Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 139 of 738
CVE-2025-39908MEDIUMCVSS 5.5≥ 6.15, < 6.16.8v6.172025-10-01
CVE-2025-39908 [MEDIUM] CVE-2025-39908: In the Linux kernel, the following vulnerability has been resolved: net: dev_ioctl: take ops lock i In the Linux kernel, the following vulnerability has been resolved: net: dev_ioctl: take ops lock in hwtstamp lower paths ndo hwtstamp callbacks are expected to run under the per-device ops lock. Make the lower get/set paths consistent with the rest of ndo invocations. Kernel log: WARNING: CPU: 13 PID: 51364 at ./include/net/netdev_lock.h:70 __netdev_upd
nvdosv
CVE-2022-50438MEDIUMCVSS 5.5≥ 5.10, < 5.10.153≥ 5.11, < 5.15.77+2 more2025-10-01
CVE-2022-50438 [MEDIUM] CWE-401 CVE-2022-50438: In the Linux kernel, the following vulnerability has been resolved: net: hinic: fix memory leak whe In the Linux kernel, the following vulnerability has been resolved: net: hinic: fix memory leak when reading function table When the input parameter idx meets the expected case option in hinic_dbg_get_func_table(), read_data is not released. Fix it.
nvdosv
CVE-2022-50446MEDIUMCVSS 5.5≥ 5.15, < 5.15.77≥ 5.16, < 6.0.7+1 more2025-10-01
CVE-2022-50446 [MEDIUM] CWE-401 CVE-2022-50446: In the Linux kernel, the following vulnerability has been resolved: ARC: mm: fix leakage of memory In the Linux kernel, the following vulnerability has been resolved: ARC: mm: fix leakage of memory allocated for PTE Since commit d9820ff ("ARC: mm: switch pgtable_t back to struct page *") a memory leakage problem occurs. Memory allocated for page table entries not released during process termination. This issue can be reproduced by a small progra
nvdosv
CVE-2022-50453MEDIUMCVSS 5.5≥ 4.8, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-10-01
CVE-2022-50453 [MEDIUM] CWE-476 CVE-2022-50453: In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: fix NULL-pointer In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: fix NULL-pointer dereferences There are several places where we can crash the kernel by requesting lines, unbinding the GPIO device, then calling any of the system calls relevant to the GPIO character device's annonymous file descriptors: ioctl(), read(), poll(). W
nvdosv
CVE-2023-53472MEDIUMCVSS 5.5≥ 4.9.284, < 4.10≥ 4.14.248, < 4.14.326+6 more2025-10-01
CVE-2023-53472 [MEDIUM] CWE-476 CVE-2023-53472: In the Linux kernel, the following vulnerability has been resolved: pwm: lpc32xx: Remove handling o In the Linux kernel, the following vulnerability has been resolved: pwm: lpc32xx: Remove handling of PWM channels Because LPC32xx PWM controllers have only a single output which is registered as the only PWM device/channel per controller, it is known in advance that pwm->hwpwm value is always 0. On basis of this fact simplify the code by removing
nvdosv
CVE-2023-53478MEDIUMCVSS 4.7≥ 5.18, < 6.1.24≥ 6.2, < 6.2.11+1 more2025-10-01
CVE-2023-53478 [MEDIUM] CWE-362 CVE-2023-53478: In the Linux kernel, the following vulnerability has been resolved: tracing/synthetic: Fix races on In the Linux kernel, the following vulnerability has been resolved: tracing/synthetic: Fix races on freeing last_cmd Currently, the "last_cmd" variable can be accessed by multiple processes asynchronously when multiple users manipulate synthetic_events node at the same time, it could lead to use-after-free or double-free. This patch add "lastcmd_
nvdosv
CVE-2022-50464MEDIUMCVSS 5.5≥ 5.12, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50464 [MEDIUM] CVE-2022-50464: In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: Fix PCI device re In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() As comment of pci_get_device() says, it returns a pci_device with its refcount increased. We need to call pci_dev_put() to decrease the refcount. Save the return value of pci_get_device() and call pci_dev_put() to decrea
nvdosv
CVE-2025-39914MEDIUMCVSS 5.5≥ 5.16, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-10-01
CVE-2025-39914 [MEDIUM] CWE-415 CVE-2025-39914: In the Linux kernel, the following vulnerability has been resolved: tracing: Silence warning when c In the Linux kernel, the following vulnerability has been resolved: tracing: Silence warning when chunk allocation fails in trace_pid_write Syzkaller trigger a fault injection warning: WARNING: CPU: 1 PID: 12326 at tracepoint_add_func+0xbfc/0xeb0 Modules linked in: CPU: 1 UID: 0 PID: 12326 Comm: syz.6.10325 Tainted: G U 6.14.0-rc5-syzkaller #0 Ta
nvdosv
CVE-2023-53456MEDIUMCVSS 5.5≥ 3.2, < 4.14.326≥ 4.15, < 4.19.295+6 more2025-10-01
CVE-2023-53456 [MEDIUM] CVE-2023-53456: In the Linux kernel, the following vulnerability has been resolved: scsi: qla4xxx: Add length check In the Linux kernel, the following vulnerability has been resolved: scsi: qla4xxx: Add length check when parsing nlattrs There are three places that qla4xxx parses nlattrs: - qla4xxx_set_chap_entry() - qla4xxx_iface_set_param() - qla4xxx_sysfs_ddb_set_param() and each of them directly converts the nlattr to specific pointer of structure without length
nvdosv
CVE-2023-53496MEDIUMCVSS 5.5≥ 6.5, < 6.5.5v6.62025-10-01
CVE-2023-53496 [MEDIUM] CVE-2023-53496: In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate source for socket to node data The UV code attempts to build a set of tables to allow it to do bidirectional socketnode lookups. But when nr_cpus is set to a smaller number than actually present, the cpu_to_node() mapping information for unused CPUs is not a
nvdosv
CVE-2022-50428MEDIUMCVSS 5.5≥ 5.10, < 5.15.87≥ 5.16, < 6.0.18+1 more2025-10-01
CVE-2022-50428 [MEDIUM] CWE-193 CVE-2022-50428: In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one errors in In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one errors in fast-commit block filling Due to several different off-by-one errors, or perhaps due to a late change in design that wasn't fully reflected in the code that was actually merged, there are several very strange constraints on how fast-commit blocks are
nvdosv
CVE-2023-53460MEDIUMCVSS 5.5≥ 5.2, < 6.3.42025-10-01
CVE-2023-53460 [MEDIUM] CWE-401 CVE-2023-53460: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix memory leak in In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix memory leak in rtw_usb_probe() drivers/net/wireless/realtek/rtw88/usb.c:876 rtw_usb_probe() warn: 'hw' from ieee80211_alloc_hw() not released on lines: 811 Fix this by modifying return to a goto statement.
