Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 89 of 724
CVE-2025-40240UNKNOWN≥ 4.8.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-04
CVE-2025-40240 sctp: avoid NULL dereference when chunk data buffer is missing sctp: avoid NULL dereference when chunk data buffer is missing In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sur
osv
CVE-2025-40252UNKNOWN≥ 4.6.0, < 5.15.197≥ 5.16.0, < 6.1.159+3 more2025-12-04
CVE-2025-40252 net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition.
osv
CVE-2025-40237UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40237 CVE-2025-40237: In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() o In the Linux kernel, the following vulnerability has been resolved: fs/notify: call exportfs_encode_fid with s_umount Calling intotify_show_fdinfo() on fd watching an overlayfs inode, while the overlayfs is being unmounted, can lead to dereferencing NULL ptr. This issue was found by syzkaller. Race Condition Diagram:
osv
CVE-2025-40239UNKNOWN≥ 6.10.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40239 net: phy: micrel: always set shared->phydev for LAN8814 net: phy: micrel: always set shared->phydev for LAN8814 In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: always set shared->phydev for LAN8814 Currently, during the LAN8814 PTP probe shared->phydev is only set if PTP clock gets actually set, otherwise the function will return before setting it. This is an issue as shared->phydev is unconditionally being used when IRQ is being handled,
osv
CVE-2025-40262UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40262 CVE-2025-40262: In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
osv
CVE-2025-40215UNKNOWN≥ 2.6.29, < 5.10.248≥ 5.11.0, < 5.15.198+3 more2025-12-04
CVE-2025-40215 xfrm: delete x->tunnel as we delete x xfrm: delete x->tunnel as we delete x In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_s
osv
CVE-2025-40234UNKNOWN≥ 6.16.0, < 6.17.62025-12-04
CVE-2025-40234 platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers In the Linux kernel, the following vulnerability has been resolved: platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers Devices without the AWCC interface don't initialize `awcc`. Add a check before dereferencing it in sleep handlers.
osv
CVE-2025-40230UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40230 CVE-2025-40230: In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error inj In the Linux kernel, the following vulnerability has been resolved: mm: prevent poison consumption when splitting THP When performing memory error injection on a THP (Transparent Huge Page) mapped to userspace on an x86 server, the kernel panics with the following trace. The expected behavior is to terminate the affe
osv
CVE-2025-40217UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40217 CVE-2025-40217: In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do n In the Linux kernel, the following vulnerability has been resolved: pidfs: validate extensible ioctls Validate extensible ioctls stricter than we do now.
osv
CVE-2025-40264UNKNOWN≥ 4.2.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40264 be2net: pass wrb_params in case of OS2BMC be2net: pass wrb_params in case of OS2BMC In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6 packe
osv
CVE-2025-40214UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-04
CVE-2025-40214 CVE-2025-40214: In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge() In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge(). Quang Le reported that the AF_UNIX GC could garbage-collect a receive queue of an alive in-flight socket, with a nice repro. The repro consists of three stages. 1) 1-a. Create a single cyclic reference with many sockets 1-b. close() a
osv
CVE-2025-40223UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40223 CVE-2025-40223: In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregi In the Linux kernel, the following vulnerability has been resolved: most: usb: Fix use-after-free in hdm_disconnect hdm_disconnect() calls most_deregister_interface(), which eventually unregisters the MOST interface device with device_unregister(iface->dev). If that drops the last reference, the device core may call
osv
CVE-2025-40258UNKNOWN≥ 5.7.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40258 mptcp: fix race condition in mptcp_schedule_work() mptcp: fix race condition in mptcp_schedule_work() In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free in mptcp_schedule_work() [1] Issue here is that mptcp_schedule_work() schedules a work, then gets a refcount on sk->sk_refcnt if the work was scheduled. This refcount will be released by mptcp_worker(). [A] if (schedule_work(...
osv
CVE-2025-40245UNKNOWN≥ 5.12.0, < 5.15.196≥ 5.16.0, < 6.1.158+3 more2025-12-04
CVE-2025-40245 nios2: ensure that memblock.current_limit is set when setting pfn limits nios2: ensure that memblock.current_limit is set when setting pfn limits In the Linux kernel, the following vulnerability has been resolved: nios2: ensure that memblock.current_limit is set when setting pfn limits On nios2, with CONFIG_FLATMEM set, the kernel relies on memblock_get_current_limit() to determine the limits of mem_map, in particular for max_low_pfn. Unfortunately, memblock.current_limit is on
osv
CVE-2025-40246UNKNOWN≥ 6.10.0, < 6.12.60≥ 6.13.0, < 6.17.102025-12-04
CVE-2025-40246 xfs: fix out of bounds memory read error in symlink repair xfs: fix out of bounds memory read error in symlink repair In the Linux kernel, the following vulnerability has been resolved: xfs: fix out of bounds memory read error in symlink repair xfs/286 produced this report on my test fleet: BUG: KFENCE: out-of-bounds read in memcpy_orig+0x54/0x110 Out-of-bounds read at 0xffff88843fe9e038 (184B right of kfence-#184): memcpy_orig+0x54/0x110 xrep_symlink_salvage_inline+0xb3/0xf0
osv
CVE-2025-40248UNKNOWN≥ 3.9.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-04
CVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established vsock: Ignore signal/timeout on connect() if already established In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sen
osv
CVE-2025-40257UNKNOWN≥ 5.10.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40257 mptcp: fix a race in mptcp_pm_del_add_timer() mptcp: fix a race in mptcp_pm_del_add_timer() In the Linux kernel, the following vulnerability has been resolved: mptcp: fix a race in mptcp_pm_del_add_timer() mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &entry->add_timer) while another might have free entry already, as reported by syzbot. Add RCU protection to fix this issue. Also change confusing add_timer variable with stop_timer boolean. syzbot report: BUG: KASA
osv
CVE-2025-40247UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40247 CVE-2025-40247: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0
osv
CVE-2025-40218UNKNOWN≥ 6.5.0, < 6.6.113≥ 6.7.0, < 6.12.54+1 more2025-12-04
CVE-2025-40218 mm/damon/vaddr: do not repeat pte_offset_map_lock() until success mm/damon/vaddr: do not repeat pte_offset_map_lock() until success In the Linux kernel, the following vulnerability has been resolved: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success DAMON's virtual address space operation set implementation (vaddr) calls pte_offset_map_lock() inside the page table walk callback function. This is for reading and writing page table accessed bits. If pte_offset_map
osv
CVE-2025-40250UNKNOWN≥ 6.4.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-04
CVE-2025-40250 net/mlx5: Clean up only new IRQ glue on request_irq() failure net/mlx5: Clean up only new IRQ glue on request_irq() failure In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Clean up only new IRQ glue on request_irq() failure The mlx5_irq_alloc() function can inadvertently free the entire rmap and end up in a crash[1] when the other threads tries to access this, when request_irq() fails due to exhausted IRQ vectors. This commit modifies the cleanup t
osv