Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 30 of 496
CVE-2025-37817HIGHCVSS 7.8v11.02025-05-08
CVE-2025-37817 [HIGH] CWE-415 CVE-2025-37817: In the Linux kernel, the following vulnerability has been resolved:
mcb: fix a double free bug in c
In the Linux kernel, the following vulnerability has been resolved:
mcb: fix a double free bug in chameleon_parse_gdd()
In chameleon_parse_gdd(), if mcb_device_register() fails, 'mdev'
would be released in mcb_device_register() via put_device().
Thus, goto 'err' label and free 'mdev' again causes a double free.
Just return if mcb_device_register() f
nvd
CVE-2025-37824MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37824 [MEDIUM] CWE-476 CVE-2025-37824: In the Linux kernel, the following vulnerability has been resolved:
tipc: fix NULL pointer derefere
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
syzbot reported:
tipc: Node number set to 1055423674
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x
nvd
CVE-2025-37818MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37818 [MEDIUM] CWE-476 CVE-2025-37818: In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Return NULL from hug
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Return NULL from huge_pte_offset() for invalid PMD
LoongArch's huge_pte_offset() currently returns a pointer to a PMD slot
even if the underlying entry points to invalid_pte_table (indicating no
mapping). Callers like smaps_hugetlb_range() fetch this invalid entry
value
nvd
CVE-2025-37812MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37812 [MEDIUM] CWE-667 CVE-2025-37812: In the Linux kernel, the following vulnerability has been resolved:
usb: cdns3: Fix deadlock when u
In the Linux kernel, the following vulnerability has been resolved:
usb: cdns3: Fix deadlock when using NCM gadget
The cdns3 driver has the same NCM deadlock as fixed in cdnsp by commit
58f2fcb3a845 ("usb: cdnsp: Fix deadlock issue during using NCM gadget").
Under PREEMPT_RT the deadlock can be readily triggered by heavy network
traffic, for exam
nvd
CVE-2025-37811MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37811 [MEDIUM] CWE-476 CVE-2025-37811: In the Linux kernel, the following vulnerability has been resolved:
usb: chipidea: ci_hdrc_imx: fix
In the Linux kernel, the following vulnerability has been resolved:
usb: chipidea: ci_hdrc_imx: fix usbmisc handling
usbmisc is an optional device property so it is totally valid for the
corresponding data->usbmisc_data to have a NULL value.
Check that before dereferencing the pointer.
Found by Linux Verification Center (linuxtesting.org) with S
nvd
CVE-2025-37820MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37820 [MEDIUM] CWE-476 CVE-2025-37820: In the Linux kernel, the following vulnerability has been resolved:
xen-netfront: handle NULL retur
In the Linux kernel, the following vulnerability has been resolved:
xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()
The function xdp_convert_buff_to_frame() may return NULL if it fails
to correctly convert the XDP buffer into an XDP frame due to memory
constraints, internal errors, or invalid data. Failing to check for NULL
may l
nvd
CVE-2025-37829MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37829 [MEDIUM] CWE-476 CVE-2025-37829: In the Linux kernel, the following vulnerability has been resolved:
cpufreq: scpi: Fix null-ptr-der
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
cpufreq_cpu_get_raw() can return NULL when the target CPU is not present
in the policy->cpus mask. scpi_cpufreq_get_rate() does not check for
this case, which results in a NULL pointer dereference.
nvd
CVE-2025-37830MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37830 [MEDIUM] CWE-476 CVE-2025-37830: In the Linux kernel, the following vulnerability has been resolved:
cpufreq: scmi: Fix null-ptr-der
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()
cpufreq_cpu_get_raw() can return NULL when the target CPU is not present
in the policy->cpus mask. scmi_cpufreq_get_rate() does not check for
this case, which results in a NULL pointer dereference.
