Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 135 of 738
CVE-2025-39901HIGHCVSS 7.1≥ 3.12, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39901 [HIGH] CWE-125 CVE-2025-39901: In the Linux kernel, the following vulnerability has been resolved:
i40e: remove read access to deb
In the Linux kernel, the following vulnerability has been resolved:
i40e: remove read access to debugfs files
The 'command' and 'netdev_ops' debugfs files are a legacy debugging
interface supported by the i40e driver since its early days by commit
02e9c290814c ("i40e: debugfs interface").
Both of these debugfs files provide a read handler which is
nvdosv
CVE-2023-53487HIGHCVSS 7.8≥ 4.16, < 4.19.293≥ 4.20, < 5.4.255+5 more2025-10-01
CVE-2023-53487 [HIGH] CVE-2023-53487: In the Linux kernel, the following vulnerability has been resolved:
powerpc/rtas_flash: allow user
In the Linux kernel, the following vulnerability has been resolved:
powerpc/rtas_flash: allow user copy to flash block cache objects
With hardened usercopy enabled (CONFIG_HARDENED_USERCOPY=y), using the
/proc/powerpc/rtas/firmware_update interface to prepare a system
firmware update yields a BUG():
kernel BUG at mm/usercopy.c:102!
Oops: Exception in kernel
nvdosv
CVE-2021-4460HIGHCVSS 7.1fixed in 5.4.118≥ 5.5, < 5.10.36+2 more2025-10-01
CVE-2021-4460 [HIGH] CWE-125 CVE-2021-4460: In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix UBSAN shift-out
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix UBSAN shift-out-of-bounds warning
If get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up
doing a shift operation where the number of bits shifted equals
number of bits in the operand. This behaviour is undefined.
Set num_sdma_queues or num_xgmi_sdma_queues
nvdosv
CVE-2023-53479HIGHCVSS 7.8≥ 6.0, < 6.1.43≥ 6.2, < 6.4.8+1 more2025-10-01
CVE-2023-53479 [HIGH] CWE-416 CVE-2023-53479: In the Linux kernel, the following vulnerability has been resolved:
cxl/acpi: Fix a use-after-free
In the Linux kernel, the following vulnerability has been resolved:
cxl/acpi: Fix a use-after-free in cxl_parse_cfmws()
KASAN and KFENCE detected an user-after-free in the CXL driver. This
happens in the cxl_decoder_add() fail path. KASAN prints the following
error:
BUG: KASAN: slab-use-after-free in cxl_parse_cfmws (drivers/cxl/acpi.c:299)
This ha
nvdosv
CVE-2022-50423HIGHCVSS 7.8≥ 3.10.55, < 3.11≥ 3.12.29, < 3.13+9 more2025-10-01
CVE-2022-50423 [HIGH] CWE-416 CVE-2022-50423: In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix use-after-free in a
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()
There is an use-after-free reported by KASAN:
BUG: KASAN: use-after-free in acpi_ut_remove_reference+0x3b/0x82
Read of size 1 at addr ffff888112afc460 by task modprobe/2111
CPU: 0 PID: 2111 Comm: modprobe Not tainted
nvdosv
CVE-2023-53484HIGHCVSS 7.8≥ 3.8.1, < 4.14.316≥ 4.15, < 4.19.284+6 more2025-10-01
CVE-2023-53484 [HIGH] CWE-416 CVE-2023-53484: In the Linux kernel, the following vulnerability has been resolved:
lib: cpu_rmap: Avoid use after
In the Linux kernel, the following vulnerability has been resolved:
lib: cpu_rmap: Avoid use after free on rmap->obj array entries
When calling irq_set_affinity_notifier() with NULL at the notify
argument, it will cause freeing of the glue pointer in the
corresponding array entry but will leave the pointer in the array. A
subsequent call to free_irq_
nvdosv
CVE-2022-50442HIGHCVSS 7.1≥ 5.15, < 5.15.87≥ 5.16, < 6.0.17+1 more2025-10-01
CVE-2022-50442 [HIGH] CWE-125 CVE-2022-50442: In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate buffer lengt
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate buffer length while parsing index
indx_read is called when we have some NTFS directory operations that
need more information from the index buffers. This adds a sanity check
to make sure the returned index buffer length is legit, or we may have
some out-of-bound m
nvdosv
CVE-2025-39911HIGHCVSS 7.8≥ 3.13, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-01
CVE-2025-39911 [HIGH] CVE-2025-39911: In the Linux kernel, the following vulnerability has been resolved:
i40e: fix IRQ freeing in i40e_v
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
If request_irq() in i40e_vsi_request_irq_msix() fails in an iteration
later than the first, the error path wants to free the IRQs requested
so far. However, it uses the wrong dev_id argument for free_irq(), so
it does not free th
nvdosv
CVE-2023-53493HIGHCVSS 7.8≥ 6.4, < 6.4.7v6.52025-10-01
CVE-2023-53493 [HIGH] CVE-2023-53493: In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: tighten bounds chec
In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: tighten bounds checking in decode_message()
Copy the bounds checking from encode_message() to decode_message().
This patch addresses the following concerns. Ensure that there is
enough space for at least one header so that we don't have a negative
size later.
if (msg_hdr_len d
nvdosv
CVE-2025-39917HIGHCVSS 7.8≥ 6.10, < 6.12.48≥ 6.13, < 6.16.8+1 more2025-10-01
CVE-2025-39917 [HIGH] CWE-787 CVE-2025-39917: In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix out-of-bounds dynptr w
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt
Stanislav reported that in bpf_crypto_crypt() the destination dynptr's
size is not validated to be at least as large as the source dynptr's
size before calling into the crypto backend with 'len = src_len'. This
can result in an
nvdosv
CVE-2023-53486HIGHCVSS 7.1≥ 5.15, < 5.15.113≥ 5.16, < 6.1.80+1 more2025-10-01
CVE-2023-53486 [HIGH] CWE-125 CVE-2023-53486: In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Enhance the attribute
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Enhance the attribute size check
This combines the overflow and boundary check so that all attribute size
will be properly examined while enumerating them.
