Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 137 of 738
CVE-2022-50427MEDIUMCVSS 5.5≥ 2.6.14, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-01
CVE-2022-50427 [MEDIUM] CWE-401 CVE-2022-50427: In the Linux kernel, the following vulnerability has been resolved:
ALSA: ac97: fix possible memory
In the Linux kernel, the following vulnerability has been resolved:
ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()
If device_register() fails in snd_ac97_dev_register(), it should
call put_device() to give up reference, or the name allocated in
dev_set_name() is leaked.
nvdosv
CVE-2022-50426MEDIUMCVSS 5.5≥ 5.16, < 6.0.18≥ 6.1, < 6.1.42025-10-01
CVE-2022-50426 [MEDIUM] CVE-2022-50426: In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_dsp_rproc: Add
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_dsp_rproc: Add mutex protection for workqueue
The workqueue may execute late even after remoteproc is stopped or
stopping, some resources (rpmsg device and endpoint) have been
released in rproc_stop_subdevices(), then rproc_vq_interrupt()
accessing these resources will caus
nvdosv
CVE-2023-53461MEDIUMCVSS 5.5≥ 5.1, < 5.10.188≥ 5.11, < 5.15.121+2 more2025-10-01
CVE-2023-53461 [MEDIUM] CVE-2023-53461: In the Linux kernel, the following vulnerability has been resolved:
io_uring: wait interruptibly fo
In the Linux kernel, the following vulnerability has been resolved:
io_uring: wait interruptibly for request completions on exit
WHen the ring exits, cleanup is done and the final cancelation and
waiting on completions is done by io_ring_exit_work. That function is
invoked by kworker, which doesn't take any signals. Because of that, it
doesn't really matt
nvdosv
CVE-2023-53530MEDIUMCVSS 5.5≥ 6.3, < 6.5.5v6.62025-10-01
CVE-2023-53530 [MEDIUM] CVE-2023-53530: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Use raw_smp_proc
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()
The following call trace was observed:
localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complete
localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:4/75092
localh
nvdosv
CVE-2023-53512MEDIUMCVSS 5.5≥ 4.16, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-01
CVE-2023-53512 [MEDIUM] CWE-401 CVE-2023-53512: In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix a memory lea
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix a memory leak
Add a forgotten kfree().
nvdosv
CVE-2025-39895MEDIUMCVSS 5.5≥ 6.3, < 6.6.105≥ 6.7, < 6.12.46+2 more2025-10-01
CVE-2025-39895 [MEDIUM] CWE-476 CVE-2025-39895: In the Linux kernel, the following vulnerability has been resolved:
sched: Fix sched_numa_find_nth_
In the Linux kernel, the following vulnerability has been resolved:
sched: Fix sched_numa_find_nth_cpu() if mask offline
sched_numa_find_nth_cpu() uses a bsearch to look for the 'closest'
CPU in sched_domains_numa_masks and given cpus mask. However they
might not intersect if all CPUs in the cpus mask are offline. bsearch
will return NULL in that
nvdosv
CVE-2023-53463MEDIUMCVSS 5.5≥ 5.11, < 5.15.121≥ 5.16, < 6.1.39+1 more2025-10-01
CVE-2023-53463 [MEDIUM] CVE-2023-53463: In the Linux kernel, the following vulnerability has been resolved:
ibmvnic: Do not reset dql stats
In the Linux kernel, the following vulnerability has been resolved:
ibmvnic: Do not reset dql stats on NON_FATAL err
All ibmvnic resets, make a call to netdev_tx_reset_queue() when
re-opening the device. netdev_tx_reset_queue() resets the num_queued
and num_completed byte counters. These stats are used in Byte Queue
Limit (BQL) algorithms. The difference
nvdosv
CVE-2025-39897MEDIUMCVSS 5.5≥ 6.8, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39897 [MEDIUM] CWE-476 CVE-2025-39897: In the Linux kernel, the following vulnerability has been resolved:
net: xilinx: axienet: Add error
In the Linux kernel, the following vulnerability has been resolved:
net: xilinx: axienet: Add error handling for RX metadata pointer retrieval
Add proper error checking for dmaengine_desc_get_metadata_ptr() which
can return an error pointer and lead to potential crashes or undefined
behaviour if the pointer retrieval fails.
Properly handle the er
nvdosv
CVE-2022-50456MEDIUMCVSS 5.5≥ 3.3, < 5.4.229≥ 5.5, < 5.10.163+4 more2025-10-01
CVE-2022-50456 [MEDIUM] CVE-2022-50456: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix resolving backrefs f
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix resolving backrefs for inline extent followed by prealloc
If a file consists of an inline extent followed by a regular or prealloc
extent, then a legitimate attempt to resolve a logical address in the
non-inline region will result in add_all_parents reading the invalid
offset f
nvdosv
CVE-2023-53498MEDIUMCVSS 5.5≥ 5.6, < 5.10.246≥ 5.11, < 5.15.111+3 more2025-10-01
CVE-2023-53498 [MEDIUM] CWE-476 CVE-2023-53498: In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix potential
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix potential null dereference
The adev->dm.dc pointer can be NULL and dereferenced in amdgpu_dm_fini()
without checking.
Add a NULL pointer check before calling dc_dmub_srv_destroy().
