Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 29 of 496
CVE-2025-37858MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37858 [MEDIUM] CWE-190 CVE-2025-37858: In the Linux kernel, the following vulnerability has been resolved:
fs/jfs: Prevent integer overflo
In the Linux kernel, the following vulnerability has been resolved:
fs/jfs: Prevent integer overflow in AG size calculation
The JFS filesystem calculates allocation group (AG) size using 1 2TB
aggregates on 32-bit systems), this 32-bit shift operation causes undefined
behavior and improper AG sizing.
On 32-bit architectures:
- Left-shifting 1 by
nvd
CVE-2025-37875MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37875 [MEDIUM] CVE-2025-37875: In the Linux kernel, the following vulnerability has been resolved:
igc: fix PTM cycle trigger logi
In the Linux kernel, the following vulnerability has been resolved:
igc: fix PTM cycle trigger logic
Writing to clear the PTM status 'valid' bit while the PTM cycle is
triggered results in unreliable PTM operation. To fix this, clear the
PTM 'trigger' and status after each PTM transaction.
The issue can be reproduced with the following:
$ sudo phc2sys -
nvd
CVE-2025-37865MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37865 [MEDIUM] CWE-908 CVE-2025-37865: In the Linux kernel, the following vulnerability has been resolved:
net: dsa: mv88e6xxx: fix -ENOEN
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported
Russell King reports that on the ZII dev rev B, deleting a bridge VLAN
from a user port fails with -ENOENT:
https://lore.kernel.org/netdev/[email protected]/
This comes from mv88e6xxx
nvd
CVE-2025-37859MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37859 [MEDIUM] CWE-835 CVE-2025-37859: In the Linux kernel, the following vulnerability has been resolved:
page_pool: avoid infinite loop
In the Linux kernel, the following vulnerability has been resolved:
page_pool: avoid infinite loop to schedule delayed worker
We noticed the kworker in page_pool_release_retry() was waken
up repeatedly and infinitely in production because of the
buggy driver causing the inflight less than 0 and warning
us in page_pool_inflight()[1].
Since the infl
nvd
CVE-2025-37844MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37844 [MEDIUM] CWE-476 CVE-2025-37844: In the Linux kernel, the following vulnerability has been resolved:
cifs: avoid NULL pointer derefe
In the Linux kernel, the following vulnerability has been resolved:
cifs: avoid NULL pointer dereference in dbg call
cifs_server_dbg() implies server to be non-NULL so
move call under condition to avoid NULL pointer dereference.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
nvd
CVE-2025-37884MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37884 [MEDIUM] CWE-667 CVE-2025-37884: In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix deadlock between rcu_t
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
Fix the following deadlock:
CPU A
_free_event()
perf_kprobe_destroy()
mutex_lock(&event_mutex)
perf_trace_event_unreg()
synchronize_rcu_tasks_trace()
There are several paths where _free_event() grabs event_mutex
and calls
nvd
CVE-2025-37852MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37852 [MEDIUM] CWE-476 CVE-2025-37852: In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: handle amdgpu_cgs_c
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()
Add error handling to propagate amdgpu_cgs_create_device() failures
to the caller. When amdgpu_cgs_create_device() fails, release hwmgr
and return -ENOMEM to prevent null pointer dereference.
[v1]->[v2
nvd
CVE-2025-37867MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37867 [MEDIUM] CVE-2025-37867: In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Silence oversized kv
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Silence oversized kvmalloc() warning
syzkaller triggered an oversized kvmalloc() warning.
Silence it by adding __GFP_NOWARN.
syzkaller log:
WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmalloc_node_noprof+0x175/0x180
CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+
nvd
CVE-2025-37881MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37881 [MEDIUM] CWE-476 CVE-2025-37881: In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: aspeed: Add NULL p
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()
The variable d->name, returned by devm_kasprintf(), could be NULL.
A pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null poin
nvd
CVE-2025-37889MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37889 [MEDIUM] CVE-2025-37889: In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Consistently treat p
In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Consistently treat platform_max as control value
This reverts commit 9bdd10d57a88 ("ASoC: ops: Shift tested values in
snd_soc_put_volsw() by +min"), and makes some additional related
updates.
