Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 32 of 496
CVE-2025-23147MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-23147 [MEDIUM] CWE-476 CVE-2025-23147: In the Linux kernel, the following vulnerability has been resolved:
i3c: Add NULL pointer check in
In the Linux kernel, the following vulnerability has been resolved:
i3c: Add NULL pointer check in i3c_master_queue_ibi()
The I3C master driver may receive an IBI from a target device that has not
been probed yet. In such cases, the master calls `i3c_master_queue_ibi()`
to queue an IBI work task, leading to "Unable to handle kernel read from
unread
nvd
CVE-2025-37757MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37757 [MEDIUM] CWE-401 CVE-2025-37757: In the Linux kernel, the following vulnerability has been resolved:
tipc: fix memory leak in tipc_l
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix memory leak in tipc_link_xmit
In case the backlog transmit queue for system-importance messages is overloaded,
tipc_link_xmit() returns -ENOBUFS but the skb list is not purged. This leads to
memory leak and failure when a skb is allocated.
This commit fixes this issue b
nvd
CVE-2025-23144MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-23144 [MEDIUM] CVE-2025-23144: In the Linux kernel, the following vulnerability has been resolved:
backlight: led_bl: Hold led_acc
In the Linux kernel, the following vulnerability has been resolved:
backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
Lockdep detects the following issue on led-backlight removal:
[ 142.315935] ------------[ cut here ]------------
[ 142.315954] WARNING: CPU: 2 PID: 292 at drivers/leds/led-core.c:455 led_sysfs_enable+0x54/0x80
...
[
nvd
CVE-2025-37740MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37740 [MEDIUM] CWE-369 CVE-2025-37740: In the Linux kernel, the following vulnerability has been resolved:
jfs: add sanity check for agwid
In the Linux kernel, the following vulnerability has been resolved:
jfs: add sanity check for agwidth in dbMount
The width in dmapctl of the AG is zero, it trigger a divide error when
calculating the control page level in dbAllocAG.
To avoid this issue, add a check for agwidth in dbAllocAG.
nvd
CVE-2025-37790MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37790 [MEDIUM] CVE-2025-37790: In the Linux kernel, the following vulnerability has been resolved:
net: mctp: Set SOCK_RCU_FREE
B
In the Linux kernel, the following vulnerability has been resolved:
net: mctp: Set SOCK_RCU_FREE
Bind lookup runs under RCU, so ensure that a socket doesn't go away in
the middle of a lookup.
nvd
CVE-2025-37788MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37788 [MEDIUM] CWE-401 CVE-2025-37788: In the Linux kernel, the following vulnerability has been resolved:
cxgb4: fix memory leak in cxgb4
In the Linux kernel, the following vulnerability has been resolved:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
In the for loop used to allocate the loc_array and bmap for each port, a
memory leak is possible when the allocation for loc_array succeeds,
but the allocation for bmap fails. This is because when the control flow
g
nvd
CVE-2025-23150MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-23150 [MEDIUM] CWE-193 CVE-2025-23150: In the Linux kernel, the following vulnerability has been resolved:
ext4: fix off-by-one error in d
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix off-by-one error in do_split
Syzkaller detected a use-after-free issue in ext4_insert_dentry that was
caused by out-of-bounds access due to incorrect splitting in do_split.
