Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 160 of 745
CVE-2022-50354MEDIUMCVSS 5.5≥ 5.16, < 6.0.19≥ 6.1, < 6.1.52025-09-17
CVE-2022-50354 [MEDIUM] CWE-476 CVE-2022-50354: In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix kfd_process_dev
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix kfd_process_device_init_vm error handling
Should only destroy the ib_mem and let process cleanup worker to free
the outstanding BOs. Reset the pointer in pdd->qpd structure, to avoid
NULL pointer access in process destroy worker.
BUG: kernel NULL pointer dereferen
nvdosv
CVE-2023-53359MEDIUMCVSS 5.5fixed in 5.15.100≥ 5.16, < 6.1.18+1 more2025-09-17
CVE-2023-53359 [MEDIUM] CWE-401 CVE-2023-53359: In the Linux kernel, the following vulnerability has been resolved:
USB: fix memory leak with using
In the Linux kernel, the following vulnerability has been resolved:
USB: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic at
once.
nvdosv
CVE-2023-53347MEDIUMCVSS 5.5≥ 5.0, < 6.1.31≥ 6.2, < 6.3.5+1 more2025-09-17
CVE-2023-53347 [MEDIUM] CVE-2023-53347: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Handle pairing of E-s
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Handle pairing of E-switch via uplink un/load APIs
In case user switch a device from switchdev mode to legacy mode, mlx5
first unpair the E-switch and afterwards unload the uplink vport.
From the other hand, in case user remove or reload a device, mlx5
first unload the uplink vp
nvdosv
CVE-2023-53366MEDIUMCVSS 5.5≥ 5.15, < 6.1.16≥ 6.2, < 6.2.32025-09-17
CVE-2023-53366 [MEDIUM] CWE-476 CVE-2023-53366: In the Linux kernel, the following vulnerability has been resolved:
block: be a bit more careful in
In the Linux kernel, the following vulnerability has been resolved:
block: be a bit more careful in checking for NULL bdev while polling
Wei reports a crash with an application using polled IO:
PGD 14265e067 P4D 14265e067 PUD 47ec50067 PMD 0
Oops: 0000 [#1] SMP
CPU: 0 PID: 21915 Comm: iocore_0 Kdump: loaded Tainted: G S 5.12.0-0_fbk12_clang_7346_
nvdosv
CVE-2023-53355MEDIUMCVSS 5.5≥ 4.14, < 6.1.18≥ 6.2, < 6.2.52025-09-17
CVE-2023-53355 [MEDIUM] CWE-401 CVE-2023-53355: In the Linux kernel, the following vulnerability has been resolved:
staging: pi433: fix memory leak
In the Linux kernel, the following vulnerability has been resolved:
staging: pi433: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at onc
nvdosv
CVE-2023-53361MEDIUMCVSS 5.5≥ 5.19, < 6.1.53≥ 6.2, < 6.4.16+1 more2025-09-17
CVE-2023-53361 [MEDIUM] CVE-2023-53361: In the Linux kernel, the following vulnerability has been resolved:
LoongArch: mm: Add p?d_leaf() d
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: mm: Add p?d_leaf() definitions
When I do LTP test, LTP test case ksm06 caused panic at
break_ksm_pmd_entry
-> pmd_leaf (Huge page table but False)
-> pte_present (panic)
The reason is pmd_leaf() is not defined, So like commit 501b81046701
("mips: mm: add p?d_leaf() definitions
nvdosv
CVE-2023-53337MEDIUMCVSS 5.5fixed in 4.14.315≥ 4.15, < 4.19.283+6 more2025-09-17
CVE-2023-53337 [MEDIUM] CVE-2023-53337: In the Linux kernel, the following vulnerability has been resolved:
nilfs2: do not write dirty data
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: do not write dirty data after degenerating to read-only
According to syzbot's report, mark_buffer_dirty() called from
nilfs_segctor_do_construct() outputs a warning with some patterns after
nilfs2 detects metadata corruption and degrades to read-only mode.
