Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
395
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 6 of 496
CVE-2025-39756MEDIUMCVSS 5.5v11.02025-09-11
CVE-2025-39756 [MEDIUM] CWE-401 CVE-2025-39756: In the Linux kernel, the following vulnerability has been resolved:
fs: Prevent file descriptor tab
In the Linux kernel, the following vulnerability has been resolved:
fs: Prevent file descriptor table allocations exceeding INT_MAX
When sysctl_nr_open is set to a very high value (for example, 1073741816
as set by systemd), processes attempting to use file descriptors near
the limit can trigger massive memory allocation attempts that exceed
INT_M
nvd
CVE-2025-39730HIGHCVSS 7.8v11.02025-09-07
CVE-2025-39730 [HIGH] CVE-2025-39730: In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix filehandle bounds chec
In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
The function needs to check the minimal filehandle length before it can
access the embedded filehandle.
nvd
CVE-2025-39734MEDIUMCVSS 5.5v11.02025-09-07
CVE-2025-39734 [MEDIUM] CVE-2025-39734: In the Linux kernel, the following vulnerability has been resolved:
Revert "fs/ntfs3: Replace inode
In the Linux kernel, the following vulnerability has been resolved:
Revert "fs/ntfs3: Replace inode_trylock with inode_lock"
This reverts commit 69505fe98f198ee813898cbcaf6770949636430b.
Initially, conditional lock acquisition was removed to fix an xfstest bug
that was observed during internal testing. The deadlock reported by syzbot
is resolved by reint
nvd
CVE-2025-39731MEDIUMCVSS 5.5v11.02025-09-07
CVE-2025-39731 [MEDIUM] CVE-2025-39731: In the Linux kernel, the following vulnerability has been resolved:
f2fs: vm_unmap_ram() may be cal
In the Linux kernel, the following vulnerability has been resolved:
f2fs: vm_unmap_ram() may be called from an invalid context
When testing F2FS with xfstests using UFS backed virtual disks the
kernel complains sometimes that f2fs_release_decomp_mem() calls
vm_unmap_ram() from an invalid context. Example trace from
f2fs/007 test:
f2fs/007 5s ... [12:59:3
nvd
CVE-2025-39689HIGHCVSS 7.8v11.02025-09-05
CVE-2025-39689 [HIGH] CWE-416 CVE-2025-39689: In the Linux kernel, the following vulnerability has been resolved:
ftrace: Also allocate and copy
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Also allocate and copy hash for reading of filter files
Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds
the pointer to the global tracer hash to its iterator. Unlike the writer
that allocates a copy of the hash, the reader keeps the pointer to the
f
nvd
CVE-2025-38736HIGHCVSS 7.1v11.02025-09-05
CVE-2025-38736 [HIGH] CWE-125 CVE-2025-38736: In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix_devices: Fix PHY
In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization
Syzbot reported shift-out-of-bounds exception on MDIO bus initialization.
The PHY address should be masked to 5 bits (0-31). Without this
mask, invalid PHY addresses could be used, potentially causing issues
wi
nvd
CVE-2025-39683HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39683 [HIGH] CWE-125 CVE-2025-39683: In the Linux kernel, the following vulnerability has been resolved:
tracing: Limit access to parser
In the Linux kernel, the following vulnerability has been resolved:
tracing: Limit access to parser->buffer when trace_get_user failed
When the length of the string written to set_ftrace_filter exceeds
FTRACE_BUFF_MAX, the following KASAN alarm will be triggered:
BUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0
Read of size 1 at addr ffff0000d0
nvd
CVE-2025-39686HIGHCVSS 7.8v11.02025-09-05
CVE-2025-39686 [HIGH] CVE-2025-39686: In the Linux kernel, the following vulnerability has been resolved:
comedi: Make insn_rw_emulate_bi
In the Linux kernel, the following vulnerability has been resolved:
comedi: Make insn_rw_emulate_bits() do insn->n samples
The `insn_rw_emulate_bits()` function is used as a default handler for
`INSN_READ` instructions for subdevices that have a handler for
`INSN_BITS` but not for `INSN_READ`. Similarly, it is used as a default
handler for `INSN_WRITE` inst
nvd
CVE-2025-39701HIGHCVSS 7.8v11.02025-09-05
CVE-2025-39701 [HIGH] CVE-2025-39701: In the Linux kernel, the following vulnerability has been resolved:
ACPI: pfr_update: Fix the drive
In the Linux kernel, the following vulnerability has been resolved:
ACPI: pfr_update: Fix the driver update version check
The security-version-number check should be used rather
than the runtime version check for driver updates.
Otherwise, the firmware update would fail when the update binary had
a lower runtime version number than the current one.