BUG: KASAN: use-after-free in ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109
Write of size 2
nvd
CVE-2025-37767MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37767 [MEDIUM] CWE-369 CVE-2025-37767: In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
nvd
CVE-2025-37765MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37765 [MEDIUM] CWE-416 CVE-2025-37765: In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: prime: fix ttm_bo_
In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: prime: fix ttm_bo_delayed_delete oops
Fix an oops in ttm_bo_delayed_delete which results from dererencing a
dangling pointer:
Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b7b: 0000 [#1] PREEMPT SMP
CPU: 4 UID: 0 PID: 1082 Comm: kw
nvd
CVE-2025-37741MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37741 [MEDIUM] CWE-667 CVE-2025-37741: In the Linux kernel, the following vulnerability has been resolved:
jfs: Prevent copying of nlink w
In the Linux kernel, the following vulnerability has been resolved:
jfs: Prevent copying of nlink with value 0 from disk inode
syzbot report a deadlock in diFree. [1]
When calling "ioctl$LOOP_SET_STATUS64", the offset value passed in is 4,
which does not match the mounted loop device, causing the mapping of the
mounted loop device to be invalidat
nvd
CVE-2025-37748MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37748 [MEDIUM] CWE-476 CVE-2025-37748: In the Linux kernel, the following vulnerability has been resolved:
iommu/mediatek: Fix NULL pointe
In the Linux kernel, the following vulnerability has been resolved:
iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group
Currently, mtk_iommu calls during probe iommu_device_register before
the hw_list from driver data is initialized. Since iommu probing issue
fix, it leads to NULL pointer dereference in mtk_iommu_device_group when
nvd
CVE-2025-37742MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37742 [MEDIUM] CWE-908 CVE-2025-37742: In the Linux kernel, the following vulnerability has been resolved:
jfs: Fix uninit-value access of
In the Linux kernel, the following vulnerability has been resolved:
jfs: Fix uninit-value access of imap allocated in the diMount() function
syzbot reports that hex_dump_to_buffer is using uninit-value:
BUG: KMSAN: uninit-value in hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171
hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171
print_hex_dump+0x
nvd
CVE-2025-37772MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37772 [MEDIUM] CWE-476 CVE-2025-37772: In the Linux kernel, the following vulnerability has been resolved:
RDMA/cma: Fix workqueue crash i
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cma: Fix workqueue crash in cma_netevent_work_handler
struct rdma_cm_id has member "struct work_struct net_work"
that is reused for enqueuing cma_netevent_work_handler()s
onto cma_wq.
Below crash[1] can occur if more than one call to
cma_netevent_callback() occurs in quick s
nvd
CVE-2025-37781MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37781 [MEDIUM] CWE-476 CVE-2025-37781: In the Linux kernel, the following vulnerability has been resolved:
i2c: cros-ec-tunnel: defer prob
In the Linux kernel, the following vulnerability has been resolved:
i2c: cros-ec-tunnel: defer probe if parent EC is not present
When i2c-cros-ec-tunnel and the EC driver are built-in, the EC parent
device will not be found, leading to NULL pointer dereference.
That can also be reproduced by unbinding the controller driver and then
loading i2c-cr
nvd
CVE-2025-37792MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37792 [MEDIUM] CWE-476 CVE-2025-37792: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: Prevent poten
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: Prevent potential NULL dereference
The btrtl_initialize() function checks that rtl_load_file() either
had an error or it loaded a zero length file. However, if it loaded
a zero length file then the error code is not set correctly. It
results in an error pointer v
nvd
CVE-2025-37775MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37775 [MEDIUM] CVE-2025-37775: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix the warning from __k
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix the warning from __kernel_write_iter
[ 2110.972290] ------------[ cut here ]------------
[ 2110.972301] WARNING: CPU: 3 PID: 735 at fs/read_write.c:599 __kernel_write_iter+0x21b/0x280
This patch doesn't allow writing to directory.
nvd
CVE-2025-23163MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-23163 [MEDIUM] CWE-667 CVE-2025-23163: In the Linux kernel, the following vulnerability has been resolved:
net: vlan: don't propagate flag
In the Linux kernel, the following vulnerability has been resolved:
net: vlan: don't propagate flags on open
With the device instance lock, there is now a possibility of a deadlock:
[ 1.211455] ============================================
[ 1.211571] WARNING: possible recursive locking detected
[ 1.211687] 6.14.0-rc5-01215-g032756b4ca7a-dirty #5
nvd
CVE-2025-37766MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-37766 [MEDIUM] CWE-369 CVE-2025-37766: In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
nvd
CVE-2025-23151MEDIUMCVSS 4.7v11.02025-05-01
CVE-2025-23151 [MEDIUM] CWE-362 CVE-2025-23151: In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Fix race betwee
In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Fix race between unprepare and queue_buf
A client driver may use mhi_unprepare_from_transfer() to quiesce
incoming data during the client driver's tear down. The client driver
might also be processing data at the same time, resulting in a call to
mhi_queue_buf() wh
nvd
CVE-2025-23159MEDIUMCVSS 5.5v11.02025-05-01
CVE-2025-23159 [MEDIUM] CWE-787 CVE-2025-23159: In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi: add a check
In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi: add a check to handle OOB in sfr region
sfr->buf_size is in shared memory and can be modified by malicious user.
OOB write is possible when the size is made higher than actual sfr data
buffer. Cap the size to allocated size for such cases.
nvd