Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 142 of 738
CVE-2023-53519MEDIUMCVSS 5.5≥ 2.6.39, < 4.14.324≥ 4.15, < 4.19.293+5 more2025-10-01
CVE-2023-53519 [MEDIUM] CWE-667 CVE-2023-53519: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock t In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock to protect parameter num_rdy Getting below error when using KCSAN to check the driver. Adding lock to protect parameter num_rdy when getting the value with function: v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready. kworker/u16:3: [name:report
nvdosv
CVE-2022-50424MEDIUMCVSS 5.5≥ 6.2, < 6.2.32025-10-01
CVE-2022-50424 [MEDIUM] CWE-401 CVE-2022-50424: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: resource le In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: resource leaks at mt7921_check_offload_capability() Fixed coverity issue with resource leaks at variable "fw" going out of scope leaks the storage it points to mt7921_check_offload_capability(). Addresses-Coverity-ID: 1527806 ("Resource leaks")
nvdosv
CVE-2023-53467MEDIUMCVSS 5.5≥ 5.18, < 6.1.16≥ 6.2, < 6.2.32025-10-01
CVE-2023-53467 [MEDIUM] CWE-401 CVE-2023-53467: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential leak In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie() Do `kfree_skb(new)` before `goto out` to prevent potential leak.
nvdosv
CVE-2022-50447MEDIUMCVSS 5.5≥ 6.0, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50447 [MEDIUM] CWE-476 CVE-2022-50447: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: Fix crash In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: Fix crash on hci_create_cis_sync When attempting to connect multiple ISO sockets without using DEFER_SETUP may result in the following crash: BUG: KASAN: null-ptr-deref in hci_create_cis_sync+0x18b/0x2b0 Read of size 2 at addr 0000000000000036 by task kworker/
nvdosv
CVE-2025-39909MEDIUMCVSS 5.5≥ 6.0, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-10-01
CVE-2025-39909 [MEDIUM] CWE-369 CVE-2025-39909: In the Linux kernel, the following vulnerability has been resolved: mm/damon/lru_sort: avoid divide In the Linux kernel, the following vulnerability has been resolved: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters application". DAMON's RECLAIM and LRU_SORT modules perform no validation on user-configured parameters during application, which
nvdosv
CVE-2023-53448MEDIUMCVSS 5.5≥ 6.0, < 6.1.42≥ 6.2, < 6.4.7+1 more2025-10-01
CVE-2023-53448 [MEDIUM] CWE-617 CVE-2023-53448: In the Linux kernel, the following vulnerability has been resolved: fbdev: imxfb: Removed unneeded In the Linux kernel, the following vulnerability has been resolved: fbdev: imxfb: Removed unneeded release_mem_region Remove unnecessary release_mem_region from the error path to prevent mem region from being released twice, which could avoid resource leak or other unexpected issues.
nvdosv
CVE-2025-39919MEDIUMCVSS 5.5≥ 6.15, < 6.16.6v6.172025-10-01
CVE-2025-39919 [MEDIUM] CVE-2025-39919: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing check for rx wcid entries Non-station wcid entries must not be passed to the rx functions. In case of the global wcid entry, it could even lead to corruption in the wcid array due to pointer being casted to struct mt7996_sta_link using container_of.
nvdosv
CVE-2023-53474MEDIUMCVSS 5.5≥ 5.10, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-01
CVE-2023-53474 [MEDIUM] CWE-190 CVE-2023-53474: In the Linux kernel, the following vulnerability has been resolved: x86/MCE/AMD: Use an u64 for ban In the Linux kernel, the following vulnerability has been resolved: x86/MCE/AMD: Use an u64 for bank_map Thee maximum number of MCA banks is 64 (MAX_NR_BANKS), see a0bc32b3cacf ("x86/mce: Increase maximum number of banks to 64"). However, the bank_map which contains a bitfield of which banks to initialize is of type unsigned int and that overflo
nvdosv
CVE-2022-50449MEDIUMCVSS 5.5≥ 3.12, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-10-01
CVE-2022-50449 [MEDIUM] CWE-401 CVE-2022-50449: In the Linux kernel, the following vulnerability has been resolved: clk: samsung: Fix memory leak i In the Linux kernel, the following vulnerability has been resolved: clk: samsung: Fix memory leak in _samsung_clk_register_pll() If clk_register() fails, @pll->rate_table may have allocated memory by kmemdup(), so it needs to be freed, otherwise will cause memory leak issue, this patch fixes it.
