Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 133 of 738
CVE-2023-53568MEDIUMCVSS 5.5≥ 4.20, < 5.4.257≥ 5.5, < 5.10.195+3 more2025-10-04
CVE-2023-53568 [MEDIUM] CWE-401 CVE-2023-53568: In the Linux kernel, the following vulnerability has been resolved:
s390/zcrypt: don't leak memory
In the Linux kernel, the following vulnerability has been resolved:
s390/zcrypt: don't leak memory if dev_set_name() fails
When dev_set_name() fails, zcdn_create() doesn't free the newly
allocated resources. Do it.
nvdosv
CVE-2023-53611MEDIUMCVSS 5.5≥ 4.18, < 4.19.295≥ 4.20, < 5.4.257+5 more2025-10-04
CVE-2023-53611 [MEDIUM] CWE-401 CVE-2023-53611: In the Linux kernel, the following vulnerability has been resolved:
ipmi_si: fix a memleak in try_s
In the Linux kernel, the following vulnerability has been resolved:
ipmi_si: fix a memleak in try_smi_init()
Kmemleak reported the following leak info in try_smi_init():
unreferenced object 0xffff00018ecf9400 (size 1024):
comm "modprobe", pid 2707763, jiffies 4300851415 (age 773.308s)
backtrace:
[] __kmalloc+0x4b8/0x7b0
[] try_smi_init+0x148/0x5d
nvdosv
CVE-2023-53546MEDIUMCVSS 5.5≥ 5.4, < 5.4.253≥ 5.5, < 5.10.190+4 more2025-10-04
CVE-2023-53546 [MEDIUM] CWE-401 CVE-2023-53546: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: DR, fix memory leak i
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
when mlx5_cmd_exec failed in mlx5dr_cmd_create_reformat_ctx, the memory
pointed by 'in' is not released, which will cause memory leak. Move memory
release after mlx5_cmd_exec.
nvdosv
CVE-2023-53591MEDIUMCVSS 5.5≥ 5.13.17, < 5.14≥ 5.14.4, < 5.15.115+3 more2025-10-04
CVE-2023-53591 [MEDIUM] CWE-667 CVE-2023-53591: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix deadlock in tc r
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix deadlock in tc route query code
Cited commit causes ABBA deadlock[0] when peer flows are created while
holding the devcom rw semaphore. Due to peer flows offload implementation
the lock is taken much higher up the call chain and there is no obvious way
to easily fix
nvdosv
CVE-2022-50479MEDIUMCVSS 5.5≥ 5.11, < 6.0.32025-10-04
CVE-2022-50479 [MEDIUM] CWE-401 CVE-2022-50479: In the Linux kernel, the following vulnerability has been resolved:
drm/amd: fix potential memory l
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: fix potential memory leak
This patch fix potential memory leak (clk_src) when function run
into last return NULL.
s/free/kfree/ - Alex
nvdosv
CVE-2025-39933MEDIUMCVSS 5.5≥ 4.16, < 6.16.9v6.172025-10-04
CVE-2025-39933 [MEDIUM] CVE-2025-39933: In the Linux kernel, the following vulnerability has been resolved:
smb: client: let recv_done veri
In the Linux kernel, the following vulnerability has been resolved:
smb: client: let recv_done verify data_offset, data_length and remaining_data_length
This is inspired by the related server fixes.
nvdosv
CVE-2023-53549MEDIUMCVSS 5.5≥ 5.10.157, < 5.10.163≥ 5.13.14, < 5.14+5 more2025-10-04
CVE-2023-53549 [MEDIUM] CWE-667 CVE-2023-53549: In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Rework long t
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Rework long task execution when adding/deleting entries
When adding/deleting large number of elements in one step in ipset, it can
take a reasonable amount of time and can result in soft lockup errors. The
patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal
nvdosv
CVE-2022-50506MEDIUMCVSS 5.5≥ 5.18, < 6.0.6v6.12025-10-04
CVE-2022-50506 [MEDIUM] CWE-476 CVE-2022-50506: In the Linux kernel, the following vulnerability has been resolved:
drbd: only clone bio if we have
In the Linux kernel, the following vulnerability has been resolved:
drbd: only clone bio if we have a backing device
Commit c347a787e34cb (drbd: set ->bi_bdev in drbd_req_new) moved a
bio_set_dev call (which has since been removed) to "earlier", from
drbd_request_prepare to drbd_req_new.
The problem is that this accesses device->ldev->backing_bde
nvdosv
CVE-2023-53615MEDIUMCVSS 4.7≥ 4.11, < 5.4.258≥ 5.5, < 5.10.195+3 more2025-10-04
CVE-2023-53615 [MEDIUM] CWE-362 CVE-2023-53615: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix deletion rac
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix deletion race condition
System crash when using debug kernel due to link list corruption. The cause
of the link list corruption is due to session deletion was allowed to queue
up twice. Here's the internal trace that show the same port was allowed to
double queu
nvdosv
CVE-2023-53583MEDIUMCVSS 5.5≥ 6.1, < 6.1.40≥ 6.2, < 6.4.5+1 more2025-10-04
CVE-2023-53583 [MEDIUM] CVE-2023-53583: In the Linux kernel, the following vulnerability has been resolved:
perf: RISC-V: Remove PERF_HES_S
In the Linux kernel, the following vulnerability has been resolved:
perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()
Since commit 096b52fd2bb4 ("perf: RISC-V: throttle perf events") the
perf_sample_event_took() function was added to report time spent in
overflow interrupts. If the interrupt takes too long, the perf framework
will l
nvdosv
CVE-2023-53603MEDIUMCVSS 5.5≥ 5.15.61, < 5.15.121≥ 5.18.18, < 5.19+2 more2025-10-04
CVE-2023-53603 [MEDIUM] CWE-476 CVE-2023-53603: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Avoid fcport poi
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Avoid fcport pointer dereference
Klocwork reported warning of NULL pointer may be dereferenced. The routine
exits when sa_ctl is NULL and fcport is allocated after the exit call thus
causing NULL fcport pointer to dereference at the time of exit.
