5.5≥ 4.20, < 5.10.220≥ 5.11, < 5.15.154+2 more2025-10-04
CVE-2023-53606 [MEDIUM] CVE-2023-53606: In the Linux kernel, the following vulnerability has been resolved:
nfsd: clean up potential nfsd_f
In the Linux kernel, the following vulnerability has been resolved:
nfsd: clean up potential nfsd_file refcount leaks in COPY codepath
There are two different flavors of the nfsd4_copy struct. One is
embedded in the compound and is used directly in synchronous copies. The
other is dynamically allocated, refcounted and tracked in the client
struture. For t
nvdosv
CVE-2023-53534MEDIUMCVSS 5.5≥ 5.5, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-04
CVE-2023-53534 [MEDIUM] CWE-476 CVE-2023-53534: In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: mtk_drm_crtc: Add
In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc
As the devm_kcalloc may return NULL, the return value needs to be checked
to avoid NULL poineter dereference.
nvdosv
CVE-2023-53598MEDIUMCVSS 5.5≥ 5.7, < 5.10.192≥ 5.11, < 5.15.112+3 more2025-10-04
CVE-2023-53598 [MEDIUM] CVE-2023-53598: In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Range check CHD
In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Range check CHDBOFF and ERDBOFF
If the value read from the CHDBOFF and ERDBOFF registers is outside the
range of the MHI register space then an invalid address might be computed
which later causes a kernel panic. Range check the read value to prevent
a crash due to bad dat
nvdosv
CVE-2023-53586MEDIUMCVSS 4.7≥ 4.11, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-04
CVE-2023-53586 [MEDIUM] CWE-415 CVE-2023-53586: In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix multiple LUN_
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix multiple LUN_RESET handling
This fixes a bug where an initiator thinks a LUN_RESET has cleaned up
running commands when it hasn't. The bug was added in commit 51ec502a3266
("target: Delete tmr from list before processing").
The problem occurs when:
1. We have N
nvdosv
CVE-2023-53571MEDIUMCVSS 5.5≥ 5.7, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-04
CVE-2023-53571 [MEDIUM] CVE-2023-53571: In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Make intel_get_crtc_n
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Make intel_get_crtc_new_encoder() less oopsy
The point of the WARN was to print something, not oops
straight up. Currently that is precisely what happens
if we can't find the connector for the crtc in the atomic
state. Get the dev pointer from the atomic state instead
of the pot
nvdosv
CVE-2025-39946MEDIUMCVSS 5.5≥ 6.0, < 6.1.154≥ 6.2, < 6.6.108+3 more2025-10-04
CVE-2025-39946 [MEDIUM] CVE-2025-39946: In the Linux kernel, the following vulnerability has been resolved:
tls: make sure to abort the str
In the Linux kernel, the following vulnerability has been resolved:
tls: make sure to abort the stream if headers are bogus
Normally we wait for the socket to buffer up the whole record
before we service it. If the socket has a tiny buffer, however,
we read out the data sooner, to prevent connection stalls.
Make sure that we abort the connection when we f
nvdosv
CVE-2023-53593MEDIUMCVSS 5.5≥ 5.17.1, < 6.1.47≥ 6.2, < 6.4.12+2 more2025-10-04
CVE-2023-53593 [MEDIUM] CVE-2023-53593: In the Linux kernel, the following vulnerability has been resolved:
cifs: Release folio lock on fsc
In the Linux kernel, the following vulnerability has been resolved:
cifs: Release folio lock on fscache read hit.
Under the current code, when cifs_readpage_worker is called, the call
contract is that the callee should unlock the page. This is documented
in the read_folio section of Documentation/filesystems/vfs.rst as:
> The filesystem should unlock the
nvdosv
CVE-2023-53605MEDIUMCVSS 5.5≥ 4.15, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-04
CVE-2023-53605 [MEDIUM] CWE-401 CVE-2023-53605: In the Linux kernel, the following vulnerability has been resolved:
drm: amd: display: Fix memory l
In the Linux kernel, the following vulnerability has been resolved:
drm: amd: display: Fix memory leakage
This commit fixes memory leakage in dc_construct_ctx() function.
nvdosv
CVE-2022-50493MEDIUMCVSS 5.5≥ 5.3.17, < 5.4≥ 5.4.4, < 5.15.86+2 more2025-10-04
CVE-2022-50493 [MEDIUM] CVE-2022-50493: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix crash when I
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix crash when I/O abort times out
While performing CPU hotplug, a crash with the following stack was seen:
Call Trace:
qla24xx_process_response_queue+0x42a/0x970 [qla2xxx]
qla2x00_start_nvme_mq+0x3a2/0x4b0 [qla2xxx]
qla_nvme_post_cmd+0x166/0x240 [qla2xxx]
nvme_fc_start_fc
nvdosv
CVE-2022-50482MEDIUMCVSS 5.5≥ 4.2, < 4.14.298≥ 4.15, < 4.19.264+5 more2025-10-04
CVE-2022-50482 [MEDIUM] CWE-908 CVE-2022-50482: In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had o
nvdosv
CVE-2023-53540MEDIUMCVSS 5.5≥ 2.6.32, < 6.1.55≥ 6.2, < 6.5.52025-10-04
CVE-2023-53540 [MEDIUM] CVE-2023-53540: In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: reject auth/ass
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: reject auth/assoc to AP with our address
If the AP uses our own address as its MLD address or BSSID, then
clearly something's wrong. Reject such connections so we don't
try and fail later.
