Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 123 of 738
CVE-2023-53635MEDIUMCVSS 5.5≥ 4.4, < 6.1.28≥ 6.2, < 6.2.15+1 more2025-10-07
CVE-2023-53635 [MEDIUM] CVE-2023-53635: In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: fix wrong In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: fix wrong ct->timeout value (struct nf_conn)->timeout is an interval before the conntrack confirmed. After confirmed, it becomes a timestamp. It is observed that timeout of an unconfirmed conntrack: - Set by calling ctnetlink_change_timeout(). As a result, `nfct_tim
nvdosv
CVE-2022-50512MEDIUMCVSS 5.5≥ 5.10, < 5.10.150≥ 5.11, < 5.15.75+2 more2025-10-07
CVE-2022-50512 [MEDIUM] CWE-401 CVE-2022-50512: In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory leak In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory leak in ext4_fc_record_regions() As krealloc may return NULL, in this case 'state->fc_regions' may not be freed by krealloc, but 'state->fc_regions' already set NULL. Then will lead to 'state->fc_regions' memory leak.
nvdosv
CVE-2022-50529MEDIUMCVSS 5.5≥ 4.14, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-10-07
CVE-2022-50529 [MEDIUM] CWE-401 CVE-2022-50529: In the Linux kernel, the following vulnerability has been resolved: test_firmware: fix memory leak In the Linux kernel, the following vulnerability has been resolved: test_firmware: fix memory leak in test_firmware_init() When misc_register() failed in test_firmware_init(), the memory pointed by test_fw_config->name is not released. The memory leak information is as follows: unreferenced object 0xffff88810a34cb00 (size 32): comm "insmod", pid 79
nvdosv
CVE-2023-53661MEDIUMCVSS 5.5≥ 4.4, < 5.15.113≥ 5.16, < 6.1.30+1 more2025-10-07
CVE-2023-53661 [MEDIUM] CWE-190 CVE-2023-53661: In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_ge In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow. Fou
nvdosv
CVE-2022-50524MEDIUMCVSS 5.5≥ 5.19, < 6.0.16≥ 6.1, < 6.1.22025-10-07
CVE-2022-50524 [MEDIUM] CWE-476 CVE-2022-50524: In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Check return va In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Check return value after calling platform_get_resource() platform_get_resource() may return NULL pointer, we need check its return value to avoid null-ptr-deref in resource_size().
nvdosv
CVE-2022-50531MEDIUMCVSS 5.5≥ 4.17, < 4.19.264≥ 4.20, < 5.4.221+4 more2025-10-07
CVE-2022-50531 [MEDIUM] CWE-401 CVE-2022-50531: In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak i In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak in tipc_topsrv_kern_subscr Use a 8-byte write to initialize sub.usr_handle in tipc_topsrv_kern_subscr(), otherwise four bytes remain uninitialized when issuing setsockopt(..., SOL_TIPC, ...). This resulted in an infoleak reported by KMSAN when the pac
nvdosv
CVE-2023-53644MEDIUMCVSS 5.5≥ 3.6, < 4.14.316≥ 4.15, < 4.19.284+5 more2025-10-07
CVE-2023-53644 [MEDIUM] CVE-2023-53644: In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoin In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoint checks The syzbot fuzzer was able to provoke a WARNING from the radio-shark2 driver: ------------[ cut here ]------------ usb 1-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU: 0 PID: 3271 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed2/0x1880 drivers
nvdosv
CVE-2022-50509MEDIUMCVSS 5.5≥ 3.19, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-10-07
CVE-2022-50509 [MEDIUM] CWE-476 CVE-2022-50509: In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmal In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
nvdosv
CVE-2023-53677MEDIUMCVSS 5.5≥ 6.3, < 6.3.22025-10-07
CVE-2023-53677 [MEDIUM] CWE-401 CVE-2023-53677: In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix memory leaks in i In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix memory leaks in i915 selftests This patch fixes memory leaks on error escapes in function fake_get_pages (cherry picked from commit 8bfbdadce85c4c51689da10f39c805a7106d4567)
nvdosv
CVE-2023-53682MEDIUMCVSS 5.5≥ 4.9, < 6.1.25≥ 6.2, < 6.2.12+1 more2025-10-07
CVE-2023-53682 [MEDIUM] CWE-401 CVE-2023-53682: In the Linux kernel, the following vulnerability has been resolved: hwmon: (xgene) Fix ioremap and In the Linux kernel, the following vulnerability has been resolved: hwmon: (xgene) Fix ioremap and memremap leak Smatch reports: drivers/hwmon/xgene-hwmon.c:757 xgene_hwmon_probe() warn: 'ctx->pcc_comm_addr' from ioremap() not released on line: 757. This is because in drivers/hwmon/xgene-hwmon.c:701 xgene_hwmon_probe(), ioremap and memremap is no
nvdosv
CVE-2022-50555MEDIUMCVSS 5.5≥ 4.17, < 4.19.264≥ 4.20, < 5.4.223+4 more2025-10-07
CVE-2022-50555 [MEDIUM] CWE-476 CVE-2022-50555: In the Linux kernel, the following vulnerability has been resolved: tipc: fix a null-ptr-deref in t In the Linux kernel, the following vulnerability has been resolved: tipc: fix a null-ptr-deref in tipc_topsrv_accept syzbot found a crash in tipc_topsrv_accept: KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] Workqueue: tipc_rcv tipc_topsrv_accept RIP: 0010:kernel_accept+0x22d/0x350 net/socket.c:3487 Call Trace: tipc_topsr
