Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 132 of 738
CVE-2022-50486MEDIUMCVSS 5.5≥ 4.0, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50486 [MEDIUM] CVE-2022-50486: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: Fix return t In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: Fix return type of netcp_ndo_start_xmit() With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function pointer prototype to make sure the call target is valid to help mitigate ROP attacks. If they
nvdosv
CVE-2023-53565MEDIUMCVSS 5.5≥ 6.2, < 6.3.4v6.42025-10-04
CVE-2023-53565 [MEDIUM] CWE-476 CVE-2023-53565: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Check for probe In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Check for probe() id argument being NULL The probe() id argument may be NULL in 2 scenarios: 1. brcmf_pcie_pm_leave_D3() calling brcmf_pcie_probe() to reprobe the device. 2. If a user tries to manually bind the driver from sysfs then the sdio / pcie / usb probe()
nvdosv
CVE-2022-50498MEDIUMCVSS 5.5≥ 5.14, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-10-04
CVE-2022-50498 [MEDIUM] CVE-2022-50498: In the Linux kernel, the following vulnerability has been resolved: eth: alx: take rtnl_lock on res In the Linux kernel, the following vulnerability has been resolved: eth: alx: take rtnl_lock on resume Zbynek reports that alx trips an rtnl assertion on resume: RTNL: assertion failed at net/core/dev.c (2891) RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0 Call Trace: __alx_open+0x230/0x570 [alx] alx_resume+0x54/0x80 [alx] ? pci_legacy_resume+0x80/0
nvdosv
CVE-2022-50491MEDIUMCVSS 5.5≥ 5.7, < 5.10.154≥ 5.11, < 5.15.77+2 more2025-10-04
CVE-2022-50491 [MEDIUM] CVE-2022-50491: In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in cti In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in cti_disable_hw() cti_enable_hw() and cti_disable_hw() are called from an atomic context so shouldn't use runtime PM because it can result in a sleep when communicating with firmware. Since commit 3c6656337852 ("Revert "firmware: arm_scmi: Add clock management
nvdosv
CVE-2023-53588MEDIUMCVSS 5.5≥ 3.8, < 6.1.55≥ 6.2, < 6.5.52025-10-04
CVE-2023-53588 [MEDIUM] CVE-2023-53588: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for stati In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for station first in client probe When probing a client, first check if we have it, and then check for the channel context, otherwise you can trigger the warning there easily by probing when the AP isn't even started yet. Since a client existing means the AP is also
nvdosv
CVE-2025-39932MEDIUMCVSS 5.5≥ 4.16, < 6.12.49≥ 6.13, < 6.16.9+1 more2025-10-04
CVE-2025-39932 [MEDIUM] CVE-2025-39932: In the Linux kernel, the following vulnerability has been resolved: smb: client: let smbd_destroy() In the Linux kernel, the following vulnerability has been resolved: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) In smbd_destroy() we may destroy the memory so we better wait until post_send_credits_work is no longer pending and will never be started again. I actually just hit the case using rxe: WARNING: CPU: 0
nvdosv
CVE-2023-53573MEDIUMCVSS 5.5≥ 6.0.8, < 6.1≥ 6.1.1, < 6.1.25+3 more2025-10-04
CVE-2023-53573 [MEDIUM] CVE-2023-53573: In the Linux kernel, the following vulnerability has been resolved: clk: rs9: Fix suspend/resume D In the Linux kernel, the following vulnerability has been resolved: clk: rs9: Fix suspend/resume Disabling the cache in commit 2ff4ba9e3702 ("clk: rs9: Fix I2C accessors") without removing cache synchronization in resume path results in a kernel panic as map->cache_ops is unset, due to REGCACHE_NONE. Enable flat cache again to support resume again. num_re
nvdosv
CVE-2022-50500MEDIUMCVSS 5.5≥ 4.17, < 6.0.7v6.12025-10-04
CVE-2022-50500 [MEDIUM] CWE-401 CVE-2022-50500: In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix memory leak in n In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed If some items in nsim_dev_resources_register() fail, memory leak will occur. The following is the memory leak information. unreferenced object 0xffff888074c02600 (size 128): comm "echo", pid
nvdosv
CVE-2023-53580MEDIUMCVSS 5.5≥ 6.1.35, < 6.1.46≥ 6.3.9, < 6.4+3 more2025-10-04
CVE-2023-53580 [MEDIUM] CWE-667 CVE-2023-53580: In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent In the Linux kernel, the following vulnerability has been resolved: USB: Gadget: core: Help prevent panic during UVC unconfigure Avichal Rakesh reported a kernel panic that occurred when the UVC gadget driver was removed from a gadget's configuration. The panic involves a somewhat complicated interaction between the kernel driver and a userspace c
nvdosv
CVE-2025-39947MEDIUMCVSS 5.5≥ 5.13, < 6.6.108≥ 6.7, < 6.12.49+2 more2025-10-04
CVE-2025-39947 [MEDIUM] CWE-476 CVE-2025-39947: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Harden uplink netdev In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Harden uplink netdev access against device unbind The function mlx5_uplink_netdev_get() gets the uplink netdevice pointer from mdev->mlx5e_res.uplink_netdev. However, the netdevice can be removed and its pointer cleared when unbound from the mlx5_core.eth driver. This r