To avoid fcport po
nvdosv
CVE-2023-53558MEDIUMCVSS 5.5≥ 5.17, < 6.1.42≥ 6.2, < 6.4.72025-10-04
CVE-2023-53558 [MEDIUM] CVE-2023-53558: In the Linux kernel, the following vulnerability has been resolved:
rcu-tasks: Avoid pr_info() with
In the Linux kernel, the following vulnerability has been resolved:
rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()
pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because
pr_info() calls printk() that might sleep, this will result in BUG
like below:
[ 0.206455] cblist_init_generic: Setting adjustable number of callback qu
nvdosv
CVE-2023-53538MEDIUMCVSS 5.5≥ 3.7.1, < 6.4.4v3.72025-10-04
CVE-2023-53538 [MEDIUM] CWE-476 CVE-2023-53538: In the Linux kernel, the following vulnerability has been resolved:
btrfs: insert tree mod log move
In the Linux kernel, the following vulnerability has been resolved:
btrfs: insert tree mod log move in push_node_left
There is a fairly unlikely race condition in tree mod log rewind that
can result in a kernel panic which has the following trace:
[530.569] BTRFS critical (device sda3): unable to find logical 0 length 4096
[530.585] BTRFS critica
nvdosv
CVE-2023-53595MEDIUMCVSS 5.5≥ 6.1, < 6.1.29≥ 6.2, < 6.2.16+1 more2025-10-04
CVE-2023-53595 [MEDIUM] CWE-476 CVE-2023-53595: In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: mcs: Fix NULL poi
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: mcs: Fix NULL pointer dereferences
When system is rebooted after creating macsec interface
below NULL pointer dereference crashes occurred. This
patch fixes those crashes by using correct order of teardown
[ 3324.406942] Unable to handle kernel NULL pointer derefere
nvdosv
CVE-2023-53566MEDIUMCVSS 5.5≥ 5.10.166, < 5.10.181≥ 5.15.91, < 5.15.113+4 more2025-10-04
CVE-2023-53566 [MEDIUM] CWE-476 CVE-2023-53566: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_rbtree: fix
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_rbtree: fix null deref on element insertion
There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem():
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in r
nvdosv
CVE-2022-50501MEDIUMCVSS 5.5≥ 3.17, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-04
CVE-2022-50501 [MEDIUM] CWE-476 CVE-2022-50501: In the Linux kernel, the following vulnerability has been resolved:
media: coda: Add check for dcod
In the Linux kernel, the following vulnerability has been resolved:
media: coda: Add check for dcoda_iram_alloc
As the coda_iram_alloc may return NULL pointer,
it should be better to check the return value
in order to avoid NULL poineter dereference,
same as the others.
nvdosv
CVE-2023-53602MEDIUMCVSS 5.5≥ 5.6, < 6.1.42≥ 6.2, < 6.4.72025-10-04
CVE-2023-53602 [MEDIUM] CWE-401 CVE-2023-53602: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix memory leak i
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix memory leak in WMI firmware stats
Memory allocated for firmware pdev, vdev and beacon statistics
are not released during rmmod.
Fix it by calling ath11k_fw_stats_free() function before hardware
unregister.
While at it, avoid calling ath11k_fw_stats_free() while
nvdosv
CVE-2025-39940MEDIUMCVSS 5.5≥ 2.6.31.1, < 6.12.49≥ 6.13, < 6.16.9+2 more2025-10-04
CVE-2025-39940 [MEDIUM] CWE-190 CVE-2025-39940: In the Linux kernel, the following vulnerability has been resolved:
dm-stripe: fix a possible integ
In the Linux kernel, the following vulnerability has been resolved:
dm-stripe: fix a possible integer overflow
There's a possible integer overflow in stripe_io_hints if we have too
large chunk size. Test if the overflow happened, and if it did, don't set
limits->io_min and limits->io_opt;
nvdosv
CVE-2022-50484MEDIUMCVSS 5.5≥ 3.5, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-04
CVE-2022-50484 [MEDIUM] CWE-401 CVE-2022-50484: In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential memory leaks
When the driver hits -ENOMEM at allocating a URB or a buffer, it
aborts and goes to the error path that releases the all previously
allocated resources. However, when -ENOMEM hits at the middle of the
sync EP URB allocation loop, the part
nvdosv
CVE-2023-53535MEDIUMCVSS 5.5≥ 3.15, < 4.14.308≥ 4.15, < 4.19.276+5 more2025-10-04
CVE-2023-53535 [MEDIUM] CVE-2023-53535: In the Linux kernel, the following vulnerability has been resolved:
net: bcmgenet: Add a check for
In the Linux kernel, the following vulnerability has been resolved:
net: bcmgenet: Add a check for oversized packets
Occasionnaly we may get oversized packets from the hardware which
exceed the nomimal 2KiB buffer size we allocate SKBs with. Add an early
check which drops the packet to avoid invoking skb_over_panic() and move
on to processing the next pack
nvdosv