Linux Kernel vulnerabilities

14,883 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,883
CISA KEV
30
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729

Vulnerabilities

Page 176 of 745
CVE-2023-53220MEDIUMCVSS 5.5fixed in 4.14.326≥ 4.15, < 4.19.295+5 more2025-09-15
CVE-2023-53220 [MEDIUM] CWE-476 CVE-2023-53220: In the Linux kernel, the following vulnerability has been resolved: media: az6007: Fix null-ptr-der In the Linux kernel, the following vulnerability has been resolved: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() In az6007_i2c_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach az6007_i2c_xfer. If accessing msg[i].buf[0] without sanit
nvdosv
CVE-2023-53167MEDIUMCVSS 5.5≥ 5.2, < 5.4.251≥ 5.5, < 5.10.188+3 more2025-09-15
CVE-2023-53167 [MEDIUM] CWE-476 CVE-2023-53167: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix null pointer deref In the Linux kernel, the following vulnerability has been resolved: tracing: Fix null pointer dereference in tracing_err_log_open() Fix an issue in function 'tracing_err_log_open'. The function doesn't call 'seq_open' if the file is opened only with write permissions, which results in 'file->private_data' being left as null. If we then use 'lseek'
nvdosv
CVE-2022-50257MEDIUMCVSS 5.5≥ 4.9.322, < 4.9.332≥ 4.14.287, < 4.14.298+8 more2025-09-15
CVE-2022-50257 [MEDIUM] CVE-2022-50257: In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Prevent leaking gra In the Linux kernel, the following vulnerability has been resolved: xen/gntdev: Prevent leaking grants Prior to this commit, if a grant mapping operation failed partially, some of the entries in the map_ops array would be invalid, whereas all of the entries in the kmap_ops array would be valid. This in turn would cause the following logic in gntdev_map_gr
nvdosv
CVE-2023-53249MEDIUMCVSS 5.5≥ 5.4, < 5.10.188≥ 5.11, < 5.15.121+3 more2025-09-15
CVE-2023-53249 [MEDIUM] CWE-401 CVE-2023-53249: In the Linux kernel, the following vulnerability has been resolved: clk: imx: clk-imx8mn: fix memor In the Linux kernel, the following vulnerability has been resolved: clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe Use devm_of_iomap() instead of of_iomap() to automatically handle the unused ioremap region. If any error occurs, regions allocated by kzalloc() will leak, but using devm_kzalloc() instead will automatically free the me
nvdosv
CVE-2022-50281MEDIUMCVSS 5.5≥ 5.5, < 5.10.150≥ 5.11, < 5.15.75+2 more2025-09-15
CVE-2022-50281 [MEDIUM] CWE-401 CVE-2022-50281: In the Linux kernel, the following vulnerability has been resolved: MIPS: SGI-IP27: Fix platform-de In the Linux kernel, the following vulnerability has been resolved: MIPS: SGI-IP27: Fix platform-device leak in bridge_platform_create() In error case in bridge_platform_create after calling platform_device_add()/platform_device_add_data()/ platform_device_add_resources(), release the failed 'pdev' or it will be leak, call platform_device_put() to
nvdosv
CVE-2022-50268MEDIUMCVSS 5.5≥ 3.16, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-15
CVE-2022-50268 [MEDIUM] CWE-476 CVE-2022-50268: In the Linux kernel, the following vulnerability has been resolved: mmc: moxart: fix return value c In the Linux kernel, the following vulnerability has been resolved: mmc: moxart: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this
nvdosv
CVE-2022-50317MEDIUMCVSS 5.5≥ 4.14.263, < 4.14.296≥ 4.19.226, < 4.19.262+5 more2025-09-15
