Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 23 of 496
CVE-2025-38120MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38120 [MEDIUM] CVE-2025-38120: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_set_pipapo_avx2:
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_set_pipapo_avx2: fix initial map fill
If the first field doesn't cover the entire start map, then we must zero
out the remainder, else we leak those bits into the next match round map.
The early fix was incomplete and did only fix up the generic C
implementation.
A followup
nvd
CVE-2025-38142MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38142 [MEDIUM] CWE-476 CVE-2025-38142: In the Linux kernel, the following vulnerability has been resolved:
hwmon: (asus-ec-sensors) check
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (asus-ec-sensors) check sensor index in read_string()
Prevent a potential invalid memory access when the requested sensor
is not found.
find_ec_sensor_index() may return a negative value (e.g. -ENOENT),
but its result was used without checking, which could lead to
undefined
nvd
CVE-2025-38160MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38160 [MEDIUM] CWE-476 CVE-2025-38160: In the Linux kernel, the following vulnerability has been resolved:
clk: bcm: rpi: Add NULL check i
In the Linux kernel, the following vulnerability has been resolved:
clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
devm_kasprintf() returns NULL when memory allocation fails. Currently,
raspberrypi_clk_register() does not check for this case, which results
in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to preven
nvd
CVE-2025-38119MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38119 [MEDIUM] CVE-2025-38119: In the Linux kernel, the following vulnerability has been resolved:
scsi: core: ufs: Fix a hang in
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: ufs: Fix a hang in the error handler
ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter
function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because
resuming involves submitting a SCSI command and ufshcd_queuecommand()
returns SCSI_MLQUEUE_HOST_BUSY
nvd
CVE-2025-38148MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38148 [MEDIUM] CWE-401 CVE-2025-38148: In the Linux kernel, the following vulnerability has been resolved:
net: phy: mscc: Fix memory leak
In the Linux kernel, the following vulnerability has been resolved:
net: phy: mscc: Fix memory leak when using one step timestamping
Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case t
nvd
CVE-2025-38100MEDIUMCVSS 5.5v11.02025-07-03
CVE-2025-38100 [MEDIUM] CWE-476 CVE-2025-38100: In the Linux kernel, the following vulnerability has been resolved:
x86/iopl: Cure TIF_IO_BITMAP in
In the Linux kernel, the following vulnerability has been resolved:
x86/iopl: Cure TIF_IO_BITMAP inconsistencies
io_bitmap_exit() is invoked from exit_thread() when a task exists or
when a fork fails. In the latter case the exit_thread() cleans up
resources which were allocated during fork().
io_bitmap_exit() invokes task_update_io_bitmap(), whic
nvd
CVE-2025-38088HIGHCVSS 7.1v11.02025-06-30
CVE-2025-38088 [HIGH] CWE-125 CVE-2025-38088: In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv/memtrace: Fix o
In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap
memtrace mmap issue has an out of bounds issue. This patch fixes the by
checking that the requested mapping region size should stay within the
allocated region size.
nvd
CVE-2025-32463HIGHCVSS 7.8KEVPoCv11.0v12.0+1 more2025-06-30
CVE-2025-32463 [HIGH] CWE-829 CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
nvd
CVE-2025-38090MEDIUMCVSS 5.5v11.02025-06-30
CVE-2025-38090 [MEDIUM] CVE-2025-38090: In the Linux kernel, the following vulnerability has been resolved:
drivers/rapidio/rio_cm.c: preve
In the Linux kernel, the following vulnerability has been resolved:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
In
riocm_cdev_ioctl(RIO_CM_CHAN_SEND)
-> cm_chan_msg_send()
-> riocm_ch_send()
cm_chan_msg_send() checks that userspace didn't send too much data but
riocm_ch_send() failed to check that userspace sent sufficient data. The
result
nvd
CVE-2025-38085MEDIUMCVSS 4.7v11.02025-06-28
CVE-2025-38085 [MEDIUM] CWE-362 CVE-2025-38085: In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: fix huge_pmd_unshar
In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
huge_pmd_unshare() drops a reference on a page table that may have
previously been shared across processes, potentially turning it into a
normal page table used in another process in which unrelated VMAs can
afterwards be install
nvd
CVE-2025-38084MEDIUMCVSS 5.5v11.02025-06-28
CVE-2025-38084 [MEDIUM] CVE-2025-38084: In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: unshare page tables
In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: unshare page tables during VMA split, not before
Currently, __split_vma() triggers hugetlb page table unsharing through
vm_ops->may_split(). This happens before the VMA lock and rmap locks are
taken - which is too early, it allows racing VMA-locked page faults in our
process a
nvd
CVE-2025-38086MEDIUMCVSS 5.5v11.02025-06-28
CVE-2025-38086 [MEDIUM] CWE-908 CVE-2025-38086: In the Linux kernel, the following vulnerability has been resolved:
net: ch9200: fix uninitialised
In the Linux kernel, the following vulnerability has been resolved:
net: ch9200: fix uninitialised access during mii_nway_restart
In mii_nway_restart() the code attempts to call
mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read()
utilises a local buffer called "buff", which is initialised
with control_read(). However "buff" is conditiona
nvd
CVE-2014-7210CRITICALCVSS 9.8v7.02025-06-26
CVE-2014-7210 [CRITICAL] CWE-276 CVE-2014-7210: pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. I
pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends
are not affected.