After such read-only de
nvdosv
CVE-2023-53341MEDIUMCVSS 5.5≥ 5.17, < 6.0.19≥ 6.1, < 6.1.5+1 more2025-09-17
CVE-2023-53341 [MEDIUM] CWE-908 CVE-2023-53341: In the Linux kernel, the following vulnerability has been resolved:
of/fdt: run soc memory setup wh
In the Linux kernel, the following vulnerability has been resolved:
of/fdt: run soc memory setup when early_init_dt_scan_memory fails
If memory has been found early_init_dt_scan_memory now returns 1. If
it hasn't found any memory it will return 0, allowing other memory
setup mechanisms to carry on.
Previously early_init_dt_scan_memory always retu
nvdosv
CVE-2023-53360MEDIUMCVSS 5.5≥ 6.4, < 6.4.16≥ 6.5, < 6.5.32025-09-17
CVE-2023-53360 [MEDIUM] CWE-415 CVE-2023-53360: In the Linux kernel, the following vulnerability has been resolved:
NFSv4.2: Rework scratch handlin
In the Linux kernel, the following vulnerability has been resolved:
NFSv4.2: Rework scratch handling for READ_PLUS (again)
I found that the read code might send multiple requests using the same
nfs_pgio_header, but nfs4_proc_read_setup() is only called once. This is
how we ended up occasionally double-freeing the scratch buffer, but also
means we
nvdosv
CVE-2022-50369MEDIUMCVSS 5.5≥ 4.20, < 5.10.173≥ 5.11, < 5.15.99+2 more2025-09-17
CVE-2022-50369 [MEDIUM] CWE-476 CVE-2022-50369: In the Linux kernel, the following vulnerability has been resolved:
drm/vkms: Fix null-ptr-deref in
In the Linux kernel, the following vulnerability has been resolved:
drm/vkms: Fix null-ptr-deref in vkms_release()
A null-ptr-deref is triggered when it tries to destroy the workqueue in
vkms->output.composer_workq in vkms_release().
KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
CPU: 5 PID: 17193 Comm: modprobe Not tainte
nvdosv
CVE-2023-53350MEDIUMCVSS 5.5≥ 6.4, < 6.4.12v6.52025-09-17
CVE-2023-53350 [MEDIUM] CWE-401 CVE-2023-53350: In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: Fix slicing memory
In the Linux kernel, the following vulnerability has been resolved:
accel/qaic: Fix slicing memory leak
The temporary buffer storing slicing configuration data from user is only
freed on error. This is a memory leak. Free the buffer unconditionally.
nvdosv
CVE-2022-50358MEDIUMCVSS 4.2fixed in 5.4.229≥ 5.5, < 5.10.163+3 more2025-09-17
CVE-2022-50358 [MEDIUM] CVE-2022-50358: In the Linux kernel, the following vulnerability has been resolved:
brcmfmac: return error when get
In the Linux kernel, the following vulnerability has been resolved:
brcmfmac: return error when getting invalid max_flowrings from dongle
When firmware hit trap at initialization, host will read abnormal
max_flowrings number from dongle, and it will cause kernel panic when
doing iowrite to initialize dongle ring.
To detect this error at early stage, we di
nvdosv
CVE-2022-50364MEDIUMCVSS 5.5≥ 4.3, < 5.10.163≥ 5.11, < 5.15.86+2 more2025-09-17
CVE-2022-50364 [MEDIUM] CWE-476 CVE-2022-50364: In the Linux kernel, the following vulnerability has been resolved:
i2c: mux: reg: check return val
In the Linux kernel, the following vulnerability has been resolved:
i2c: mux: reg: check return value after calling platform_get_resource()
It will cause null-ptr-deref in resource_size(), if platform_get_resource()
returns NULL, move calling resource_size() after devm_ioremap_resource() that
will check 'res' to avoid null-ptr-deref.
