Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 159 of 745
CVE-2022-50368HIGHCVSS 7.8≥ 4.1, < 4.19.264≥ 4.20, < 5.4.223+4 more2025-09-17
CVE-2022-50368 [HIGH] CWE-787 CVE-2022-50368: In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dsi: fix memory corrupt
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dsi: fix memory corruption with too many bridges
Add the missing sanity check on the bridge counter to avoid corrupting
data beyond the fixed-sized bridge array in case there are ever more
than eight bridges.
Patchwork: https://patchwork.freedesktop.org/patch/502668/
nvdosv
CVE-2022-50366HIGHCVSS 7.1fixed in 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-17
CVE-2022-50366 [HIGH] CWE-125 CVE-2022-50366: In the Linux kernel, the following vulnerability has been resolved:
powercap: intel_rapl: fix UBSAN
In the Linux kernel, the following vulnerability has been resolved:
powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue
When value < time_unit, the parameter of ilog2() will be zero and
the return value is -1. u64(-1) is too large for shift exponent
and then will trigger shift-out-of-bounds:
shift exponent 18446744073709551615 is too large fo
nvdosv
CVE-2022-50367HIGHCVSS 7.8fixed in 4.9.331≥ 4.10, < 4.14.296+6 more2025-09-17
CVE-2022-50367 [HIGH] CWE-416 CVE-2022-50367: In the Linux kernel, the following vulnerability has been resolved:
fs: fix UAF/GPF bug in nilfs_md
In the Linux kernel, the following vulnerability has been resolved:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode->i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
nvdosv
CVE-2023-53357HIGHCVSS 7.1≥ 2.6.36, < 4.19.291≥ 4.20, < 5.4.251+5 more2025-09-17
CVE-2023-53357 [HIGH] CWE-125 CVE-2023-53357: In the Linux kernel, the following vulnerability has been resolved:
md/raid10: check slab-out-of-bo
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: check slab-out-of-bounds in md_bitmap_get_counter
If we write a large number to md/bitmap_set_bits, md_bitmap_checkpage()
will return -EINVAL because 'page >= bitmap->pages', but the return value
was not checked immediately in md_bitmap_get_counter() in order to set
*bloc
nvdosv
CVE-2023-53363HIGHCVSS 7.8≥ 6.2, < 6.2.12v6.32025-09-17
CVE-2023-53363 [HIGH] CWE-416 CVE-2023-53363: In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix use-after-free in pci_
In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix use-after-free in pci_bus_release_domain_nr()
Commit c14f7ccc9f5d ("PCI: Assign PCI domain IDs by ida_alloc()")
introduced a use-after-free bug in the bus removal cleanup. The issue was
found with kfence:
[ 19.293351] BUG: KFENCE: use-after-free read in pci_bus_release_dom
nvdosv
CVE-2023-53340HIGHCVSS 7.8≥ 5.18, < 6.1.31≥ 6.2, < 6.3.5+1 more2025-09-17
CVE-2023-53340 [HIGH] CWE-129 CVE-2023-53340: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Collect command failu
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Collect command failures data only for known commands
DEVX can issue a general command, which is not used by mlx5 driver.
In case such command is failed, mlx5 is trying to collect the failure
data, However, mlx5 doesn't create a storage for this command, since
mlx5 doesn't
nvdosv
CVE-2023-53356MEDIUMCVSS 5.5≥ 5.8, < 5.10.188≥ 5.11, < 5.15.121+2 more2025-09-17
CVE-2023-53356 [MEDIUM] CWE-476 CVE-2023-53356: In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Add null
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Add null pointer check in gserial_suspend
Consider a case where gserial_disconnect has already cleared
gser->ioport. And if gserial_suspend gets called afterwards,
it will lead to accessing of gser->ioport and thus causing
null pointer dereference.