[ rjw:
nvd
CVE-2025-39702HIGHCVSS 7.0v11.02025-09-05
CVE-2025-39702 [HIGH] CWE-203 CVE-2025-39702: In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: Fix MAC comparison to
In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: Fix MAC comparison to be constant-time
To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
nvd
CVE-2025-39682HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39682 [HIGH] CVE-2025-39682: In the Linux kernel, the following vulnerability has been resolved:
tls: fix handling of zero-lengt
In the Linux kernel, the following vulnerability has been resolved:
tls: fix handling of zero-length records on the rx_list
Each recvmsg() call must process either
- only contiguous DATA records (any number of them)
- one non-DATA record
If the next record has different type than what has already been
processed we break out of the main processing loop. If
nvd
CVE-2025-39685HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39685 [HIGH] CWE-125 CVE-2025-39685: In the Linux kernel, the following vulnerability has been resolved:
comedi: pcl726: Prevent invalid
In the Linux kernel, the following vulnerability has been resolved:
comedi: pcl726: Prevent invalid irq number
The reproducer passed in an irq number(0x80008000) that was too large,
which triggered the oob.
Added an interrupt number check to prevent users from passing in an irq
number that was too large.
If `it->options[1]` is 31, then `1 options[
nvd
CVE-2025-39691HIGHCVSS 7.8v11.02025-09-05
CVE-2025-39691 [HIGH] CWE-416 CVE-2025-39691: In the Linux kernel, the following vulnerability has been resolved:
fs/buffer: fix use-after-free w
In the Linux kernel, the following vulnerability has been resolved:
fs/buffer: fix use-after-free when call bh_read() helper
There's issue as follows:
BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110
Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64
nvd
CVE-2025-39687HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39687 [HIGH] CVE-2025-39687: In the Linux kernel, the following vulnerability has been resolved:
iio: light: as73211: Ensure buf
In the Linux kernel, the following vulnerability has been resolved:
iio: light: as73211: Ensure buffer holes are zeroed
Given that the buffer is copied to a kfifo that ultimately user space
can read, ensure we zero it.
nvd
CVE-2025-39710HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39710 [HIGH] CWE-125 CVE-2025-39710: In the Linux kernel, the following vulnerability has been resolved:
media: venus: Add a check for p
In the Linux kernel, the following vulnerability has been resolved:
media: venus: Add a check for packet size after reading from shared memory
Add a check to ensure that the packet size does not exceed the number of
available words after reading the packet header from shared memory. This
ensures that the size provided by the firmware is safe to proc
nvd
CVE-2025-39719HIGHCVSS 7.1v11.02025-09-05
CVE-2025-39719 [HIGH] CWE-125 CVE-2025-39719: In the Linux kernel, the following vulnerability has been resolved:
iio: imu: bno055: fix OOB acces
In the Linux kernel, the following vulnerability has been resolved:
iio: imu: bno055: fix OOB access of hw_xlate array
Fix a potential out-of-bounds array access of the hw_xlate array in
bno055.c.
In bno055_get_regmask(), hw_xlate was iterated over the length of the
vals array instead of the length of the hw_xlate array. In the case of
bno055_gyr_s
nvd
CVE-2025-39673MEDIUMCVSS 4.7v11.02025-09-05
CVE-2025-39673 [MEDIUM] CWE-362 CVE-2025-39673: In the Linux kernel, the following vulnerability has been resolved:
ppp: fix race conditions in ppp
In the Linux kernel, the following vulnerability has been resolved:
ppp: fix race conditions in ppp_fill_forward_path
ppp_fill_forward_path() has two race conditions:
1. The ppp->channels list can change between list_empty() and
list_first_entry(), as ppp_lock() is not held. If the only channel
is deleted in ppp_disconnect_channel(), list_first_e
nvd
CVE-2025-38735MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-38735 [MEDIUM] CWE-476 CVE-2025-38735: In the Linux kernel, the following vulnerability has been resolved:
gve: prevent ethtool ops after
In the Linux kernel, the following vulnerability has been resolved:
gve: prevent ethtool ops after shutdown
A crash can occur if an ethtool operation is invoked
after shutdown() is called.
shutdown() is invoked during system shutdown to stop DMA operations
without performing expensive deallocations. It is discouraged to
unregister the netdev in th
nvd
CVE-2025-39697MEDIUMCVSS 4.7v11.02025-09-05
CVE-2025-39697 [MEDIUM] CWE-362 CVE-2025-39697: In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix a race when updating a
In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix a race when updating an existing write
After nfs_lock_and_join_requests() tests for whether the request is
still attached to the mapping, nothing prevents a call to
nfs_inode_remove_request() from succeeding until we actually lock the
page group.
The reason is that whoeve
nvd
CVE-2025-39714MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39714 [MEDIUM] CVE-2025-39714: In the Linux kernel, the following vulnerability has been resolved:
media: usbtv: Lock resolution w
In the Linux kernel, the following vulnerability has been resolved:
media: usbtv: Lock resolution while streaming
When an program is streaming (ffplay) and another program (qv4l2)
changes the TV standard from NTSC to PAL, the kernel crashes due to trying
to copy to unmapped memory.
Changing from NTSC to PAL increases the resolution in the usbtv struct,
b
nvd