nvdosv
CVE-2023-53667MEDIUMCVSS 5.5≥ 3.16, < 4.14.317≥ 4.15, < 4.19.285+6 more2025-10-07
CVE-2023-53667 [MEDIUM] CWE-476 CVE-2023-53667: In the Linux kernel, the following vulnerability has been resolved: net: cdc_ncm: Deal with too low In the Linux kernel, the following vulnerability has been resolved: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize Currently in cdc_ncm_check_tx_max(), if dwNtbOutMaxSize is lower than the calculated "min" value, but greater than zero, the logic sets tx_max to dwNtbOutMaxSize. This is then used to allocate a new SKB in cdc_ncm_fill_tx_f
nvdosv
CVE-2023-53637MEDIUMCVSS 5.5≥ 4.17, < 4.19.276≥ 4.20, < 5.4.235+4 more2025-10-07
CVE-2023-53637 [MEDIUM] CWE-401 CVE-2023-53637: In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memleak In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memleak in ov772x_probe() A memory leak was reported when testing ov772x with bpf mock device: AssertionError: unreferenced object 0xffff888109afa7a8 (size 8): comm "python3", pid 279, jiffies 4294805921 (age 20.681s) hex dump (first 8 bytes): 80 22 88 15
nvdosv
CVE-2023-53679MEDIUMCVSS 5.5≥ 4.2, < 5.4.235≥ 5.5, < 5.10.173+3 more2025-10-07
CVE-2023-53679 [MEDIUM] CWE-191 CVE-2023-53679: In the Linux kernel, the following vulnerability has been resolved: wifi: mt7601u: fix an integer u In the Linux kernel, the following vulnerability has been resolved: wifi: mt7601u: fix an integer underflow Fix an integer underflow that leads to a null pointer dereference in 'mt7601u_rx_skb_from_seg()'. The variable 'dma_len' in the URB packet could be manipulated, which could trigger an integer underflow of 'seg_len' in 'mt7601u_rx_process_seg
nvdosv
CVE-2022-50533MEDIUMCVSS 5.5≥ 6.0, < 6.0.16≥ 6.1, < 6.1.22025-10-07
CVE-2022-50533 [MEDIUM] CWE-476 CVE-2022-50533: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null- In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null-ptr deref on failed assoc If association to an AP without a link 0 fails, then we crash in tracing because it assumes that either ap_mld_addr or link 0 BSS is valid, since we clear sdata->vif.valid_links and then don't add the ap_mld_addr to the stru
nvdosv
CVE-2023-53681MEDIUMCVSS 5.5≥ 3.10, < 4.19.291≥ 4.20, < 5.4.253+4 more2025-10-07
CVE-2023-53681 [MEDIUM] CWE-476 CVE-2023-53681: In the Linux kernel, the following vulnerability has been resolved: bcache: Fix __bch_btree_node_al In the Linux kernel, the following vulnerability has been resolved: bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent In some specific situations, the return value of __bch_btree_node_alloc may be NULL. This may lead to a potential NULL pointer dereference in caller function like a calling chain : btree_split->bch_btree_no
nvdosv
CVE-2023-53662MEDIUMCVSS 5.5≥ 5.13, < 6.1.54≥ 6.2, < 6.5.42025-10-07
CVE-2023-53662 [MEDIUM] CWE-401 CVE-2023-53662: In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leaks in ext4_ In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} If the filename casefolding fails, we'll be leaking memory from the fscrypt_name struct, namely from the 'crypto_buf.name' member. Make sure we free it in the error path on both ext4_fname_setup_filename() and e
nvdosv
CVE-2023-53623MEDIUMCVSS 4.7≥ 4.14, < 4.14.313≥ 4.15, < 4.19.281+6 more2025-10-07
CVE-2023-53623 [MEDIUM] CWE-362 CVE-2023-53623: In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix swap_info_struct r In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages() The si->lock must be held when deleting the si from the available list. Otherwise, another thread can re-add the si to the available list, which can lead to memory corruption. The only place we have found wher
nvdosv
CVE-2023-53685MEDIUMCVSS 5.5≥ 3.8, < 6.1.30≥ 6.2, < 6.3.4+1 more2025-10-07
CVE-2023-53685 [MEDIUM] CWE-401 CVE-2023-53685: In the Linux kernel, the following vulnerability has been resolved: tun: Fix memory leak for detach In the Linux kernel, the following vulnerability has been resolved: tun: Fix memory leak for detached NAPI queue. syzkaller reported [0] memory leaks of sk and skb related to the TUN device with no repro, but we can reproduce it easily with: struct ifreq ifr = {} int fd_tun, fd_tmp; char buf[4] = {}; fd_tun = openat(AT_FDCWD, "/dev/net/tun", O_W
nvdosv
CVE-2022-50515MEDIUMCVSS 5.5≥ 5.15.58, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-10-07
CVE-2022-50515 [MEDIUM] CWE-401 CVE-2022-50515: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix memory leak in In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue() If construction of the array of work queues to handle hpd_rx_irq offload work fails, we need to unwind. Destroy all the created workqueues and the allocated memory for the hpd_rx_irq_offload_work_queue struct array.
nvdosv