nvdosv
CVE-2023-53582MEDIUMCVSS 5.5≥ 4.15, < 4.19.276≥ 4.20, < 5.4.235+4 more2025-10-04
CVE-2023-53582 [MEDIUM] CWE-476 CVE-2023-53582: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: ensure CLM vers In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds Fix a stack-out-of-bounds read in brcmfmac that occurs when 'buf' that is not null-terminated is passed as an argument of strreplace() in brcmf_c_preinit_dcmds(). This buffer is filled with a CLM
nvdosv
CVE-2022-50483MEDIUMCVSS 5.5≥ 5.13, < 5.15.86≥ 5.16, < 6.0.16+1 more2025-10-04
CVE-2022-50483 [MEDIUM] CVE-2022-50483: In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid buffer leaks In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid buffer leaks on xdp_do_redirect() failure Before enetc_clean_rx_ring_xdp() calls xdp_do_redirect(), each software BD in the RX ring between index orig_i and i can have one of 2 refcount values on its page. We are the owner of the current buffer that is being processed, s
nvdosv
CVE-2023-53545MEDIUMCVSS 5.5≥ 4.2, < 6.4.122025-10-04
CVE-2023-53545 [MEDIUM] CVE-2023-53545: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: unmap and remove cs In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: unmap and remove csa_va properly Root PD BO should be reserved before unmap and remove a bo_va from VM otherwise lockdep will complain. v2: check fpriv->csa_va is not NULL instead of amdgpu_mcbp (christian) [14616.936827] WARNING: CPU: 6 PID: 1711 at drivers/gpu/drm/amd/amdg
nvdosv
CVE-2023-53542MEDIUMCVSS 5.5≥ 4.2, < 4.14.308≥ 4.15, < 4.19.276+5 more2025-10-04
CVE-2023-53542 [MEDIUM] CVE-2023-53542: In the Linux kernel, the following vulnerability has been resolved: ARM: dts: exynos: Use Exynos542 In the Linux kernel, the following vulnerability has been resolved: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy For some reason, the driver adding support for Exynos5420 MIPI phy back in 2016 wasn't used on Exynos5420, which caused a kernel panic. Add the proper compatible for it.
nvdosv
CVE-2023-53607MEDIUMCVSS 5.5≥ 4.9.325, < 4.10≥ 4.14.290, < 4.15+7 more2025-10-04
CVE-2023-53607 [MEDIUM] CWE-617 CVE-2023-53607: In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Fix BUG_ON in pro In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Fix BUG_ON in probe function The snd_dma_buffer.bytes field now contains the aligned size, which this snd_BUG_ON() did not account for, resulting in the following: [ 9.625915] ------------[ cut here ]------------ [ 9.633440] WARNING: CPU: 0 PID: 126 at sound/pci/ymf
nvdosv
CVE-2023-53612MEDIUMCVSS 5.5≥ 4.10, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-04
CVE-2023-53612 [MEDIUM] CWE-476 CVE-2023-53612: In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Simplify plat In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Simplify platform device handling Coretemp's platform driver is unconventional. All the real work is done globally by the initcall and CPU hotplug notifiers, while the "driver" effectively just wraps an allocation and the registration of the hwmon interface in a
nvdosv
CVE-2022-50481MEDIUMCVSS 5.5≥ 4.6, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50481 [MEDIUM] CWE-476 CVE-2022-50481: In the Linux kernel, the following vulnerability has been resolved: cxl: fix possible null-ptr-dere In the Linux kernel, the following vulnerability has been resolved: cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter() If device_register() fails in cxl_register_afu|adapter(), the device is not added, device_unregister() can not be called in the error path, otherwise it will cause a null-ptr-deref because of removing not added devic
nvdosv
CVE-2025-39936MEDIUMCVSS 5.5≥ 6.16, < 6.16.9v6.172025-10-04
CVE-2025-39936 [MEDIUM] CWE-476 CVE-2025-39936: In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Always pass in an In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Always pass in an error pointer to __sev_platform_shutdown_locked() When 9770b428b1a2 ("crypto: ccp - Move dev_info/err messages for SEV/SNP init and shutdown") moved the error messages dumping so that they don't need to be issued by the callers, it missed the case
nvdosv
CVE-2023-53581MEDIUMCVSS 4.7≥ 5.4, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-10-04
CVE-2023-53581 [MEDIUM] CWE-362 CVE-2023-53581: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Check for NOT_READY flag state after locking Currently the check for NOT_READY flag is performed before obtaining the necessary lock. This opens a possibility for race condition when the flow is concurrently removed from unready_flows list by the workqueue task, which ca
nvdosv
CVE-2023-53576MEDIUMCVSS 5.5≥ 4.20, < 5.10.181≥ 5.11, < 5.15.113+2 more2025-10-04
CVE-2023-53576 [MEDIUM] CWE-476 CVE-2023-53576: In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mo In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O path, without this patch we get OOPs when queue mode is set to 1 from configfs, following are repro
nvdosv