And use devm_
nvdosv
CVE-2023-53354MEDIUMCVSS 5.5≥ 4.16, < 4.19.295≥ 4.20, < 5.4.257+5 more2025-09-17
CVE-2023-53354 [MEDIUM] CWE-476 CVE-2023-53354: In the Linux kernel, the following vulnerability has been resolved:
skbuff: skb_segment, Call zero
In the Linux kernel, the following vulnerability has been resolved:
skbuff: skb_segment, Call zero copy functions before using skbuff frags
Commit bf5c25d60861 ("skbuff: in skb_segment, call zerocopy functions
once per nskb") added the call to zero copy functions in skb_segment().
The change introduced a bug in skb_segment() because skb_orphan_frag
nvdosv
CVE-2023-53365MEDIUMCVSS 5.5≥ 2.6.26, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-09-17
CVE-2023-53365 [MEDIUM] CVE-2023-53365: In the Linux kernel, the following vulnerability has been resolved:
ip6mr: Fix skb_under_panic in i
In the Linux kernel, the following vulnerability has been resolved:
ip6mr: Fix skb_under_panic in ip6mr_cache_report()
skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4
head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg
------------[ cut here ]------------
kernel BUG at net/core/skbuff.c:192!
invalid opcode: 0000 [#1] P
nvdosv
CVE-2022-50356MEDIUMCVSS 5.5≥ 2.6.39, < 5.10.152≥ 5.11, < 5.15.76+2 more2025-09-17
CVE-2022-50356 [MEDIUM] CWE-476 CVE-2022-50356: In the Linux kernel, the following vulnerability has been resolved:
net: sched: sfb: fix null point
In the Linux kernel, the following vulnerability has been resolved:
net: sched: sfb: fix null pointer access issue when sfb_init() fails
When the default qdisc is sfb, if the qdisc of dev_queue fails to be
inited during mqprio_init(), sfb_reset() is invoked to clear resources.
In this case, the q->qdisc is NULL, and it will cause gpf issue.
The p
nvdosv
CVE-2022-50353MEDIUMCVSS 5.5≥ 3.8, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-09-17
CVE-2022-50353 [MEDIUM] CWE-476 CVE-2022-50353: In the Linux kernel, the following vulnerability has been resolved:
mmc: wmt-sdmmc: fix return valu
In the Linux kernel, the following vulnerability has been resolved:
mmc: wmt-sdmmc: fix return value check of mmc_add_host()
mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.
So fix th
nvdosv
CVE-2023-53345MEDIUMCVSS 4.7≥ 6.2.1, < 6.2.16≥ 6.3, < 6.3.3+1 more2025-09-17
CVE-2023-53345 [MEDIUM] CWE-362 CVE-2023-53345: In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix potential data race
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
Inside the loop in rxrpc_wait_to_be_connected() it checks call->error to
see if it should exit the loop without first checking the call state. This
is probably safe as if call->error is set, the call is dead anyway, but
nvdosv
CVE-2022-50370MEDIUMCVSS 5.5≥ 5.12, < 5.15.75≥ 5.16, < 5.19.17+1 more2025-09-17
CVE-2022-50370 [MEDIUM] CWE-476 CVE-2022-50370: In the Linux kernel, the following vulnerability has been resolved:
i2c: designware: Fix handling o
In the Linux kernel, the following vulnerability has been resolved:
i2c: designware: Fix handling of real but unexpected device interrupts
Commit c7b79a752871 ("mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI
IDs") caused a regression on certain Gigabyte motherboards for Intel
Alder Lake-S where system crashes to NULL pointer dereference in
i2c_dw
nvdosv
CVE-2023-53351MEDIUMCVSS 5.5≥ 6.3.1, < 6.3.4v6.3+1 more2025-09-17
CVE-2023-53351 [MEDIUM] CWE-908 CVE-2023-53351: In the Linux kernel, the following vulnerability has been resolved:
drm/sched: Check scheduler work
In the Linux kernel, the following vulnerability has been resolved:
drm/sched: Check scheduler work queue before calling timeout handling
During an IGT GPU reset test we see again oops despite of
commit 0c8c901aaaebc9 (drm/sched: Check scheduler ready before calling
timeout handling).
It uses ready condition whether to call drm_sched_fault which
nvdosv