Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 134 of 738
CVE-2023-53550MEDIUMCVSS 5.5≥ 6.4, < 6.4.11v6.52025-10-04
CVE-2023-53550 [MEDIUM] CVE-2023-53550: In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix global In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix global sysfs attribute type In commit 3666062b87ec ("cpufreq: amd-pstate: move to use bus_get_dev_root()") the "amd_pstate" attributes where moved from a dedicated kobject to the cpu root kobject. While the dedicated kobject expects to contain kobj_attributes the
nvdosv
CVE-2025-39937MEDIUMCVSS 5.5≥ 4.6, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-04
CVE-2025-39937 [MEDIUM] CWE-476 CVE-2025-39937: In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash du In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer Since commit 7d5e9737efda ("net: rfkill: gpio: get the name and type from device property") rfkill_find_type() gets called with the possibly uninitialized "const char *type_name;" local variable. On x86 sys
nvdosv
CVE-2022-50502UNKNOWN≥ 0, < 5.5.13-12025-10-04
CVE-2022-50502 CVE-2022-50502: In the Linux kernel, the following vulnerability has been resolved: mm: /proc/pid/smaps_rollup: fix no vma's null-deref Commit 258f669e7e88 ("mm: /pro In the Linux kernel, the following vulnerability has been resolved: mm: /proc/pid/smaps_rollup: fix no vma's null-deref Commit 258f669e7e88 ("mm: /proc/pid/smaps_rollup: convert to single value seq_file") introduced a null-deref if there are no vma's in the task in show_smaps_rollup.
osv
CVE-2022-50495UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-10-04
CVE-2022-50495 CVE-2022-50495: In the Linux kernel, the following vulnerability has been resolved: x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() These local variables @{resch In the Linux kernel, the following vulnerability has been resolved: x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() These local variables @{resched|pmu|callfunc...}_name saves the new string allocated by kasprintf(), and when bind_{v}ipi_to_irqhandler() fails, it goes to the @fail tag, and calls xen_smp_intr_fre
osv
CVE-2022-50487UNKNOWN≥ 0, < 5.10.221-1≥ 0, < 6.0.3-12025-10-04
CVE-2022-50487 CVE-2022-50487: In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READDIR Since before the git e In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READDIR Since before the git era, NFSD has conserved the number of pages held by each nfsd thread by combining the RPC receive and send buffers into a single array of pages. This works because there
osv
CVE-2022-50437HIGHCVSS 7.8≥ 3.12, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-01
CVE-2022-50437 [HIGH] CWE-787 CVE-2022-50437: In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: fix memory corrup In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: fix memory corruption with too many bridges Add the missing sanity check on the bridge counter to avoid corrupting data beyond the fixed-sized bridge array in case there are ever more than eight bridges. Patchwork: https://patchwork.freedesktop.org/patch/502670/
nvdosv
CVE-2023-53515HIGHCVSS 7.8≥ 4.15.1, < 4.19.293≥ 4.20, < 5.4.255+6 more2025-10-01
CVE-2023-53515 [HIGH] CWE-416 CVE-2023-53515: In the Linux kernel, the following vulnerability has been resolved: virtio-mmio: don't break lifecy In the Linux kernel, the following vulnerability has been resolved: virtio-mmio: don't break lifecycle of vm_dev vm_dev has a separate lifecycle because it has a 'struct device' embedded. Thus, having a release callback for it is correct. Allocating the vm_dev struct with devres totally breaks this protection, though. Instead of waiting for the vm_
nvdosv
CVE-2023-53508HIGHCVSS 7.8≥ 6.0, < 6.1.43≥ 6.2, < 6.4.8+1 more2025-10-01
CVE-2023-53508 [HIGH] CVE-2023-53508: In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if q In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if queue setup is interrupted In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered. Reported by German when w
nvdosv
CVE-2023-53473HIGHCVSS 7.8≥ 5.2, < 5.15.112≥ 5.16, < 6.1.29+3 more2025-10-01
CVE-2023-53473 [HIGH] CVE-2023-53473: In the Linux kernel, the following vulnerability has been resolved: ext4: improve error handling fr In the Linux kernel, the following vulnerability has been resolved: ext4: improve error handling from ext4_dirhash() The ext4_dirhash() will *almost* never fail, especially when the hash tree feature was first introduced. However, with the addition of support of encrypted, casefolded file names, that function can most certainly fail today. So make sure the
nvdosv
CVE-2025-39913HIGHCVSS 7.8≥ 4.17, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-01
CVE-2025-39913 [HIGH] CVE-2025-39913: In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Call sk_msg_free() whe In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. syzbot reported the splat below. [0] The repro does the following: 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes) 2. Attach the prog to a SOCKMAP 3. Add a socket to the SOCKMAP 4.