CVE-2022-50317 [MEDIUM] CWE-476 CVE-2022-50317: In the Linux kernel, the following vulnerability has been resolved: drm/bridge: megachips: Fix a nu In the Linux kernel, the following vulnerability has been resolved: drm/bridge: megachips: Fix a null pointer dereference bug When removing the module we will get the following warning: [ 31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered [ 31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0
nvdosv
CVE-2023-53182MEDIUMCVSS 5.5fixed in 4.14.316≥ 4.15, < 4.19.284+5 more2025-09-15
CVE-2023-53182 [MEDIUM] CVE-2023-53182: In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid undefined behavio In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid undefined behavior: applying zero offset to null pointer ACPICA commit 770653e3ba67c30a629ca7d12e352d83c2541b1e Before this change we see the following UBSAN stack trace in Fuchsia: #0 0x000021e4213b3302 in acpi_ds_init_aml_walk(struct acpi_walk_state*, union acpi_parse_ob
nvdosv
CVE-2022-50311MEDIUMCVSS 5.5≥ 4.12, < 4.14.303≥ 4.15, < 4.19.270+5 more2025-09-15
CVE-2022-50311 [MEDIUM] CVE-2022-50311: In the Linux kernel, the following vulnerability has been resolved: cxl: Fix refcount leak in cxl_c In the Linux kernel, the following vulnerability has been resolved: cxl: Fix refcount leak in cxl_calc_capp_routing of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function only calls of_node_put() in normal path, missing it in the error path. Add missing of_node_put() to
nvdosv
CVE-2023-53244MEDIUMCVSS 5.5fixed in 5.15.113≥ 5.16, < 6.1.30+1 more2025-09-15
CVE-2023-53244 [MEDIUM] CWE-476 CVE-2023-53244: In the Linux kernel, the following vulnerability has been resolved: media: pci: tw68: Fix null-ptr- In the Linux kernel, the following vulnerability has been resolved: media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish When the driver calls tw68_risc_buffer() to prepare the buffer, the function call dma_alloc_coherent may fail, resulting in a empty buffer buf->cpu. Later when we free the buffer or access the buffer, null ptr dere
nvdosv
CVE-2022-50282MEDIUMCVSS 5.5≥ 3.16.83, < 3.17≥ 4.4.224, < 4.5+8 more2025-09-15
CVE-2022-50282 [MEDIUM] CWE-908 CVE-2022-50282: In the Linux kernel, the following vulnerability has been resolved: chardev: fix error handling in In the Linux kernel, the following vulnerability has been resolved: chardev: fix error handling in cdev_device_add() While doing fault injection test, I got the following report: ------------[ cut here ]------------ kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. WARNING: CPU: 3 PID: 6306 at kobject_put
nvdosv
CVE-2022-50278MEDIUMCVSS 5.5≥ 2.6.30, < 4.9.337≥ 4.10, < 4.14.303+6 more2025-09-15
CVE-2022-50278 [MEDIUM] CWE-401 CVE-2022-50278: In the Linux kernel, the following vulnerability has been resolved: PNP: fix name memory leak in pn In the Linux kernel, the following vulnerability has been resolved: PNP: fix name memory leak in pnp_alloc_dev() After commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, move dev_set_name() after pnp_add_id() to avoid memory leak.
nvdosv
CVE-2023-53203MEDIUMCVSS 5.5≥ 6.2, < 6.2.32025-09-15
CVE-2023-53203 [MEDIUM] CWE-476 CVE-2023-53203: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: rely on mt7 In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: rely on mt76_connac2_mac_tx_rate_val In order to fix a possible NULL pointer dereference in mt7996_mac_write_txwi() of vif pointer, export mt76_connac2_mac_tx_rate_val utility routine and reuse it in mt7996 driver.