nvdosv
CVE-2022-50458MEDIUMCVSS 5.5≥ 4.5, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-01
CVE-2022-50458 [MEDIUM] CVE-2022-50458: In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak i In the Linux kernel, the following vulnerability has been resolved: clk: tegra: Fix refcount leak in tegra210_clock_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
nvdosv
CVE-2023-53451MEDIUMCVSS 5.5≥ 2.6.35, < 4.14.322≥ 4.15, < 4.19.291+5 more2025-10-01
CVE-2023-53451 [MEDIUM] CWE-476 CVE-2023-53451: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix potential NU In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix potential NULL pointer dereference Klocwork tool reported 'cur_dsd' may be dereferenced. Add fix to validate pointer before dereferencing the pointer.
nvdosv
CVE-2022-50465MEDIUMCVSS 5.5≥ 5.10, < 5.10.163≥ 5.11, < 5.15.87+2 more2025-10-01
CVE-2022-50465 [MEDIUM] CWE-401 CVE-2022-50465: In the Linux kernel, the following vulnerability has been resolved: ext4: fix leaking uninitialized In the Linux kernel, the following vulnerability has been resolved: ext4: fix leaking uninitialized memory in fast-commit journal When space at the end of fast-commit journal blocks is unused, make sure to zero it out so that uninitialized memory is not leaked to disk.
nvdosv
CVE-2022-50431MEDIUMCVSS 5.5≥ 2.6.18, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-01
CVE-2022-50431 [MEDIUM] CWE-401 CVE-2022-50431: In the Linux kernel, the following vulnerability has been resolved: ALSA: aoa: i2sbus: fix possible In the Linux kernel, the following vulnerability has been resolved: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() dev_set_name() in soundbus_add_one() allocates memory for name, it need be freed when of_device_register() fails, call soundbus_dev_put() to give up the reference that hold in device_initialize(), so that it can be fr
nvdosv
CVE-2023-53501MEDIUMCVSS 4.7≥ 5.15, < 5.15.132≥ 5.16, < 6.1.53+2 more2025-10-01
CVE-2023-53501 [MEDIUM] CVE-2023-53501: In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_s In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind When unbinding pasid - a race condition exists vs outstanding page faults. To prevent this, the pasid_state object contains a refcount. * set to 1 on pasid bind * incremented on each ppr notification start * d
nvdosv
CVE-2025-39898UNKNOWN≥ 2.6.24, < 5.4.299≥ 5.5.0, < 5.10.243+5 more2025-10-01
CVE-2025-39898 e1000e: fix heap overflow in e1000_set_eeprom e1000e: fix heap overflow in e1000_set_eeprom In the Linux kernel, the following vulnerability has been resolved: e1000e: fix heap overflow in e1000_set_eeprom Fix a possible heap overflow in e1000_set_eeprom function by adding input validation for the requested length of the change in the EEPROM. In addition, change the variable type from int to size_t for better code practices and rearrange declarations to RCT.
osv
CVE-2023-53469UNKNOWN≥ 4.2.0, < 6.4.122025-10-01
CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage(). af_unix: Fix null-ptr-deref in unix_stream_sendpage(). In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix null-ptr-deref in unix_stream_sendpage(). Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro. unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue. If the peer's FD is pass
osv
CVE-2022-50455UNKNOWN≥ 0, < 6.1.4-12025-10-01
CVE-2022-50455 CVE-2022-50455: In the Linux kernel, the following vulnerability has been resolved: nfs: fix possible null-ptr-deref when parsing param According to commit "vfs: pars In the Linux kernel, the following vulnerability has been resolved: nfs: fix possible null-ptr-deref when parsing param According to commit "vfs: parse: deal with zero length string value", kernel will set the param->string to null pointer in vfs_parse_fs_string() if fs string has zero length. Yet the problem is that
osv
CVE-2022-50450UNKNOWN≥ 0, < 6.1.4-12025-10-01
CVE-2022-50450 CVE-2022-50450: In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with t In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with the elf_getshdrnum() helper to fix two oss-fuzz-reported heap-buffer overflow in __bpf_object__open. Both reports are incorrectly marked as fixed and while still being r
osv
CVE-2025-39889MEDIUMCVSS 5.5≥ 5.11, < 5.15.181≥ 5.16, < 6.1.135+4 more2025-09-24
CVE-2025-39889 [MEDIUM] CWE-326 CVE-2025-39889: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: Check encrypt In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: Check encryption key size on incoming connection This is required for passing GAP/SEC/SEM/BI-04-C PTS test case: Security Mode 4 Level 4, Responder - Invalid Encryption Key Size - 128 bit This tests the security key with size from 1 to 15 bytes while the Securit
nvdosv
CVE-2024-58241MEDIUMCVSS 5.5≥ 4.19.319, < 4.20≥ 5.4.281, < 5.5+8 more2025-09-24
CVE-2024-58241 [MEDIUM] CVE-2024-58241: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Disable wo In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Disable works on hci_unregister_dev This make use of disable_work_* on hci_unregister_dev since the hci_dev is about to be freed new submissions are not disarable.
nvdosv
Linux Kernel vulnerabilities | cvebase