Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 137 of 738
CVE-2022-50427MEDIUMCVSS 5.5≥ 2.6.14, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-01
CVE-2022-50427 [MEDIUM] CWE-401 CVE-2022-50427: In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix possible memory In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() If device_register() fails in snd_ac97_dev_register(), it should call put_device() to give up reference, or the name allocated in dev_set_name() is leaked.
nvdosv
CVE-2022-50426MEDIUMCVSS 5.5≥ 5.16, < 6.0.18≥ 6.1, < 6.1.42025-10-01
CVE-2022-50426 [MEDIUM] CVE-2022-50426: In the Linux kernel, the following vulnerability has been resolved: remoteproc: imx_dsp_rproc: Add In the Linux kernel, the following vulnerability has been resolved: remoteproc: imx_dsp_rproc: Add mutex protection for workqueue The workqueue may execute late even after remoteproc is stopped or stopping, some resources (rpmsg device and endpoint) have been released in rproc_stop_subdevices(), then rproc_vq_interrupt() accessing these resources will caus
nvdosv
CVE-2023-53461MEDIUMCVSS 5.5≥ 5.1, < 5.10.188≥ 5.11, < 5.15.121+2 more2025-10-01
CVE-2023-53461 [MEDIUM] CVE-2023-53461: In the Linux kernel, the following vulnerability has been resolved: io_uring: wait interruptibly fo In the Linux kernel, the following vulnerability has been resolved: io_uring: wait interruptibly for request completions on exit WHen the ring exits, cleanup is done and the final cancelation and waiting on completions is done by io_ring_exit_work. That function is invoked by kworker, which doesn't take any signals. Because of that, it doesn't really matt
nvdosv
CVE-2023-53530MEDIUMCVSS 5.5≥ 6.3, < 6.5.5v6.62025-10-01
CVE-2023-53530 [MEDIUM] CVE-2023-53530: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Use raw_smp_proc In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() The following call trace was observed: localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complete localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:4/75092 localh
nvdosv
CVE-2023-53512MEDIUMCVSS 5.5≥ 4.16, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-10-01
CVE-2023-53512 [MEDIUM] CWE-401 CVE-2023-53512: In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix a memory lea In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix a memory leak Add a forgotten kfree().
nvdosv
CVE-2025-39895MEDIUMCVSS 5.5≥ 6.3, < 6.6.105≥ 6.7, < 6.12.46+2 more2025-10-01
CVE-2025-39895 [MEDIUM] CWE-476 CVE-2025-39895: In the Linux kernel, the following vulnerability has been resolved: sched: Fix sched_numa_find_nth_ In the Linux kernel, the following vulnerability has been resolved: sched: Fix sched_numa_find_nth_cpu() if mask offline sched_numa_find_nth_cpu() uses a bsearch to look for the 'closest' CPU in sched_domains_numa_masks and given cpus mask. However they might not intersect if all CPUs in the cpus mask are offline. bsearch will return NULL in that
nvdosv
CVE-2023-53463MEDIUMCVSS 5.5≥ 5.11, < 5.15.121≥ 5.16, < 6.1.39+1 more2025-10-01
CVE-2023-53463 [MEDIUM] CVE-2023-53463: In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Do not reset dql stats In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Do not reset dql stats on NON_FATAL err All ibmvnic resets, make a call to netdev_tx_reset_queue() when re-opening the device. netdev_tx_reset_queue() resets the num_queued and num_completed byte counters. These stats are used in Byte Queue Limit (BQL) algorithms. The difference
nvdosv
CVE-2025-39897MEDIUMCVSS 5.5≥ 6.8, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39897 [MEDIUM] CWE-476 CVE-2025-39897: In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Add error In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval Add proper error checking for dmaengine_desc_get_metadata_ptr() which can return an error pointer and lead to potential crashes or undefined behaviour if the pointer retrieval fails. Properly handle the er
nvdosv
CVE-2022-50456MEDIUMCVSS 5.5≥ 3.3, < 5.4.229≥ 5.5, < 5.10.163+4 more2025-10-01
CVE-2022-50456 [MEDIUM] CVE-2022-50456: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix resolving backrefs f In the Linux kernel, the following vulnerability has been resolved: btrfs: fix resolving backrefs for inline extent followed by prealloc If a file consists of an inline extent followed by a regular or prealloc extent, then a legitimate attempt to resolve a logical address in the non-inline region will result in add_all_parents reading the invalid offset f
nvdosv
CVE-2023-53498MEDIUMCVSS 5.5≥ 5.6, < 5.10.246≥ 5.11, < 5.15.111+3 more2025-10-01
CVE-2023-53498 [MEDIUM] CWE-476 CVE-2023-53498: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential null dereference The adev->dm.dc pointer can be NULL and dereferenced in amdgpu_dm_fini() without checking. Add a NULL pointer check before calling dc_dmub_srv_destroy(). Found by Linux Verification Center (linuxtesting.org) with SVACE.