Avoid th
nvdosv
CVE-2023-53367MEDIUMCVSS 5.5≥ 5.1, < 6.4.122025-09-17
CVE-2023-53367 [MEDIUM] CWE-401 CVE-2023-53367: In the Linux kernel, the following vulnerability has been resolved:
accel/habanalabs: fix mem leak
In the Linux kernel, the following vulnerability has been resolved:
accel/habanalabs: fix mem leak in capture user mappings
This commit fixes a memory leak caused when clearing the user_mappings
info when a new context is opened immediately after user_mapping is
captured and a hard reset is performed.
nvdosv
CVE-2023-53364MEDIUMCVSS 5.5≥ 6.4.7, < 6.4.12v6.52025-09-17
CVE-2023-53364 [MEDIUM] CWE-476 CVE-2023-53364: In the Linux kernel, the following vulnerability has been resolved:
regulator: da9063: better fix n
In the Linux kernel, the following vulnerability has been resolved:
regulator: da9063: better fix null deref with partial DT
Two versions of the original patch were sent but V1 was merged instead
of V2 due to a mistake.
So update to V2.
The advantage of V2 is that it completely avoids dereferencing the pointer,
even just to take the address, whi
nvdosv
CVE-2022-50355MEDIUMCVSS 5.5≥ 4.18, < 4.19.262≥ 4.20, < 5.4.220+4 more2025-09-17
CVE-2022-50355 [MEDIUM] CWE-401 CVE-2022-50355: In the Linux kernel, the following vulnerability has been resolved:
staging: vt6655: fix some erron
In the Linux kernel, the following vulnerability has been resolved:
staging: vt6655: fix some erroneous memory clean-up loops
In some initialization functions of this driver, memory is allocated with
'i' acting as an index variable and increasing from 0. The commit in
"Fixes" introduces some clean-up codes in case of allocation failure,
which free
nvdosv
CVE-2022-50371MEDIUMCVSS 5.5≥ 5.19, < 6.0.16≥ 6.1, < 6.1.22025-09-17
CVE-2022-50371 [MEDIUM] CWE-667 CVE-2022-50371: In the Linux kernel, the following vulnerability has been resolved:
led: qcom-lpg: Fix sleeping in
In the Linux kernel, the following vulnerability has been resolved:
led: qcom-lpg: Fix sleeping in atomic
lpg_brighness_set() function can sleep, while led's brightness_set()
callback must be non-blocking. Change LPG driver to use
brightness_set_blocking() instead.
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580
in
nvdosv
CVE-2023-53343MEDIUMCVSS 5.5≥ 4.14, < 4.19.291≥ 4.20, < 5.4.251+5 more2025-09-17
CVE-2023-53343 [MEDIUM] CWE-476 CVE-2023-53343: In the Linux kernel, the following vulnerability has been resolved:
icmp6: Fix null-ptr-deref of ip
In the Linux kernel, the following vulnerability has been resolved:
icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev().
With some IPv6 Ext Hdr (RPL, SRv6, etc.), we can send a packet that
has the link-local address as src and dst IP and will be forwarded to
an external IP in the IPv6 Ext Hdr.
For example, the script below gener
nvdosv
CVE-2023-53352MEDIUMCVSS 5.5≥ 5.15.124, < 5.15.126≥ 6.1.43, < 6.1.45+2 more2025-09-17
CVE-2023-53352 [MEDIUM] CWE-476 CVE-2023-53352: In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: check null pointer bef
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: check null pointer before accessing when swapping
Add a check to avoid null pointer dereference as below:
[ 90.002283] general protection fault, probably for non-canonical
address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ 90.002292] KASAN: null-ptr-deref in
nvdosv
CVE-2022-50374MEDIUMCVSS 5.5≥ 4.14.63, < 4.15≥ 4.14.63, < 5.10.150+3 more2025-09-17
CVE-2022-50374 [MEDIUM] CWE-908 CVE-2022-50374: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_{ldisc,serdev}:
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure
syzbot is reporting NULL pointer dereference at hci_uart_tty_close() [1],
for rcu_sync_enter() is called without rcu_sync_init() due to
hci_uart_tty_open() ignoring percpu_init_rwsem() failure.