nvdosv
CVE-2025-39929MEDIUMCVSS 5.5≥ 4.16, < 6.1.154≥ 6.2, < 6.6.108+3 more2025-10-04
CVE-2025-39929 [MEDIUM] CWE-401 CVE-2025-39929: In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix smbdirect_recv
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
During tests of another unrelated patch I was able to trigger this
error: Objects remaining on __kmem_cache_shutdown()
nvdosv
CVE-2025-39953MEDIUMCVSS 5.5≥ 4.6, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-04
CVE-2025-39953 [MEDIUM] CVE-2025-39953: In the Linux kernel, the following vulnerability has been resolved:
cgroup: split cgroup_destroy_wq
In the Linux kernel, the following vulnerability has been resolved:
cgroup: split cgroup_destroy_wq into 3 workqueues
A hung task can occur during [1] LTP cgroup testing when repeatedly
mounting/unmounting perf_event and net_prio controllers with
systemd.unified_cgroup_hierarchy=1. The hang manifests in
cgroup_lock_and_drain_offline() during root destruct
nvdosv
CVE-2025-39938MEDIUMCVSS 5.5≥ 5.16, < 6.1.154≥ 6.2, < 6.6.108+3 more2025-10-04
CVE-2025-39938 [MEDIUM] CWE-476 CVE-2025-39938: In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: q6apm-lpass-dais: F
In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
If earlier opening of source graph fails (e.g. ADSP rejects due to
incorrect audioreach topology), the graph is closed and
"dai_data->graph[dai->id]" is assigned NULL. Preparing the DAI for sink
grap
nvdosv
CVE-2022-50477MEDIUMCVSS 5.5≥ 5.16, < 6.0.16≥ 6.1, < 6.1.22025-10-04
CVE-2022-50477 [MEDIUM] CWE-401 CVE-2022-50477: In the Linux kernel, the following vulnerability has been resolved:
rtc: class: Fix potential memle
In the Linux kernel, the following vulnerability has been resolved:
rtc: class: Fix potential memleak in devm_rtc_allocate_device()
devm_rtc_allocate_device() will alloc a rtc_device first, and then run
dev_set_name(). If dev_set_name() failed, the rtc_device will memleak.
Move devm_add_action_or_reset() in front of dev_set_name() to prevent
memle
nvdosv
CVE-2022-50504MEDIUMCVSS 5.5≥ 2.6.18, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50504 [MEDIUM] CVE-2022-50504: In the Linux kernel, the following vulnerability has been resolved:
powerpc/rtas: avoid scheduling
In the Linux kernel, the following vulnerability has been resolved:
powerpc/rtas: avoid scheduling in rtas_os_term()
It's unsafe to use rtas_busy_delay() to handle a busy status from
the ibm,os-term RTAS function in rtas_os_term():
Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
BUG: sleeping function called from invalid context at
nvdosv
CVE-2022-50503MEDIUMCVSS 5.5≥ 3.16, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50503 [MEDIUM] CWE-476 CVE-2022-50503: In the Linux kernel, the following vulnerability has been resolved:
mtd: lpddr2_nvm: Fix possible n
In the Linux kernel, the following vulnerability has been resolved:
mtd: lpddr2_nvm: Fix possible null-ptr-deref
It will cause null-ptr-deref when resource_size(add_range) invoked,
if platform_get_resource() returns NULL.
nvdosv
CVE-2022-50473MEDIUMCVSS 5.5≥ 5.1.6, < 5.4.229≥ 5.5, < 5.10.163+3 more2025-10-04
CVE-2022-50473 [MEDIUM] CWE-908 CVE-2022-50473: In the Linux kernel, the following vulnerability has been resolved:
cpufreq: Init completion before
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: Init completion before kobject_init_and_add()
In cpufreq_policy_alloc(), it will call uninitialed completion in
cpufreq_sysfs_release() when kobject_init_and_add() fails. And
that will cause a crash such as the following page fault in complete:
BUG: unable to handle page
nvdosv
CVE-2023-53610MEDIUMCVSS 5.5≥ 5.9, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-04
CVE-2023-53610 [MEDIUM] CVE-2023-53610: In the Linux kernel, the following vulnerability has been resolved:
irqchip: Fix refcount leak in p
In the Linux kernel, the following vulnerability has been resolved:
irqchip: Fix refcount leak in platform_irqchip_probe
of_irq_find_parent() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
nvdosv