Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 142 of 738
CVE-2023-53519MEDIUMCVSS 5.5≥ 2.6.39, < 4.14.324≥ 4.15, < 4.19.293+5 more2025-10-01
CVE-2023-53519 [MEDIUM] CWE-667 CVE-2023-53519: In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-mem2mem: add lock t
In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-mem2mem: add lock to protect parameter num_rdy
Getting below error when using KCSAN to check the driver. Adding lock to
protect parameter num_rdy when getting the value with function:
v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready.
kworker/u16:3: [name:report
nvdosv
CVE-2022-50424MEDIUMCVSS 5.5≥ 6.2, < 6.2.32025-10-01
CVE-2022-50424 [MEDIUM] CWE-401 CVE-2022-50424: In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: resource le
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921: resource leaks at mt7921_check_offload_capability()
Fixed coverity issue with resource leaks at variable "fw" going out of
scope leaks the storage it points to mt7921_check_offload_capability().
Addresses-Coverity-ID: 1527806 ("Resource leaks")
nvdosv
CVE-2023-53467MEDIUMCVSS 5.5≥ 5.18, < 6.1.16≥ 6.2, < 6.2.32025-10-01
CVE-2023-53467 [MEDIUM] CWE-401 CVE-2023-53467: In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: fix potential leak
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie()
Do `kfree_skb(new)` before `goto out` to prevent potential leak.
nvdosv
CVE-2022-50447MEDIUMCVSS 5.5≥ 6.0, < 6.0.16≥ 6.1, < 6.1.22025-10-01
CVE-2022-50447 [MEDIUM] CWE-476 CVE-2022-50447: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: Fix crash
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: Fix crash on hci_create_cis_sync
When attempting to connect multiple ISO sockets without using
DEFER_SETUP may result in the following crash:
BUG: KASAN: null-ptr-deref in hci_create_cis_sync+0x18b/0x2b0
Read of size 2 at addr 0000000000000036 by task kworker/
nvdosv
CVE-2025-39909MEDIUMCVSS 5.5≥ 6.0, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-10-01
CVE-2025-39909 [MEDIUM] CWE-369 CVE-2025-39909: In the Linux kernel, the following vulnerability has been resolved:
mm/damon/lru_sort: avoid divide
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters
application".
DAMON's RECLAIM and LRU_SORT modules perform no validation on
user-configured parameters during application, which
nvdosv
CVE-2023-53448MEDIUMCVSS 5.5≥ 6.0, < 6.1.42≥ 6.2, < 6.4.7+1 more2025-10-01
CVE-2023-53448 [MEDIUM] CWE-617 CVE-2023-53448: In the Linux kernel, the following vulnerability has been resolved:
fbdev: imxfb: Removed unneeded
In the Linux kernel, the following vulnerability has been resolved:
fbdev: imxfb: Removed unneeded release_mem_region
Remove unnecessary release_mem_region from the error path to prevent
mem region from being released twice, which could avoid resource leak
or other unexpected issues.
nvdosv
CVE-2025-39919MEDIUMCVSS 5.5≥ 6.15, < 6.16.6v6.172025-10-01
CVE-2025-39919 [MEDIUM] CVE-2025-39919: In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: add missing
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: add missing check for rx wcid entries
Non-station wcid entries must not be passed to the rx functions.
In case of the global wcid entry, it could even lead to corruption in the wcid
array due to pointer being casted to struct mt7996_sta_link using container_of.
nvdosv
CVE-2023-53474MEDIUMCVSS 5.5≥ 5.10, < 5.10.180≥ 5.11, < 5.15.111+3 more2025-10-01
CVE-2023-53474 [MEDIUM] CWE-190 CVE-2023-53474: In the Linux kernel, the following vulnerability has been resolved:
x86/MCE/AMD: Use an u64 for ban
In the Linux kernel, the following vulnerability has been resolved:
x86/MCE/AMD: Use an u64 for bank_map
Thee maximum number of MCA banks is 64 (MAX_NR_BANKS), see
a0bc32b3cacf ("x86/mce: Increase maximum number of banks to 64").
However, the bank_map which contains a bitfield of which banks to
initialize is of type unsigned int and that overflo
nvdosv
CVE-2022-50449MEDIUMCVSS 5.5≥ 3.12, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-10-01
CVE-2022-50449 [MEDIUM] CWE-401 CVE-2022-50449: In the Linux kernel, the following vulnerability has been resolved:
clk: samsung: Fix memory leak i
In the Linux kernel, the following vulnerability has been resolved:
clk: samsung: Fix memory leak in _samsung_clk_register_pll()
If clk_register() fails, @pll->rate_table may have allocated memory by
kmemdup(), so it needs to be freed, otherwise will cause memory leak
issue, this patch fixes it.