nvd
CVE-2025-38083MEDIUMCVSS 4.7v11.02025-06-20
CVE-2025-38083 [MEDIUM] CWE-362 CVE-2025-38083: In the Linux kernel, the following vulnerability has been resolved:
net_sched: prio: fix a race in
In the Linux kernel, the following vulnerability has been resolved:
net_sched: prio: fix a race in prio_tune()
Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer
fires at the wrong time.
The race is as follows:
CPU 0 CPU 1
[1]: lock root
[2]: qdisc_tree_flush_backlog()
[3]: unlock root
|
| [5]: lock root
| [6]: rehash
| [7]
nvd
CVE-2025-38051HIGHCVSS 7.0v11.02025-06-18
CVE-2025-38051 [HIGH] CWE-416 CVE-2025-38051: In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix use-after-free
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix use-after-free in cifs_fill_dirent
There is a race condition in the readdir concurrency process, which may
access the rsp buffer after it has been released, triggering the
following KASAN warning.
BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cif
nvd
CVE-2025-38027HIGHCVSS 7.1v11.02025-06-18
CVE-2025-38027 [HIGH] CWE-125 CVE-2025-38027: In the Linux kernel, the following vulnerability has been resolved:
regulator: max20086: fix invali
In the Linux kernel, the following vulnerability has been resolved:
regulator: max20086: fix invalid memory access
max20086_parse_regulators_dt() calls of_regulator_match() using an
array of struct of_regulator_match allocated on the stack for the
matches argument.
of_regulator_match() calls devm_of_regulator_put_matches(), which calls
devres_alloc
nvd
CVE-2025-38024HIGHCVSS 7.8v11.02025-06-18
CVE-2025-38024 [HIGH] CWE-416 CVE-2025-38024: In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix slab-use-after-fr
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0xcf/0x610 mm/kasan/report.c:489
kasan_report+0x
nvd
CVE-2025-38052HIGHCVSS 7.8v11.02025-06-18
CVE-2025-38052 [HIGH] CWE-416 CVE-2025-38052: In the Linux kernel, the following vulnerability has been resolved:
net/tipc: fix slab-use-after-fr
In the Linux kernel, the following vulnerability has been resolved:
net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done
Syzbot reported a slab-use-after-free with the following call trace:
BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
Read of size 8 at addr ffff88807a733000 by task kworker/
nvd
CVE-2025-38077HIGHCVSS 7.8v11.02025-06-18
CVE-2025-38077 [HIGH] CWE-787 CVE-2025-38077: In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell-wmi-sysman:
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
If the 'buf' array received from the user contains an empty string, the
'length' variable will be zero. Accessing the 'buf' array element with
index 'length - 1' will result in a buffer overflow.
Add a
nvd
CVE-2025-38068HIGHCVSS 7.8v11.02025-06-18
CVE-2025-38068 [HIGH] CWE-787 CVE-2025-38068: In the Linux kernel, the following vulnerability has been resolved:
crypto: lzo - Fix compression b
In the Linux kernel, the following vulnerability has been resolved:
crypto: lzo - Fix compression buffer overrun
Unlike the decompression code, the compression code in LZO never
checked for output overruns. It instead assumes that the caller
always provides enough buffer space, disregarding the buffer length
provided by the caller.
Add a safe compr
nvd