Found by Linux Verification Center (linuxtesting.org) with SVACE.
nvdosv
CVE-2023-53464MEDIUMCVSS 5.5≥ 5.10.150, < 5.10.178≥ 5.15.75, < 5.15.107+4 more2025-10-01
CVE-2023-53464 [MEDIUM] CWE-476 CVE-2023-53464: In the Linux kernel, the following vulnerability has been resolved:
scsi: iscsi_tcp: Check that soc
In the Linux kernel, the following vulnerability has been resolved:
scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()
The validity of sock should be checked before assignment to avoid incorrect
values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref
while calling getpeername()") introduced this change which may le
nvdosv
CVE-2025-39893MEDIUMCVSS 5.5≥ 6.15, < 6.16.6v6.172025-10-01
CVE-2025-39893 [MEDIUM] CWE-401 CVE-2025-39893: In the Linux kernel, the following vulnerability has been resolved:
spi: spi-qpic-snand: unregister
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-qpic-snand: unregister ECC engine on probe error and device remove
The on-host hardware ECC engine remains registered both when
the spi_register_controller() function returns with an error
and also on device removal.
Change the qcom_spi_probe() function to unregister the
nvdosv
CVE-2022-50451MEDIUMCVSS 5.5≥ 5.15, < 5.15.87≥ 5.16, < 6.0.17+1 more2025-10-01
CVE-2022-50451 [MEDIUM] CWE-401 CVE-2022-50451: In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix memory leak on nt
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix memory leak on ntfs_fill_super() error path
syzbot reported kmemleak as below:
BUG: memory leak
unreferenced object 0xffff8880122f1540 (size 32):
comm "a.out", pid 6664, jiffies 4294939771 (age 25.500s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00
nvdosv
CVE-2022-50444MEDIUMCVSS 5.5≥ 3.9, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-01
CVE-2022-50444 [MEDIUM] CVE-2022-50444: In the Linux kernel, the following vulnerability has been resolved:
clk: tegra20: Fix refcount leak
In the Linux kernel, the following vulnerability has been resolved:
clk: tegra20: Fix refcount leak in tegra20_clock_init
of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
nvdosv
CVE-2025-39903MEDIUMCVSS 5.5≥ 6.12, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39903 [MEDIUM] CWE-476 CVE-2025-39903: In the Linux kernel, the following vulnerability has been resolved:
of_numa: fix uninitialized memo
In the Linux kernel, the following vulnerability has been resolved:
of_numa: fix uninitialized memory nodes causing kernel panic
When there are memory-only nodes (nodes without CPUs), these nodes are not
properly initialized, causing kernel panic during boot.
of_numa_init
of_numa_parse_cpu_nodes
node_set(nid, numa_nodes_parsed);
of_numa_parse_mem
nvdosv
CVE-2023-53477MEDIUMCVSS 5.5≥ 4.11, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-01
CVE-2023-53477 [MEDIUM] CVE-2023-53477: In the Linux kernel, the following vulnerability has been resolved:
ipv6: Add lwtunnel encap size o
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Add lwtunnel encap size of all siblings in nexthop calculation
In function rt6_nlmsg_size(), the length of nexthop is calculated
by multipling the nexthop length of fib6_info and the number of
siblings. However if the fib6_info has no lwtunnel but the siblings
have lwtunnels, the ne
nvdosv
CVE-2025-39920MEDIUMCVSS 5.5≥ 2.6.34, < 5.4.299≥ 5.5, < 5.10.243+6 more2025-10-01
CVE-2025-39920 [MEDIUM] CWE-476 CVE-2025-39920: In the Linux kernel, the following vulnerability has been resolved:
pcmcia: Add error handling for
In the Linux kernel, the following vulnerability has been resolved:
pcmcia: Add error handling for add_interval() in do_validate_mem()
In the do_validate_mem(), the call to add_interval() does not
handle errors. If kmalloc() fails in add_interval(), it could
result in a null pointer being inserted into the linked list,
leading to illegal memory acc
nvdosv
CVE-2022-50461MEDIUMCVSS 5.5≥ 5.7, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50461 [MEDIUM] CVE-2022-50461: In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: F
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open()
Ensure pm_runtime_put() is issued in error path.
nvdosv
CVE-2023-53523MEDIUMCVSS 5.5≥ 6.1, < 6.4.7v6.52025-10-01
CVE-2023-53523 [MEDIUM] CWE-476 CVE-2023-53523: In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: fix time stamp cou
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: fix time stamp counter initialization
If the gs_usb device driver is unloaded (or unbound) before the
interface is shut down, the USB stack first calls the struct
usb_driver::disconnect and then the struct net_device_ops::ndo_stop
callback.
In gs_usb_disconnect() all
nvdosv
CVE-2023-53482MEDIUMCVSS 5.5≥ 4.11, < 5.15.99≥ 5.16, < 6.1.16+1 more2025-10-01
CVE-2023-53482 [MEDIUM] CVE-2023-53482: In the Linux kernel, the following vulnerability has been resolved:
iommu: Fix error unwind in iomm
In the Linux kernel, the following vulnerability has been resolved:
iommu: Fix error unwind in iommu_group_alloc()
If either iommu_group_grate_file() fails then the
iommu_group is leaked.
Destroy it on these error paths.
Found by kselftest/iommu/iommufd_fail_nth
nvdosv