[ 169.181521] BUG: KASAN: slab-out-of-bounds in run_unpack+0x2e3/0x570
[ 169.183161] Read of size 1 at addr ffff8880
nvdosv
CVE-2022-50433HIGHCVSS 7.8≥ 6.0, < 6.0.4v6.12025-10-01
CVE-2022-50433 [HIGH] CWE-416 CVE-2022-50433: In the Linux kernel, the following vulnerability has been resolved:
efi: ssdt: Don't free memory if
In the Linux kernel, the following vulnerability has been resolved:
efi: ssdt: Don't free memory if ACPI table was loaded successfully
Amadeusz reports KASAN use-after-free errors introduced by commit
3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from
variables"). The problem appears to be that the memory that holds the
new ACPI table i
nvdosv
CVE-2023-53465HIGHCVSS 7.1≥ 5.13, < 5.15.121≥ 5.16, < 6.1.40+1 more2025-10-01
CVE-2023-53465 [HIGH] CWE-125 CVE-2023-53465: In the Linux kernel, the following vulnerability has been resolved:
soundwire: qcom: fix storing po
In the Linux kernel, the following vulnerability has been resolved:
soundwire: qcom: fix storing port config out-of-bounds
The 'qcom_swrm_ctrl->pconfig' has size of QCOM_SDW_MAX_PORTS (14),
however we index it starting from 1, not 0, to match real port numbers.
This can lead to writing port config past 'pconfig' bounds and
overwriting next member of
nvdosv
CVE-2023-53459HIGHCVSS 7.8v6.22025-10-01
CVE-2023-53459 [HIGH] CWE-416 CVE-2023-53459: In the Linux kernel, the following vulnerability has been resolved:
HID: mcp-2221: prevent UAF in d
In the Linux kernel, the following vulnerability has been resolved:
HID: mcp-2221: prevent UAF in delayed work
If the device is plugged/unplugged without giving time for mcp_init_work()
to complete, we might kick in the devm free code path and thus have
unavailable struct mcp_2221 while in delayed work.
Canceling the delayed_work item is enough to
nvdosv
CVE-2022-50421HIGHCVSS 7.8≥ 5.18, < 5.19.17≥ 6.0, < 6.0.32025-10-01
CVE-2022-50421 [HIGH] CWE-416 CVE-2022-50421: In the Linux kernel, the following vulnerability has been resolved:
rpmsg: char: Avoid double destr
In the Linux kernel, the following vulnerability has been resolved:
rpmsg: char: Avoid double destroy of default endpoint
The rpmsg_dev_remove() in rpmsg_core is the place for releasing
this default endpoint.
So need to avoid destroying the default endpoint in
rpmsg_chrdev_eptdev_destroy(), this should be the same as
rpmsg_eptdev_release(). Otherwi
nvdosv
CVE-2023-53495HIGHCVSS 7.8≥ 5.2, < 5.4.257≥ 5.5, < 5.10.195+4 more2025-10-01
CVE-2023-53495 [HIGH] CWE-787 CVE-2023-53495: In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mvpp2_main: fix
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc()
rules is allocated in ethtool_get_rxnfc and the size is determined by
rule_cnt from user space. So rule_cnt needs to be check before using
rules to avoid OOB writing or NULL pointer dereference.
nvdosv
CVE-2023-53494HIGHCVSS 7.8≥ 5.4, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-01
CVE-2023-53494 [HIGH] CWE-416 CVE-2023-53494: In the Linux kernel, the following vulnerability has been resolved:
crypto: xts - Handle EBUSY corr
In the Linux kernel, the following vulnerability has been resolved:
crypto: xts - Handle EBUSY correctly
As it is xts only handles the special return value of EINPROGRESS,
which means that in all other cases it will free data related to the
request.
However, as the caller of xts may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in
nvdosv
CVE-2022-50454HIGHCVSS 7.8≥ 5.4, < 5.4.220≥ 5.5, < 5.10.150+3 more2025-10-01
CVE-2022-50454 [HIGH] CWE-416 CVE-2022-50454: In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix a use-after-fr
In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()
nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm will call nouveau_bo_del_ttm() and
free the memory.Thus, when nouveau_bo_init() returns an error, th
nvdosv
CVE-2022-50432HIGHCVSS 7.8≥ 3.14, < 4.9.332≥ 4.10, < 4.14.298+5 more2025-10-01
CVE-2022-50432 [HIGH] CWE-416 CVE-2022-50432: In the Linux kernel, the following vulnerability has been resolved:
kernfs: fix use-after-free in _
In the Linux kernel, the following vulnerability has been resolved:
kernfs: fix use-after-free in __kernfs_remove
Syzkaller managed to trigger concurrent calls to
kernfs_remove_by_name_ns() for the same file resulting in
a KASAN detected use-after-free. The race occurs when the root
node is freed during kernfs_drain().
To prevent this acquire an ad
nvdosv
CVE-2023-53492HIGHCVSS 7.8≥ 5.9, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-10-01
CVE-2023-53492 [HIGH] CVE-2023-53492: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not ig
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not ignore genmask when looking up chain by id
When adding a rule to a chain referring to its ID, if that chain had been
deleted on the same batch, the rule might end up referring to a deleted
chain.
This will lead to a WARNING like following:
[ 33.098431] -------
nvdosv