nvdosv
CVE-2023-53464MEDIUMCVSS 5.5≥ 5.10.150, < 5.10.178≥ 5.15.75, < 5.15.107+4 more2025-10-01
CVE-2023-53464 [MEDIUM] CWE-476 CVE-2023-53464: In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Check that soc In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() The validity of sock should be checked before assignment to avoid incorrect values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()") introduced this change which may le
nvdosv
CVE-2025-39893MEDIUMCVSS 5.5≥ 6.15, < 6.16.6v6.172025-10-01
CVE-2025-39893 [MEDIUM] CWE-401 CVE-2025-39893: In the Linux kernel, the following vulnerability has been resolved: spi: spi-qpic-snand: unregister In the Linux kernel, the following vulnerability has been resolved: spi: spi-qpic-snand: unregister ECC engine on probe error and device remove The on-host hardware ECC engine remains registered both when the spi_register_controller() function returns with an error and also on device removal. Change the qcom_spi_probe() function to unregister the
nvdosv
CVE-2022-50451MEDIUMCVSS 5.5≥ 5.15, < 5.15.87≥ 5.16, < 6.0.17+1 more2025-10-01
CVE-2022-50451 [MEDIUM] CWE-401 CVE-2022-50451: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix memory leak on nt In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix memory leak on ntfs_fill_super() error path syzbot reported kmemleak as below: BUG: memory leak unreferenced object 0xffff8880122f1540 (size 32): comm "a.out", pid 6664, jiffies 4294939771 (age 25.500s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00
nvdosv
CVE-2022-50444MEDIUMCVSS 5.5≥ 3.9, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-01
CVE-2022-50444 [MEDIUM] CVE-2022-50444: In the Linux kernel, the following vulnerability has been resolved: clk: tegra20: Fix refcount leak In the Linux kernel, the following vulnerability has been resolved: clk: tegra20: Fix refcount leak in tegra20_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
nvdosv
CVE-2025-39903MEDIUMCVSS 5.5≥ 6.12, < 6.12.46≥ 6.13, < 6.16.6+1 more2025-10-01
CVE-2025-39903 [MEDIUM] CWE-476 CVE-2025-39903: In the Linux kernel, the following vulnerability has been resolved: of_numa: fix uninitialized memo In the Linux kernel, the following vulnerability has been resolved: of_numa: fix uninitialized memory nodes causing kernel panic When there are memory-only nodes (nodes without CPUs), these nodes are not properly initialized, causing kernel panic during boot. of_numa_init of_numa_parse_cpu_nodes node_set(nid, numa_nodes_parsed); of_numa_parse_mem
nvdosv
CVE-2023-53477MEDIUMCVSS 5.5≥ 4.11, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-01
CVE-2023-53477 [MEDIUM] CVE-2023-53477: In the Linux kernel, the following vulnerability has been resolved: ipv6: Add lwtunnel encap size o In the Linux kernel, the following vulnerability has been resolved: ipv6: Add lwtunnel encap size of all siblings in nexthop calculation In function rt6_nlmsg_size(), the length of nexthop is calculated by multipling the nexthop length of fib6_info and the number of siblings. However if the fib6_info has no lwtunnel but the siblings have lwtunnels, the ne
nvdosv
CVE-2025-39920MEDIUMCVSS 5.5≥ 2.6.34, < 5.4.299≥ 5.5, < 5.10.243+6 more2025-10-01
CVE-2025-39920 [MEDIUM] CWE-476 CVE-2025-39920: In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it could result in a null pointer being inserted into the linked list, leading to illegal memory acc
nvdosv
CVE-2022-50461MEDIUMCVSS 5.5≥ 5.7, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50461 [MEDIUM] CVE-2022-50461: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: F In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open() Ensure pm_runtime_put() is issued in error path.
nvdosv
CVE-2023-53523MEDIUMCVSS 5.5≥ 6.1, < 6.4.7v6.52025-10-01
CVE-2023-53523 [MEDIUM] CWE-476 CVE-2023-53523: In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: fix time stamp cou In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: fix time stamp counter initialization If the gs_usb device driver is unloaded (or unbound) before the interface is shut down, the USB stack first calls the struct usb_driver::disconnect and then the struct net_device_ops::ndo_stop callback. In gs_usb_disconnect() all
nvdosv
CVE-2023-53482MEDIUMCVSS 5.5≥ 4.11, < 5.15.99≥ 5.16, < 6.1.16+1 more2025-10-01
CVE-2023-53482 [MEDIUM] CVE-2023-53482: In the Linux kernel, the following vulnerability has been resolved: iommu: Fix error unwind in iomm In the Linux kernel, the following vulnerability has been resolved: iommu: Fix error unwind in iommu_group_alloc() If either iommu_group_grate_file() fails then the iommu_group is leaked. Destroy it on these error paths. Found by kselftest/iommu/iommufd_fail_nth
nvdosv