Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 102 of 738
CVE-2025-40268UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.9-12025-12-06
CVE-2025-40268 CVE-2025-40268: In the Linux kernel, the following vulnerability has been resolved: cifs: client: fix memory leak in smb3_fs_context_parse_param The user calls fsconf In the Linux kernel, the following vulnerability has been resolved: cifs: client: fix memory leak in smb3_fs_context_parse_param The user calls fsconfig twice, but when the program exits, free() only frees ctx->source for the second fsconfig, not the first. Regarding fc->source, there is no code in the fs context rel
osv
CVE-2025-40251MEDIUMCVSS 5.5≥ 5.14, < 6.1.164≥ 6.2, < 6.6.118+3 more2025-12-04
CVE-2025-40251 [MEDIUM] CWE-476 CVE-2025-40251: In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent poi In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy The function devl_rate_nodes_destroy is documented to "Unset parent for all rate objects". However, it was only calling the driver-specific `rate_leaf_parent_set` or `rate_node_parent_set` ops and decrementing the pare
nvdosv
CVE-2025-40256UNKNOWN≥ 6.16.0, < 6.17.102025-12-04
CVE-2025-40256 xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In commit b441cf3f8c4b ("xfrm: delete x->tunnel as we delete x"), I missed the case where state creation fails between full initialization (->in
osv
CVE-2025-40219UNKNOWN≥ 0, < 6.19.6-12025-12-04
CVE-2025-40219 CVE-2025-40219: In the Linux kernel, the following vulnerability has been resolved: PCI/IOV: Fix race between SR-IOV enable/disable and hotplug Commit 05703271c3cd (" In the Linux kernel, the following vulnerability has been resolved: PCI/IOV: Fix race between SR-IOV enable/disable and hotplug Commit 05703271c3cd ("PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV") tried to fix a race between the VF removal inside sriov_del_vfs() and concurrent hot unplug by t
osv
CVE-2025-40240UNKNOWN≥ 4.8.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-04
CVE-2025-40240 sctp: avoid NULL dereference when chunk data buffer is missing sctp: avoid NULL dereference when chunk data buffer is missing In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sur
osv
CVE-2025-40252UNKNOWN≥ 4.6.0, < 5.15.197≥ 5.16.0, < 6.1.159+3 more2025-12-04
CVE-2025-40252 net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition.
osv
CVE-2025-40237UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40237 CVE-2025-40237: In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() o In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() on fd watching an overlayfs inode, while the overlayfs is being unmounted, can lead to dereferencing NULL ptr. This issue was found by syzkaller. Race Condition Diagram:
osv
CVE-2025-40239UNKNOWN≥ 6.10.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40239 net: phy: micrel: always set shared->phydev for LAN8814 net: phy: micrel: always set shared->phydev for LAN8814 In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: always set shared->phydev for LAN8814 Currently, during the LAN8814 PTP probe shared->phydev is only set if PTP clock gets actually set, otherwise the function will return before setting it. This is an issue as shared->phydev is unconditionally being used when IRQ is being handled,
osv
CVE-2025-40262UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40262 CVE-2025-40262: In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
osv
CVE-2025-40215UNKNOWN≥ 2.6.29, < 5.10.248≥ 5.11.0, < 5.15.198+3 more2025-12-04
CVE-2025-40215 xfrm: delete x->tunnel as we delete x xfrm: delete x->tunnel as we delete x In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_s
osv
CVE-2025-40234UNKNOWN≥ 6.16.0, < 6.17.62025-12-04
CVE-2025-40234 platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers In the Linux kernel, the following vulnerability has been resolved: platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers Devices without the AWCC interface don't initialize `awcc`. Add a check before dereferencing it in sleep handlers.
osv
CVE-2025-40230UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40230 CVE-2025-40230: In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error inj In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error injection on a THP (Transparent Huge Page) mapped to userspace on an x86 server, the kernel panics with the following trace. The expected behavior is to terminate the affe
osv
CVE-2025-40217UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40217 CVE-2025-40217: In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do n In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do now.
osv
CVE-2025-40264UNKNOWN≥ 4.2.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40264 be2net: pass wrb_params in case of OS2BMC be2net: pass wrb_params in case of OS2BMC In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packe
osv
CVE-2025-40214UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-04
CVE-2025-40214 CVE-2025-40214: In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge() In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge(). Quang Le reported that the AF_UNIX GC could garbage-collect a receive queue of an alive in-flight socket, with a nice repro. The repro consists of three stages. 1) 1-a. Create a single cyclic reference with many sockets 1-b. close() a
osv
CVE-2025-40223UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40223 CVE-2025-40223: In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregi In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregister_interface(), which eventually unregisters the MOST interface device with device_unregister(iface->dev). If that drops the last reference, the device core may call
osv
CVE-2025-40258UNKNOWN≥ 5.7.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40258 mptcp: fix race condition in mptcp_schedule_work() mptcp: fix race condition in mptcp_schedule_work() In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free in mptcp_schedule_work() [1] Issue here is that mptcp_schedule_work() schedules a work, then gets a refcount on sk->sk_refcnt if the work was scheduled. This refcount will be released by mptcp_worker(). [A] if (schedule_work(...
osv
CVE-2025-40245UNKNOWN≥ 5.12.0, < 5.15.196≥ 5.16.0, < 6.1.158+3 more2025-12-04
CVE-2025-40245 nios2: ensure that memblock.current_limit is set when setting pfn limits nios2: ensure that memblock.current_limit is set when setting pfn limits In the Linux kernel, the following vulnerability has been resolved: nios2: ensure that memblock.current_limit is set when setting pfn limits On nios2, with CONFIG_FLATMEM set, the kernel relies on memblock_get_current_limit() to determine the limits of mem_map, in particular for max_low_pfn. Unfortunately, memblock.current_limit is on
osv
CVE-2025-40246UNKNOWN≥ 6.10.0, < 6.12.60≥ 6.13.0, < 6.17.102025-12-04
CVE-2025-40246 xfs: fix out of bounds memory read error in symlink repair xfs: fix out of bounds memory read error in symlink repair In the Linux kernel, the following vulnerability has been resolved: xfs: fix out of bounds memory read error in symlink repair xfs/286 produced this report on my test fleet: BUG: KFENCE: out-of-bounds read in memcpy_orig+0x54/0x110 Out-of-bounds read at 0xffff88843fe9e038 (184B right of kfence-#184): memcpy_orig+0x54/0x110 xrep_symlink_salvage_inline+0xb3/0xf0
osv
CVE-2025-40248UNKNOWN≥ 3.9.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established vsock: Ignore signal/timeout on connect() if already established In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sen
osv