Add NULL check after
nvd
CVE-2025-37808MEDIUMCVSS 5.5v11.02025-05-08
CVE-2025-37808 [MEDIUM] CVE-2025-37808: In the Linux kernel, the following vulnerability has been resolved:
crypto: null - Use spin lock in
In the Linux kernel, the following vulnerability has been resolved:
crypto: null - Use spin lock instead of mutex
As the null algorithm may be freed in softirq context through
af_alg, use spin locks instead of mutexes to protect the default
null algorithm.
nvd
CVE-2024-47619HIGHCVSS 7.5v11.02025-05-07
CVE-2024-47619 [HIGH] CWE-295 CVE-2024-47619: syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certif
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-th
nvd
CVE-2025-37798HIGHCVSS 7.8v11.02025-05-02
CVE-2025-37798 [HIGH] CVE-2025-37798: In the Linux kernel, the following vulnerability has been resolved:
codel: remove sch->q.qlen check
In the Linux kernel, the following vulnerability has been resolved:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
After making all ->qlen_notify() callbacks idempotent, now it is safe to
remove the check of qlen!=0 from both fq_codel_dequeue() and
codel_qdisc_dequeue().
nvd
CVE-2025-37797HIGHCVSS 7.8v11.02025-05-02
CVE-2025-37797 [HIGH] CWE-416 CVE-2025-37797: In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Fix a UAF vuln
In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Fix a UAF vulnerability in class handling
This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class
handling. The issue occurs due to a time-of-check/time-of-use condition
in hfsc_change_class() when working with certain child qdiscs like netem
or code
nvd
CVE-2022-21546HIGHCVSS 7.8v11.02025-05-02
CVE-2022-21546 [HIGH] CWE-476 CVE-2022-21546: In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix WRITE_SAME No
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix WRITE_SAME No Data Buffer crash
In newer version of the SBC specs, we have a NDOB bit that indicates there
is no data buffer that gets written out. If this bit is set using commands
like "sg_write_same --ndob" we will crash in target_core_iblock/file's
execute_writ
nvd
CVE-2025-4215LOWCVSS 2.3v11.02025-05-02
CVE-2025-4215 [LOW] CWE-400 CVE-2025-4215: A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as proble
A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rath
nvd
CVE-2025-37780HIGHCVSS 7.1v11.02025-05-01
CVE-2025-37780 [HIGH] CWE-125 CVE-2025-37780: In the Linux kernel, the following vulnerability has been resolved:
isofs: Prevent the use of too s
In the Linux kernel, the following vulnerability has been resolved:
isofs: Prevent the use of too small fid
syzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]
The handle_bytes value passed in by the reproducing program is equal to 12.
In handle_to_path(), only 12 bytes of memory are allocated for the structure
file_handle->f_handl
nvd
CVE-2025-23158HIGHCVSS 7.8v11.02025-05-01
CVE-2025-23158 [HIGH] CWE-787 CVE-2025-23158: In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi: add check to
In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi: add check to handle incorrect queue size
qsize represents size of shared queued between driver and video
firmware. Firmware can modify this value to an invalid large value. In
such situation, empty_space will be bigger than the space actually
available. Since new_
nvd
CVE-2025-23156HIGHCVSS 7.1v11.02025-05-01
CVE-2025-23156 [HIGH] CWE-125 CVE-2025-23156: In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi_parser: refac
In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi_parser: refactor hfi packet parsing logic
words_count denotes the number of words in total payload, while data
points to payload of various property within it. When words_count
reaches last word, data can access memory beyond the total payload. This
can lead to OOB
nvd
CVE-2025-37749HIGHCVSS 7.1v11.02025-05-01
CVE-2025-37749 [HIGH] CWE-125 CVE-2025-37749: In the Linux kernel, the following vulnerability has been resolved:
net: ppp: Add bound checking fo
In the Linux kernel, the following vulnerability has been resolved:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
Ensure we have enough data in linear buffer from skb before accessing
initial bytes. This prevents potential out-of-bounds accesses
when processing short packets.
When ppp_sync_txmung receives an incoming package with an
nvd
CVE-2025-37778HIGHCVSS 7.8v11.02025-05-01
CVE-2025-37778 [HIGH] CWE-416 CVE-2025-37778: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix dangling pointer in
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix dangling pointer in krb_authenticate
krb_authenticate frees sess->user and does not set the pointer
to NULL. It calls ksmbd_krb5_authenticate to reinitialise
sess->user but that function may return without doing so. If
that happens then smb2_sess_setup, which calls krb_aut
nvd
CVE-2025-37752HIGHCVSS 7.8v11.02025-05-01
CVE-2025-37752 [HIGH] CWE-129 CVE-2025-37752: In the Linux kernel, the following vulnerability has been resolved:
net_sched: sch_sfq: move the li
In the Linux kernel, the following vulnerability has been resolved:
net_sched: sch_sfq: move the limit validation
It is not sufficient to directly validate the limit on the data that
the user passes as it can be updated based on how the other parameters
are changed.
Move the check at the end of the configuration update process to also
catch scenari
nvd