Msrc Cbl2 Kernel 5.15.186.1-1 On Cbl Mariner 2.0 vulnerabilities

1,000 known vulnerabilities affecting msrc/cbl2_kernel_5.15.186.1-1_on_cbl_mariner_2.0.

Total CVEs
1,000
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL10HIGH190MEDIUM779LOW21

Vulnerabilities

Page 1 of 50
CVE-2025-40251CRITICALCVSS 9.82025-12-09
CVE-2025-40251 [MEDIUM] devlink: rate: Unset parent pointer in devl_rate_nodes_destroy devlink: rate: Unset parent pointer in devl_rate_nodes_destroy Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2023-54207HIGHCVSS 7.82025-12-09
CVE-2023-54207 [HIGH] CWE-416 HID: uclogic: Correct devm device reference for hidinput input_dev name HID: uclogic: Correct devm device reference for hidinput input_dev name Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68223MEDIUMCVSS 6.22025-12-09
CVE-2025-68223 [MEDIUM] drm/radeon: delete radeon_fence_process in is_signaled, no deadlock drm/radeon: delete radeon_fence_process in is_signaled, no deadlock Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68725MEDIUMCVSS 5.52025-12-09
CVE-2025-68725 [MEDIUM] bpf: Do not let BPF test infra emit invalid GSO types to stack bpf: Do not let BPF test infra emit invalid GSO types to stack Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68340MEDIUMCVSS 5.52025-12-09
CVE-2025-68340 [MEDIUM] team: Move team device type change at the end of team_port_add team: Move team device type change at the end of team_port_add Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68211MEDIUMCVSS 5.52025-12-09
CVE-2025-68211 [MEDIUM] ksm: use range-walk function to jump over holes in scan_get_next_rmap_item ksm: use range-walk function to jump over holes in scan_get_next_rmap_item Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68365MEDIUMCVSS 6.62025-12-09
CVE-2025-68365 [MEDIUM] fs/ntfs3: Initialize allocated memory before use fs/ntfs3: Initialize allocated memory before use Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-68358MEDIUMCVSS 5.52025-12-09
CVE-2025-68358 [MEDIUM] btrfs: fix racy bitfield write in btrfs_clear_space_info_full() btrfs: fix racy bitfield write in btrfs_clear_space_info_full() Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-40149MEDIUMCVSS 5.52025-11-11
CVE-2025-40149 [HIGH] tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-40164MEDIUMCVSS 5.52025-11-11
CVE-2025-40164 [MEDIUM] usbnet: Fix using smp_processor_id() in preemptible code warnings usbnet: Fix using smp_processor_id() in preemptible code warnings Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-39925CRITICALCVSS 9.82025-10-14
CVE-2025-39925 [MEDIUM] can: j1939: implement NETDEV_UNREGISTER notification handler can: j1939: implement NETDEV_UNREGISTER notification handler FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with whi
msrc
CVE-2025-39907CRITICALCVSS 9.82025-10-14
CVE-2025-39907 [MEDIUM] mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source librar
msrc
CVE-2025-39905HIGHCVSS 7.12025-10-14
CVE-2025-39905 [HIGH] net: phylink: add lock for serializing concurrent pl->phydev writes with resolver net: phylink: add lock for serializing concurrent pl->phydev writes with resolver FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versio
msrc
CVE-2025-39901HIGHCVSS 7.12025-10-14
CVE-2025-39901 [HIGH] CWE-125 i40e: remove read access to debugfs files i40e: remove read access to debugfs files FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Micro
msrc
CVE-2025-39913MEDIUMCVSS 6.62025-10-14
CVE-2025-39913 [HIGH] tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most sec
msrc
CVE-2025-39894MEDIUMCVSS 5.52025-10-14
CVE-2025-39894 [MEDIUM] netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm Mariner: Mariner Linux: Linux Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2022-50467MEDIUMCVSS 5.52025-10-14
CVE-2022-50467 [MEDIUM] CWE-476 scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID Mariner: Mariner Linux: Linux Customer Action Required: Yes
msrc
CVE-2025-40005MEDIUMCVSS 6.62025-10-14
CVE-2025-40005 [MEDIUM] spi: cadence-quadspi: Implement refcount to handle unbind during busy spi: cadence-quadspi: Implement refcount to handle unbind during busy FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source
msrc
CVE-2022-50464MEDIUMCVSS 5.52025-10-14
CVE-2022-50464 [MEDIUM] mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() Mariner: Mariner Linux: Linux Customer Action Required: Yes
msrc
CVE-2025-39923MEDIUMCVSS 5.52025-10-14
CVE-2025-39923 [MEDIUM] dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability? One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source li
msrc
1 / 50Next →