nvdosv
CVE-2022-50458MEDIUMCVSS 5.5≥ 4.5, < 4.9.331≥ 4.10, < 4.14.296+6 more2025-10-01
CVE-2022-50458 [MEDIUM] CVE-2022-50458: In the Linux kernel, the following vulnerability has been resolved:
clk: tegra: Fix refcount leak i
In the Linux kernel, the following vulnerability has been resolved:
clk: tegra: Fix refcount leak in tegra210_clock_init
of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
nvdosv
CVE-2023-53451MEDIUMCVSS 5.5≥ 2.6.35, < 4.14.322≥ 4.15, < 4.19.291+5 more2025-10-01
CVE-2023-53451 [MEDIUM] CWE-476 CVE-2023-53451: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix potential NU
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix potential NULL pointer dereference
Klocwork tool reported 'cur_dsd' may be dereferenced. Add fix to validate
pointer before dereferencing the pointer.
nvdosv
CVE-2022-50465MEDIUMCVSS 5.5≥ 5.10, < 5.10.163≥ 5.11, < 5.15.87+2 more2025-10-01
CVE-2022-50465 [MEDIUM] CWE-401 CVE-2022-50465: In the Linux kernel, the following vulnerability has been resolved:
ext4: fix leaking uninitialized
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix leaking uninitialized memory in fast-commit journal
When space at the end of fast-commit journal blocks is unused, make sure
to zero it out so that uninitialized memory is not leaked to disk.
nvdosv
CVE-2022-50431MEDIUMCVSS 5.5≥ 2.6.18, < 4.9.332≥ 4.10, < 4.14.298+6 more2025-10-01
CVE-2022-50431 [MEDIUM] CWE-401 CVE-2022-50431: In the Linux kernel, the following vulnerability has been resolved:
ALSA: aoa: i2sbus: fix possible
In the Linux kernel, the following vulnerability has been resolved:
ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()
dev_set_name() in soundbus_add_one() allocates memory for name, it need be
freed when of_device_register() fails, call soundbus_dev_put() to give up
the reference that hold in device_initialize(), so that it can be fr
nvdosv
CVE-2023-53501MEDIUMCVSS 4.7≥ 5.15, < 5.15.132≥ 5.16, < 6.1.53+2 more2025-10-01
CVE-2023-53501 [MEDIUM] CVE-2023-53501: In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/iommu_v2: Fix pasid_s
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
When unbinding pasid - a race condition exists vs outstanding page faults.
To prevent this, the pasid_state object contains a refcount.
* set to 1 on pasid bind
* incremented on each ppr notification start
* d
nvdosv
CVE-2025-39898UNKNOWN≥ 2.6.24, < 5.4.299≥ 5.5.0, < 5.10.243+5 more2025-10-01
CVE-2025-39898 e1000e: fix heap overflow in e1000_set_eeprom
e1000e: fix heap overflow in e1000_set_eeprom
In the Linux kernel, the following vulnerability has been resolved:
e1000e: fix heap overflow in e1000_set_eeprom
Fix a possible heap overflow in e1000_set_eeprom function by adding
input validation for the requested length of the change in the EEPROM.
In addition, change the variable type from int to size_t for better
code practices and rearrange declarations to RCT.
osv
CVE-2023-53469UNKNOWN≥ 4.2.0, < 6.4.122025-10-01
CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage().
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage()
with detailed analysis and a nice repro.
unix_stream_sendpage() tries to add data to the last skb in the peer's
recv queue without locking the queue.
If the peer's FD is pass
osv
CVE-2022-50455UNKNOWN≥ 0, < 6.1.4-12025-10-01
CVE-2022-50455 CVE-2022-50455: In the Linux kernel, the following vulnerability has been resolved: nfs: fix possible null-ptr-deref when parsing param According to commit "vfs: pars
In the Linux kernel, the following vulnerability has been resolved: nfs: fix possible null-ptr-deref when parsing param According to commit "vfs: parse: deal with zero length string value", kernel will set the param->string to null pointer in vfs_parse_fs_string() if fs string has zero length. Yet the problem is that
osv
CVE-2022-50450UNKNOWN≥ 0, < 6.1.4-12025-10-01
CVE-2022-50450 CVE-2022-50450: In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with t
In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with the elf_getshdrnum() helper to fix two oss-fuzz-reported heap-buffer overflow in __bpf_object__open. Both reports are incorrectly marked as fixed and while still being r
osv
CVE-2025-39889MEDIUMCVSS 5.5≥ 5.11, < 5.15.181≥ 5.16, < 6.1.135+4 more2025-09-24
CVE-2025-39889 [MEDIUM] CWE-326 CVE-2025-39889: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: l2cap: Check encrypt
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: l2cap: Check encryption key size on incoming connection
This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:
Security Mode 4 Level 4, Responder - Invalid Encryption Key Size
- 128 bit
This tests the security key with size from 1 to 15 bytes while the
Securit
nvdosv
CVE-2024-58241MEDIUMCVSS 5.5≥ 4.19.319, < 4.20≥ 5.4.281, < 5.5+8 more2025-09-24
CVE-2024-58241 [MEDIUM] CVE-2024-58241: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Disable wo
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Disable works on hci_unregister_dev
This make use of disable_work_* on hci_unregister_dev since the hci_dev is
about to be freed new submissions are not disarable.
nvdosv