nvdosv
CVE-2023-53516HIGHCVSS 7.8≥ 6.4, < 6.4.8v6.52025-10-01
CVE-2023-53516 [HIGH] CVE-2023-53516: In the Linux kernel, the following vulnerability has been resolved: macvlan: add forgotten nla_poli In the Linux kernel, the following vulnerability has been resolved: macvlan: add forgotten nla_policy for IFLA_MACVLAN_BC_CUTOFF The previous commit 954d1fa1ac93 ("macvlan: Add netlink attribute for broadcast cutoff") added one additional attribute named IFLA_MACVLAN_BC_CUTOFF to allow broadcast cutfoff. However, it forgot to describe the nla_policy at mac
nvdosv
CVE-2025-39896HIGHCVSS 7.8≥ 6.8, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39896 [HIGH] CWE-416 CVE-2025-39896: In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Prevent recovery wo In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Prevent recovery work from being queued during device removal Use disable_work_sync() instead of cancel_work_sync() in ivpu_dev_fini() to ensure that no new recovery work items can be queued after device removal has started. Previously, recovery work could be scheduled e
nvdosv
CVE-2025-39905HIGHCVSS 7.0fixed in 6.16.8v6.172025-10-01
CVE-2025-39905 [HIGH] CWE-362 CVE-2025-39905: In the Linux kernel, the following vulnerability has been resolved: net: phylink: add lock for seri In the Linux kernel, the following vulnerability has been resolved: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver Currently phylink_resolve() protects itself against concurrent phylink_bringup_phy() or phylink_disconnect_phy() calls which modify pl->phydev by relying on pl->state_mutex. The problem is that in phy
nvdosv
CVE-2025-39922HIGHCVSS 7.1≥ 6.9, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39922 [HIGH] CWE-125 CVE-2025-39922: In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used i In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used in eee linkmode incorrectly used ixgbe_lp_map in loops intended to populate the supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map. This results in incorrect bit setting and potential out-of-bounds access, since ixgbe_lp_map and ixgbe_l
nvdosv
CVE-2023-53504HIGHCVSS 7.8≥ 6.3, < 6.4.11v6.52025-10-01
CVE-2023-53504 [HIGH] CWE-416 CVE-2023-53504: In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Properly order ib In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Properly order ib_device_unalloc() to avoid UAF ib_dealloc_device() should be called only after device cleanup. Fix the dealloc sequence.
nvdosv
CVE-2023-53485HIGHCVSS 7.8≥ 2.6.12.1, < 4.14.324≥ 4.15, < 4.19.293+6 more2025-10-01
CVE-2023-53485 [HIGH] CWE-129 CVE-2023-53485: In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:1965:6 index -84 is out of range for type 's8[341]' (aka 'signed char[341]') CPU: 1 PID: 4995 Comm: syz-executor146 Not tain
nvdosv
CVE-2023-53500HIGHCVSS 7.8≥ 3.19.1, < 4.19.293≥ 4.20, < 5.4.255+6 more2025-10-01
CVE-2023-53500 [HIGH] CWE-416 CVE-2023-53500: In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free i In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when the xfrm device sends IPv6 packets. The stack information is as follows
nvdosv
CVE-2023-53522HIGHCVSS 7.8≥ 6.1, < 6.1.25≥ 6.2, < 6.2.12+1 more2025-10-01
CVE-2023-53522 [HIGH] CVE-2023-53522: In the Linux kernel, the following vulnerability has been resolved: cgroup,freezer: hold cpu_hotplu In the Linux kernel, the following vulnerability has been resolved: cgroup,freezer: hold cpu_hotplug_lock before freezer_mutex syzbot is reporting circular locking dependency between cpu_hotplug_lock and freezer_mutex, for commit f5d39b020809 ("freezer,sched: Rewrite core freezer logic") replaced atomic_inc() in freezer_apply_state() with static_branch_inc(
nvdosv
CVE-2023-53521HIGHCVSS 7.1≥ 2.6.25, < 4.14.308≥ 4.15, < 4.19.276+5 more2025-10-01
CVE-2023-53521 [HIGH] CWE-125 CVE-2023-53521: In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix slab-out-of-boun In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() A fix for: BUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses] Read of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013 When edev->components is zero, accessing edev->component[0] members is wrong.
nvdosv
CVE-2023-53510HIGHCVSS 7.8≥ 3.12, < 6.3.13≥ 6.4, < 6.4.42025-10-01
CVE-2023-53510 [HIGH] CWE-415 CVE-2023-53510: In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling o In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling of lrbp->cmd ufshcd_queuecommand() may be called two times in a row for a SCSI command before it is completed. Hence make the following changes: - In the functions that submit a command, do not check the old value of lrbp->cmd nor clear lrbp->cmd in er
nvdosv