There are two ways the platform_max could be interpreted; the maximum
register value,
nvd
CVE-2025-37836MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37836 [MEDIUM] CVE-2025-37836: In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix reference leak in pci_
In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix reference leak in pci_register_host_bridge()
If device_register() fails, call put_device() to give up the reference to
avoid a memory leak, per the comment at device_register().
Found by code review.
[bhelgaas: squash Dan Carpenter's double free fix from
https://lore.kernel.org
nvd
CVE-2025-37850MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37850 [MEDIUM] CWE-369 CVE-2025-37850: In the Linux kernel, the following vulnerability has been resolved:
pwm: mediatek: Prevent divide-b
In the Linux kernel, the following vulnerability has been resolved:
pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()
With CONFIG_COMPILE_TEST && !CONFIG_HAVE_CLK, pwm_mediatek_config() has a
divide-by-zero in the following line:
do_div(resolution, clk_get_rate(pc->clk_pwms[pwm->hwpwm]));
due to the fact that the !CONFIG_HAVE_CLK ve
nvd
CVE-2025-37871MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37871 [MEDIUM] CVE-2025-37871: In the Linux kernel, the following vulnerability has been resolved:
nfsd: decrease sc_count directl
In the Linux kernel, the following vulnerability has been resolved:
nfsd: decrease sc_count directly if fail to queue dl_recall
A deadlock warning occurred when invoking nfs4_put_stid following a failed
dl_recall queue operation:
T1 T2
nfs4_laundromat
nfs4_get_client_reaplist
nfs4_anylock_blockers
__break_lease
spin_lock // ctx->flc_lock
spin_lock // clp-
nvd
CVE-2025-37841MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37841 [MEDIUM] CWE-476 CVE-2025-37841: In the Linux kernel, the following vulnerability has been resolved:
pm: cpupower: bench: Prevent NU
In the Linux kernel, the following vulnerability has been resolved:
pm: cpupower: bench: Prevent NULL dereference on malloc failure
If malloc returns NULL due to low memory, 'config' pointer can be NULL.
Add a check to prevent NULL dereference.
nvd
CVE-2025-37857MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37857 [MEDIUM] CWE-190 CVE-2025-37857: In the Linux kernel, the following vulnerability has been resolved:
scsi: st: Fix array overflow in
In the Linux kernel, the following vulnerability has been resolved:
scsi: st: Fix array overflow in st_setup()
Change the array size to follow parms size instead of a fixed value.
nvd
CVE-2025-37851MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37851 [MEDIUM] CWE-674 CVE-2025-37851: In the Linux kernel, the following vulnerability has been resolved:
fbdev: omapfb: Add 'plane' valu
In the Linux kernel, the following vulnerability has been resolved:
fbdev: omapfb: Add 'plane' value check
Function dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB
of the enum parameter plane.
The value of this parameter is initialized in dss_init_overlays and in the
current state of the code it cannot take this value so it's n
nvd
CVE-2025-37883MEDIUMCVSS 5.5v11.02025-05-09
CVE-2025-37883 [MEDIUM] CWE-476 CVE-2025-37883: In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Add check for get_ze
In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Add check for get_zeroed_page()
Add check for the return value of get_zeroed_page() in
sclp_console_init() to prevent null pointer dereference.
Furthermore, to solve the memory leak caused by the loop
allocation, add a free helper to do the free job.
nvd
CVE-2025-37819HIGHCVSS 7.8v11.02025-05-08
CVE-2025-37819 [HIGH] CWE-416 CVE-2025-37819: In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v2m: Prevent use af
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()
With ACPI in place, gicv2m_get_fwnode() is registered with the pci
subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime
during a PCI host bridge probe. But, the call back is wrongly marked as
__init, ca
nvd
CVE-2025-37823HIGHCVSS 7.8v11.02025-05-08
CVE-2025-37823 [HIGH] CWE-416 CVE-2025-37823: In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Fix a potentia
In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
Similarly to the previous patch, we need to safe guard hfsc_dequeue()
too. But for this one, we don't have a reliable reproducer.
nvd
CVE-2025-37810HIGHCVSS 7.8v11.02025-05-08
CVE-2025-37810 [HIGH] CWE-787 CVE-2025-37810: In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: check that e
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: check that event count does not exceed event buffer length
The event count is read from register DWC3_GEVNTCOUNT.
There is a check for the count being zero, but not for exceeding the
event buffer length.
Check that event count does not exceed event buffer length,
nvd