Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 167 of 745
CVE-2025-39833MEDIUMCVSS 5.5≥ 2.6.29, < 6.16.5v6.172025-09-16
CVE-2025-39833 [MEDIUM] CWE-908 CVE-2025-39833: In the Linux kernel, the following vulnerability has been resolved: mISDN: hfcpci: Fix warning when In the Linux kernel, the following vulnerability has been resolved: mISDN: hfcpci: Fix warning when deleting uninitialized timer With CONFIG_DEBUG_OBJECTS_TIMERS unloading hfcpci module leads to the following splat: [ 250.215892] ODEBUG: assert_init not available (active state 0) object: ffffffffc01a3dc0 object type: timer_list hint: 0x0 [ 250.21
nvdosv
CVE-2023-53309MEDIUMCVSS 5.5fixed in 4.14.324≥ 4.15, < 4.19.293+5 more2025-09-16
CVE-2023-53309 [MEDIUM] CWE-190 CVE-2023-53309: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflo In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later
nvdosv
CVE-2022-50350MEDIUMCVSS 4.7≥ 3.12, < 6.0.16≥ 6.1, < 6.1.22025-09-16
CVE-2022-50350 [MEDIUM] CWE-362 CVE-2022-50350: In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix a race In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix a race condition between login_work and the login thread In case a malicious initiator sends some random data immediately after a login PDU; the iscsi_target_sk_data_ready() callback will schedule the login_work and, at the same time, the negotiation may e
nvdosv
CVE-2023-53325MEDIUMCVSS 5.5≥ 6.1, < 6.1.55≥ 6.2, < 6.5.52025-09-16
CVE-2023-53325 [MEDIUM] CWE-476 CVE-2023-53325: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: dp: Change loggin In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: dp: Change logging to dev for mtk_dp_aux_transfer() Change logging from drm_{err,info}() to dev_{err,info}() in functions mtk_dp_aux_transfer() and mtk_dp_aux_do_transfer(): this will be essential to avoid getting NULL pointer kernel panics if any kind of error happe
nvdosv
CVE-2023-53313MEDIUMCVSS 5.5≥ 2.6.33, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-09-16
CVE-2023-53313 [MEDIUM] CVE-2023-53313: In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix wrong setting of In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix wrong setting of max_corr_read_errors There is no input check when echo md/max_read_errors and overflow might occur. Add check of input number.
nvdosv
CVE-2023-53294MEDIUMCVSS 5.5≥ 5.15, < 5.15.112≥ 5.16, < 6.1.29+2 more2025-09-16
CVE-2023-53294 [MEDIUM] CWE-476 CVE-2023-53294: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix null-ptr-deref on In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix null-ptr-deref on inode->i_op in ntfs_lookup() Syzbot reported a null-ptr-deref bug: ntfs3: loop0: Different NTFS' sector size (1024) and media sector size (512) ntfs3: loop0: Mark volume as dirty due to NTFS errors general protection fault, probably for non-canonic
nvdosv
CVE-2025-39831MEDIUMCVSS 5.5≥ 6.11, < 6.12.45≥ 6.13, < 6.16.5+1 more2025-09-16
CVE-2025-39831 [MEDIUM] CVE-2025-39831: In the Linux kernel, the following vulnerability has been resolved: fbnic: Move phylink resume out In the Linux kernel, the following vulnerability has been resolved: fbnic: Move phylink resume out of service_task and into open/close The fbnic driver was presenting with the following locking assert coming out of a PM resume: [ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611) [ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at dri
nvdosv
CVE-2023-53324MEDIUMCVSS 5.5≥ 4.15, < 4.19.295≥ 4.20, < 5.4.257+5 more2025-09-16
CVE-2023-53324 [MEDIUM] CVE-2023-53324: In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Don't leak some p In the Linux kernel, the following vulnerability has been resolved: drm/msm/mdp5: Don't leak some plane state Apparently no one noticed that mdp5 plane states leak like a sieve ever since we introduced plane_state->commit refcount a few years ago in 21a01abbe32a ("drm/atomic: Fix freeing connector/plane state too early by tracking commits, v3.") Fix it b
nvdosv
CVE-2025-39811MEDIUMCVSS 5.5≥ 6.8, < 6.12.45≥ 6.13, < 6.16.5+1 more2025-09-16
CVE-2025-39811 [MEDIUM] CWE-476 CVE-2025-39811: In the Linux kernel, the following vulnerability has been resolved: drm/xe/vm: Clear the scratch_pt In the Linux kernel, the following vulnerability has been resolved: drm/xe/vm: Clear the scratch_pt pointer on error Avoid triggering a dereference of an error pointer on cleanup in xe_vm_free_scratch() by clearing any scratch_pt error pointer. (cherry picked from commit 358ee50ab565f3c8ea32480e9d03127a81ba32f8)
nvdosv
CVE-2022-50345UNKNOWN≥ 0, < 5.10.221-1≥ 0, < 6.0.3-12025-09-16
CVE-2022-50345 CVE-2022-50345: In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era, In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era, NFSD has conserved the number of pages held by each nfsd thread by combining the RPC receive and send buffers into a single array of pages. This works because there ar
osv
CVE-2023-53293UNKNOWN≥ 0, < 6.1.30≥ 6.2.0, < 6.3.42025-09-16
CVE-2023-53293 Bluetooth: btrtl: check for NULL in btrtl_set_quirks() Bluetooth: btrtl: check for NULL in btrtl_set_quirks() In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_set_quirks() The btrtl_set_quirks() has accessed btrtl_dev->ic_info->lmp_subver since b8e482d02513. However, if installing a Realtek Bluetooth controller without the driver supported, it will hit the NULL point accessed. Add a check for NULL to avoid the Kernel
osv
CVE-2023-53217HIGHCVSS 7.8≥ 4.18, < 5.10.188≥ 5.11, < 5.15.120+3 more2025-09-15
CVE-2023-53217 [HIGH] CVE-2023-53217: In the Linux kernel, the following vulnerability has been resolved: nubus: Partially revert proc_cr In the Linux kernel, the following vulnerability has been resolved: nubus: Partially revert proc_create_single_data() conversion The conversion to proc_create_single_data() introduced a regression whereby reading a file in /proc/bus/nubus results in a seg fault: # grep -r . /proc/bus/nubus/e/ Data read fault at 0x00000020 in Super Data (pc=0x1074c2) BAD KE
nvdosv
CVE-2022-50235HIGHCVSS 7.8≥ 5.15.12, < 5.15.75≥ 5.16.1, < 5.19.17+2 more2025-09-15
CVE-2022-50235 [HIGH] CWE-787 CVE-2022-50235: In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buff In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv2 READDIR Restore the previous limit on the @count argument to prevent a buffer overflow attack.
