Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 89 of 724
CVE-2025-40240UNKNOWN≥ 4.8.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-04
CVE-2025-40240 sctp: avoid NULL dereference when chunk data buffer is missing
sctp: avoid NULL dereference when chunk data buffer is missing
In the Linux kernel, the following vulnerability has been resolved:
sctp: avoid NULL dereference when chunk data buffer is missing
chunk->skb pointer is dereferenced in the if-block where it's supposed
to be NULL only.
chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list
instead and do it just before replacing chunk->skb. We're sur
osv
CVE-2025-40252UNKNOWN≥ 4.6.0, < 5.15.197≥ 5.16.0, < 6.1.159+3 more2025-12-04
CVE-2025-40252 net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
In the Linux kernel, the following vulnerability has been resolved:
net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate
over 'cqe->len_list[]' using only a zero-length terminator as
the stopping condition.
osv
CVE-2025-40237UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40237 CVE-2025-40237: In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() o
In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() on fd watching an overlayfs inode, while the overlayfs is being unmounted, can lead to dereferencing NULL ptr. This issue was found by syzkaller. Race Condition Diagram:
osv
CVE-2025-40239UNKNOWN≥ 6.10.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40239 net: phy: micrel: always set shared->phydev for LAN8814
net: phy: micrel: always set shared->phydev for LAN8814
In the Linux kernel, the following vulnerability has been resolved:
net: phy: micrel: always set shared->phydev for LAN8814
Currently, during the LAN8814 PTP probe shared->phydev is only set if PTP
clock gets actually set, otherwise the function will return before setting
it.
This is an issue as shared->phydev is unconditionally being used when IRQ
is being handled,
osv
CVE-2025-40262UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40262 CVE-2025-40262: In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv"
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
osv
CVE-2025-40215UNKNOWN≥ 2.6.29, < 5.10.248≥ 5.11.0, < 5.15.198+3 more2025-12-04
CVE-2025-40215 xfrm: delete x->tunnel as we delete x
xfrm: delete x->tunnel as we delete x
In the Linux kernel, the following vulnerability has been resolved:
xfrm: delete x->tunnel as we delete x
The ipcomp fallback tunnels currently get deleted (from the various
lists and hashtables) as the last user state that needed that fallback
is destroyed (not deleted). If a reference to that user state still
exists, the fallback state will remain on the hashtables/lists,
triggering the WARN in xfrm_s
osv
CVE-2025-40234UNKNOWN≥ 6.16.0, < 6.17.62025-12-04
CVE-2025-40234 platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers
platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers
Devices without the AWCC interface don't initialize `awcc`. Add a check
before dereferencing it in sleep handlers.
osv
CVE-2025-40230UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40230 CVE-2025-40230: In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error inj
In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error injection on a THP (Transparent Huge Page) mapped to userspace on an x86 server, the kernel panics with the following trace. The expected behavior is to terminate the affe
osv
CVE-2025-40217UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40217 CVE-2025-40217: In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do n
In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do now.
osv
CVE-2025-40264UNKNOWN≥ 4.2.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40264 be2net: pass wrb_params in case of OS2BMC
be2net: pass wrb_params in case of OS2BMC
In the Linux kernel, the following vulnerability has been resolved:
be2net: pass wrb_params in case of OS2BMC
be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL
at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL
pointer when processing a workaround for specific packet, as commit
bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6
packe
osv
CVE-2025-40214UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-04
CVE-2025-40214 CVE-2025-40214: In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge()
In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge(). Quang Le reported that the AF_UNIX GC could garbage-collect a receive queue of an alive in-flight socket, with a nice repro. The repro consists of three stages. 1) 1-a. Create a single cyclic reference with many sockets 1-b. close() a
osv
CVE-2025-40223UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40223 CVE-2025-40223: In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregi
In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregister_interface(), which eventually unregisters the MOST interface device with device_unregister(iface->dev). If that drops the last reference, the device core may call
osv
CVE-2025-40258UNKNOWN≥ 5.7.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40258 mptcp: fix race condition in mptcp_schedule_work()
mptcp: fix race condition in mptcp_schedule_work()
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix race condition in mptcp_schedule_work()
syzbot reported use-after-free in mptcp_schedule_work() [1]
Issue here is that mptcp_schedule_work() schedules a work,
then gets a refcount on sk->sk_refcnt if the work was scheduled.
This refcount will be released by mptcp_worker().
[A] if (schedule_work(...
osv
CVE-2025-40245UNKNOWN≥ 5.12.0, < 5.15.196≥ 5.16.0, < 6.1.158+3 more2025-12-04
CVE-2025-40245 nios2: ensure that memblock.current_limit is set when setting pfn limits
nios2: ensure that memblock.current_limit is set when setting pfn limits
In the Linux kernel, the following vulnerability has been resolved:
nios2: ensure that memblock.current_limit is set when setting pfn limits
On nios2, with CONFIG_FLATMEM set, the kernel relies on
memblock_get_current_limit() to determine the limits of mem_map, in
particular for max_low_pfn.
Unfortunately, memblock.current_limit is on
osv
CVE-2025-40246UNKNOWN≥ 6.10.0, < 6.12.60≥ 6.13.0, < 6.17.102025-12-04
CVE-2025-40246 xfs: fix out of bounds memory read error in symlink repair
xfs: fix out of bounds memory read error in symlink repair
In the Linux kernel, the following vulnerability has been resolved:
xfs: fix out of bounds memory read error in symlink repair
xfs/286 produced this report on my test fleet:
BUG: KFENCE: out-of-bounds read in memcpy_orig+0x54/0x110
Out-of-bounds read at 0xffff88843fe9e038 (184B right of kfence-#184):
memcpy_orig+0x54/0x110
xrep_symlink_salvage_inline+0xb3/0xf0
osv
CVE-2025-40248UNKNOWN≥ 3.9.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established
vsock: Ignore signal/timeout on connect() if already established
In the Linux kernel, the following vulnerability has been resolved:
vsock: Ignore signal/timeout on connect() if already established
During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:
1. connect() invoking vsock_transport_cancel_pkt() ->
virtio_transport_purge_skbs() may race with sen
osv
CVE-2025-40257UNKNOWN≥ 5.10.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40257 mptcp: fix a race in mptcp_pm_del_add_timer()
mptcp: fix a race in mptcp_pm_del_add_timer()
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix a race in mptcp_pm_del_add_timer()
mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &entry->add_timer)
while another might have free entry already, as reported by syzbot.
Add RCU protection to fix this issue.
Also change confusing add_timer variable with stop_timer boolean.
syzbot report:
BUG: KASA
osv
CVE-2025-40247UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40247 CVE-2025-40247: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0
osv
CVE-2025-40218UNKNOWN≥ 6.5.0, < 6.6.113≥ 6.7.0, < 6.12.54+1 more2025-12-04
CVE-2025-40218 mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
DAMON's virtual address space operation set implementation (vaddr) calls
pte_offset_map_lock() inside the page table walk callback function. This
is for reading and writing page table accessed bits. If
pte_offset_map
osv
CVE-2025-40250UNKNOWN≥ 6.4.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-04
CVE-2025-40250 net/mlx5: Clean up only new IRQ glue on request_irq() failure
net/mlx5: Clean up only new IRQ glue on request_irq() failure
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Clean up only new IRQ glue on request_irq() failure
The mlx5_irq_alloc() function can inadvertently free the entire rmap
and end up in a crash[1] when the other threads tries to access this,
when request_irq() fails due to exhausted IRQ vectors. This commit
modifies the cleanup t
osv