While we are at it, fi
nvdosv
CVE-2022-50373MEDIUMCVSS 4.7fixed in 5.15.75≥ 5.16, < 5.19.17+1 more2025-09-17
CVE-2022-50373 [MEDIUM] CWE-362 CVE-2022-50373: In the Linux kernel, the following vulnerability has been resolved:
fs: dlm: fix race in lowcomms
In the Linux kernel, the following vulnerability has been resolved:
fs: dlm: fix race in lowcomms
This patch fixes a race between queue_work() in
_dlm_lowcomms_commit_msg() and srcu_read_unlock(). The queue_work() can
take the final reference of a dlm_msg and so msg->idx can contain
garbage which is signaled by the following warning:
[ 676.237050]
nvdosv
CVE-2023-53348MEDIUMCVSS 5.5≥ 4.3, < 6.1.23≥ 6.2, < 6.2.10+1 more2025-09-17
CVE-2023-53348 [MEDIUM] CWE-667 CVE-2023-53348: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix deadlock when aborti
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix deadlock when aborting transaction during relocation with scrub
Before relocating a block group we pause scrub, then do the relocation and
then unpause scrub. The relocation process requires starting and committing
a transaction, and if we have a failure in the critical
nvdosv
CVE-2023-53336MEDIUMCVSS 5.5≥ 5.16, < 6.4.16≥ 6.5, < 6.5.32025-09-17
CVE-2023-53336 [MEDIUM] CWE-476 CVE-2023-53336: In the Linux kernel, the following vulnerability has been resolved:
media: ipu-bridge: Fix null poi
In the Linux kernel, the following vulnerability has been resolved:
media: ipu-bridge: Fix null pointer deref on SSDB/PLD parsing warnings
When ipu_bridge_parse_rotation() and ipu_bridge_parse_orientation() run
sensor->adev is not set yet.
So if either of the dev_warn() calls about unknown values are hit this
will lead to a NULL pointer deref.
S
nvdosv
CVE-2022-50361MEDIUMCVSS 5.5≥ 5.17, < 6.1.16≥ 6.2, < 6.2.32025-09-17
CVE-2022-50361 [MEDIUM] CWE-476 CVE-2022-50361: In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: add missing unr
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: add missing unregister_netdev() in wilc_netdev_ifc_init()
Fault injection test reports this issue:
kernel BUG at net/core/dev.c:10731!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
Call Trace:
wilc_netdev_ifc_init+0x19f/0x220 [wilc1000 884bf126e9e98af6a708f266a
nvdosv
CVE-2023-53335MEDIUMCVSS 5.5≥ 4.7, < 5.15.99≥ 5.16, < 6.1.16+1 more2025-09-17
CVE-2023-53335 [MEDIUM] CWE-476 CVE-2023-53335: In the Linux kernel, the following vulnerability has been resolved:
RDMA/cxgb4: Fix potential null-
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()
If get_ep_from_tid() fails to lookup non-NULL value for ep, ep is
dereferenced later regardless of whether it is empty.
This patch adds a simple sanity check to fix the issue.
Found by Linux Verification Center (linuxte
nvdosv
CVE-2022-50362MEDIUMCVSS 5.5≥ 5.6, < 5.10.150≥ 5.11, < 5.15.75+2 more2025-09-17
CVE-2022-50362 [MEDIUM] CVE-2022-50362: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: hisilicon: Add multi
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: hisilicon: Add multi-thread support for a DMA channel
When we get a DMA channel and try to use it in multiple threads it
will cause oops and hanging the system.
% echo 100 > /sys/module/dmatest/parameters/threads_per_chan
% echo 100 > /sys/module/dmatest/parameters/iterations
nvdosv