nvdosv
CVE-2022-50327MEDIUMCVSS 5.5≥ 4.8, < 5.4.297≥ 5.5, < 5.10.241+3 more2025-09-15
CVE-2022-50327 [MEDIUM] CWE-476 CVE-2022-50327: In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: idle: Check ac In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value The return value of acpi_fetch_acpi_dev() could be NULL, which would cause a NULL pointer dereference to occur in acpi_device_hid(). [ rjw: Subject and changelog edits, added empty line after if () ]
nvdosv
CVE-2022-50236MEDIUMCVSS 5.5≥ 4.6, < 6.0.17≥ 6.1, < 6.1.32025-09-15
CVE-2022-50236 [MEDIUM] CWE-908 CVE-2022-50236: In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Fix crash on is In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Fix crash on isr after kexec() If the system is rebooted via isr(), the IRQ handler might be triggered before the domain is initialized. Resulting on an invalid memory access error. Fix: [ 0.500930] Unable to handle kernel read from unreadable memory at virtual ad
nvdosv
CVE-2023-53169MEDIUMCVSS 5.5≥ 5.15, < 5.15.104≥ 5.16, < 6.1.21+2 more2025-09-15
CVE-2023-53169 [MEDIUM] CVE-2023-53169: In the Linux kernel, the following vulnerability has been resolved: x86/resctrl: Clear staged_confi In the Linux kernel, the following vulnerability has been resolved: x86/resctrl: Clear staged_config[] before and after it is used As a temporary storage, staged_config[] in rdt_domain should be cleared before and after it is used. The stale value in staged_config[] could cause an MSR access error. Here is a reproducer on a system with 16 usable CLOSIDs
nvdosv
CVE-2023-53189MEDIUMCVSS 5.5≥ 3.10.105, < 4.14.322≥ 4.15, < 4.19.291+6 more2025-09-15
CVE-2023-53189 [MEDIUM] CWE-191 CVE-2023-53189: In the Linux kernel, the following vulnerability has been resolved: ipv6/addrconf: fix a potential In the Linux kernel, the following vulnerability has been resolved: ipv6/addrconf: fix a potential refcount underflow for idev Now in addrconf_mod_rs_timer(), reference idev depends on whether rs_timer is not pending. Then modify rs_timer timeout. There is a time gap in [1], during which if the pending rs_timer becomes not pending. It will miss to
nvdosv
CVE-2023-53230MEDIUMCVSS 5.5fixed in 5.15.128≥ 5.16, < 6.1.47+1 more2025-09-15
CVE-2023-53230 [MEDIUM] CWE-401 CVE-2023-53230: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix warning in cif In the Linux kernel, the following vulnerability has been resolved: smb: client: fix warning in cifs_smb3_do_mount() This fixes the following warning reported by kernel test robot fs/smb/client/cifsfs.c:982 cifs_smb3_do_mount() warn: possible memory leak of 'cifs_sb'
nvdosv
CVE-2023-53233MEDIUMCVSS 5.5≥ 5.8, < 5.10.176≥ 5.11, < 5.15.104+3 more2025-09-15
CVE-2023-53233 [MEDIUM] CWE-667 CVE-2023-53233: In the Linux kernel, the following vulnerability has been resolved: net/smc: fix deadlock triggered In the Linux kernel, the following vulnerability has been resolved: net/smc: fix deadlock triggered by cancel_delayed_work_syn() The following LOCKDEP was detected: Workqueue: events smc_lgr_free_work [smc] WARNING: possible circular locking dependency detected 6.1.0-20221027.rc2.git8.56bc5b569087.300.fc36.s390x+debug #1 Not tainted kworker/3:0/17
nvdosv
CVE-2023-53234MEDIUMCVSS 5.5≥ 4.9.225, < 4.10≥ 4.14.182, < 4.14.308+6 more2025-09-15
CVE-2023-53234 [MEDIUM] CWE-401 CVE-2023-53234: In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix kmemleak in watch In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix kmemleak in watchdog_cdev_register kmemleak reports memory leaks in watchdog_dev_register, as follows: unreferenced object 0xffff888116233000 (size 2048): comm ""modprobe"", pid 28147, jiffies 4353426116 (age 61.741s) hex dump (first 32 bytes): 80 fa b9 05 81 88 ff f
nvdosv