nvdosv
CVE-2022-50329HIGHCVSS 7.8v5.15.86v6.0.16+2 more2025-09-15
CVE-2022-50329 [HIGH] CWE-416 CVE-2022-50329: In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq Commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'") will access 'bic->bfqq' in bic_set_bfqq(), however, bfq_exit_icq_bfqq() can free bfqq first, and then call bic_set_bfqq(), which will cause uaf. Fix the problem by
nvdosv
CVE-2022-50274HIGHCVSS 7.8fixed in 4.14.303≥ 4.15, < 4.19.270+5 more2025-09-15
CVE-2022-50274 [HIGH] CWE-416 CVE-2022-50274: In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: adopts refcnt to In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: adopts refcnt to avoid UAF dvb_unregister_device() is known that prone to use-after-free. That is, the cleanup from dvb_unregister_device() releases the dvb_device even if there are pointers stored in file->private_data still refer to it. This patch adds a reference
nvdosv
CVE-2023-53213HIGHCVSS 7.1fixed in 4.14.315≥ 4.15, < 4.19.283+6 more2025-09-15
CVE-2023-53213 [HIGH] CWE-125 CVE-2023-53213: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: slab-out-of-bou In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() Fix a slab-out-of-bounds read that occurs in kmemdup() called from brcmf_get_assoc_ies(). The bug could occur when assoc_info->req_len, data from a URB provided by a USB device, is bigger than the size of buffer which
nvdosv
CVE-2025-39804HIGHCVSS 7.8≥ 6.16, < 6.16.42025-09-15
CVE-2025-39804 [HIGH] CVE-2025-39804: In the Linux kernel, the following vulnerability has been resolved: lib/crypto: arm64/poly1305: Fix In the Linux kernel, the following vulnerability has been resolved: lib/crypto: arm64/poly1305: Fix register corruption in no-SIMD contexts Restore the SIMD usability check that was removed by commit a59e5468a921 ("crypto: arm64/poly1305 - Add block-only interface"). This safety check is cheap and is well worth eliminating a footgun. While the Poly1305 fun
nvdosv
CVE-2023-53257HIGHCVSS 7.8fixed in 5.15.133≥ 5.16, < 6.1.55+1 more2025-09-15
CVE-2023-53257 [HIGH] CVE-2023-53257: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check S1G actio In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check S1G action frame size Before checking the action code, check that it even exists in the frame.
nvdosv
CVE-2022-50315HIGHCVSS 7.8fixed in 4.9.332≥ 4.10, < 4.14.298+6 more2025-09-15
CVE-2022-50315 [HIGH] CWE-129 CVE-2022-50315: In the Linux kernel, the following vulnerability has been resolved: ata: ahci: Match EM_MAX_SLOTS w In the Linux kernel, the following vulnerability has been resolved: ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS UBSAN complains about array-index-out-of-bounds: [ 1.980703] kernel: UBSAN: array-index-out-of-bounds in /build/linux-9H675w/linux-5.15.0/drivers/ata/libahci.c:968:41 [ 1.980709] kernel: index 15 is out of range for type 'ahci_em
nvdosv
CVE-2023-53219HIGHCVSS 7.8≥ 4.3, < 4.14.316≥ 4.15, < 4.19.284+6 more2025-09-15
CVE-2023-53219 [HIGH] CWE-416 CVE-2023-53219: In the Linux kernel, the following vulnerability has been resolved: media: netup_unidvb: fix use-af In the Linux kernel, the following vulnerability has been resolved: media: netup_unidvb: fix use-after-free at del_timer() When Universal DVB card is detaching, netup_unidvb_dma_fini() uses del_timer() to stop dma->timeout timer. But when timer handler netup_unidvb_dma_timeout() is running, del_timer() could not stop it. As a result, the use-after-f
nvdosv
Linux Kernel vulnerabilities | cvebase