nvdosv
CVE-2025-39894MEDIUMCVSS 5.5≥ 5.15.151, < 5.15.192≥ 6.1.81, < 6.1.151+6 more2025-10-01
CVE-2025-39894 [MEDIUM] CVE-2025-39894: In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: do not In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm When send a broadcast packet to a tap device, which was added to a bridge, br_nf_local_in() is called to confirm the conntrack. If another conntrack with the same hash value is added to the hash table, w
nvdosv
CVE-2023-53513MEDIUMCVSS 5.5≥ 4.1, < 5.15.113≥ 5.16, < 6.1.30+1 more2025-10-01
CVE-2023-53513 [MEDIUM] CWE-674 CVE-2023-53513: In the Linux kernel, the following vulnerability has been resolved: nbd: fix incomplete validation In the Linux kernel, the following vulnerability has been resolved: nbd: fix incomplete validation of ioctl arg We tested and found an alarm caused by nbd_ioctl arg without verification. The UBSAN warning calltrace like below: UBSAN: Undefined behaviour in fs/buffer.c:1709:35 signed integer overflow: -9223372036854775808 - 1 cannot be represented
nvdosv
CVE-2023-53470MEDIUMCVSS 5.5≥ 5.4, < 5.15.112≥ 5.16, < 6.1.29+2 more2025-10-01
CVE-2023-53470 [MEDIUM] CWE-476 CVE-2023-53470: In the Linux kernel, the following vulnerability has been resolved: ionic: catch failure from devli In the Linux kernel, the following vulnerability has been resolved: ionic: catch failure from devlink_alloc Add a check for NULL on the alloc return. If devlink_alloc() fails and we try to use devlink_priv() on the NULL return, the kernel gets very unhappy and panics. With this fix, the driver load will still fail, but at least it won't panic the
nvdosv
CVE-2022-50457MEDIUMCVSS 5.5≥ 5.17, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50457 [MEDIUM] CVE-2022-50457: In the Linux kernel, the following vulnerability has been resolved: mtd: core: Fix refcount error i In the Linux kernel, the following vulnerability has been resolved: mtd: core: Fix refcount error in del_mtd_device() del_mtd_device() will call of_node_put() to mtd_get_of_node(mtd), which is mtd->dev.of_node. However, memset(&mtd->dev, 0) is called before of_node_put(). As the result, of_node_put() won't do anything in del_mtd_device(), and causes the r
nvdosv
CVE-2022-50468MEDIUMCVSS 5.5≥ 5.7, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-10-01
CVE-2022-50468 [MEDIUM] CVE-2022-50468: In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_usbpd_not In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_usbpd_notify: Fix error handling in cros_usbpd_notify_init() The following WARNING message was given when rmmod cros_usbpd_notify: Unexpected driver unregister! WARNING: CPU: 0 PID: 253 at drivers/base/driver.c:270 driver_unregister+0x8a/0xb0 Modules linked in: cros
nvdosv
CVE-2023-53525MEDIUMCVSS 5.5≥ 5.8.17, < 5.9≥ 5.9.2, < 5.10.178+4 more2025-10-01
CVE-2023-53525 [MEDIUM] CWE-908 CVE-2023-53525: In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to j In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to join multicast only As for multicast: - The SIDR is the only mode that makes sense; - Besides PS_UDP, other port spaces like PS_IB is also allowed, as it is UD compatible. In this case qkey also needs to be set [1]. This patch allows only UD qp_type
nvdosv
CVE-2025-39927MEDIUMCVSS 4.7≥ 2.6.35, < 6.12.48≥ 6.13, < 6.16.8+2 more2025-10-01
CVE-2025-39927 [MEDIUM] CWE-362 CVE-2025-39927: In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition valida In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validation to ensure the cached parent directory inode matches the directory info in MDS replies. This prevents client-side race conditions where concurrent operations (e.g. rename) cause r_parent to become sta
nvdosv
CVE-2023-53466MEDIUMCVSS 5.5≥ 5.8, < 6.1.16≥ 6.2, < 6.2.32025-10-01
CVE-2023-53466 [MEDIUM] CWE-401 CVE-2023-53466: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix memory In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit Always purge mcu skb queues in mt7915_mcu_exit routine even if mt7915_firmware_state fails.
nvdosv