Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
395
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 7 of 496
CVE-2025-39703MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39703 [MEDIUM] CWE-476 CVE-2025-39703: In the Linux kernel, the following vulnerability has been resolved:
net, hsr: reject HSR frame if s
In the Linux kernel, the following vulnerability has been resolved:
net, hsr: reject HSR frame if skb can't hold tag
Receiving HSR frame with insufficient space to hold HSR tag in the skb
can result in a crash (kernel BUG):
[ 45.390915] skbuff: skb_under_panic: text:ffffffff86f32cac len:26 put:14 head:ffff888042418000 data:ffff888042417ff4 tail:0
nvd
CVE-2025-39693MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39693 [MEDIUM] CWE-476 CVE-2025-39693: In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Avoid a NULL p
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Avoid a NULL pointer dereference
[WHY]
Although unlikely drm_atomic_get_new_connector_state() or
drm_atomic_get_old_connector_state() can return NULL.
[HOW]
Check returns before dereference.
(cherry picked from commit 1e5e8d672fec9f2ab352be121be971877bff2af9)
nvd
CVE-2025-39675MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39675 [MEDIUM] CWE-476 CVE-2025-39675: In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Add null point
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
The function mod_hdcp_hdcp1_create_session() calls the function
get_first_active_display(), but does not check its return value.
The return value is a null pointer if the display list is empty.
This will le
nvd
CVE-2025-39709MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39709 [MEDIUM] CWE-476 CVE-2025-39709: In the Linux kernel, the following vulnerability has been resolved:
media: venus: protect against s
In the Linux kernel, the following vulnerability has been resolved:
media: venus: protect against spurious interrupts during probe
Make sure the interrupt handler is initialized before the interrupt is
registered.
If the IRQ is registered before hfi_create(), it's possible that an
interrupt fires before the handler setup is complete, leading to a
nvd
CVE-2025-39713MEDIUMCVSS 4.7v11.02025-09-05
CVE-2025-39713 [MEDIUM] CWE-367 CVE-2025-39713: In the Linux kernel, the following vulnerability has been resolved:
media: rainshadow-cec: fix TOCT
In the Linux kernel, the following vulnerability has been resolved:
media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
In the interrupt handler rain_interrupt(), the buffer full check on
rain->buf_len is performed before acquiring rain->buf_lock. This
creates a Time-of-Check to Time-of-Use (TOCTOU) race condition, as
rain->buf_le
nvd
CVE-2025-39694MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39694 [MEDIUM] CWE-476 CVE-2025-39694: In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Fix SCCB present che
In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Fix SCCB present check
Tracing code called by the SCLP interrupt handler contains early exits
if the SCCB address associated with an interrupt is NULL. This check is
performed after physical to virtual address translation.
If the kernel identity mapping does not start
nvd
CVE-2025-39681MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39681 [MEDIUM] CVE-2025-39681: In the Linux kernel, the following vulnerability has been resolved:
x86/cpu/hygon: Add missing resc
In the Linux kernel, the following vulnerability has been resolved:
x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper
Since
923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")
resctrl_cpu_detect() has been moved from common CPU initialization code to
the vendor-specific BSP init helper, while Hygon didn't put
nvd
CVE-2025-39684MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39684 [MEDIUM] CWE-908 CVE-2025-39684: In the Linux kernel, the following vulnerability has been resolved:
comedi: Fix use of uninitialize
In the Linux kernel, the following vulnerability has been resolved:
comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()
syzbot reports a KMSAN kernel-infoleak in `do_insn_ioctl()`. A kernel
buffer is allocated to hold `insn->n` samples (each of which is an
`unsigned int`). For some instruction types, `insn->n` sample
nvd
CVE-2025-39716MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39716 [MEDIUM] CVE-2025-39716: In the Linux kernel, the following vulnerability has been resolved:
parisc: Revise __get_user() to
In the Linux kernel, the following vulnerability has been resolved:
parisc: Revise __get_user() to probe user read access
Because of the way read access support is implemented, read access
interruptions are only triggered at privilege levels 2 and 3. The
kernel executes at privilege level 0, so __get_user() never triggers
a read access interruption (code 2
nvd
CVE-2025-39706MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39706 [MEDIUM] CWE-476 CVE-2025-39706: In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Destroy KFD debugfs
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Destroy KFD debugfs after destroy KFD wq
Since KFD proc content was moved to kernel debugfs, we can't destroy KFD
debugfs before kfd_process_destroy_wq. Move kfd_process_destroy_wq prior
to kfd_debugfs_fini to fix a kernel NULL pointer problem. It happens
when /sys/ker
nvd
CVE-2025-39676MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39676 [MEDIUM] CWE-476 CVE-2025-39676: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla4xxx: Prevent a potent
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla4xxx: Prevent a potential error pointer dereference
The qla4xxx_get_ep_fwdb() function is supposed to return NULL on error,
but qla4xxx_ep_connect() returns error pointers. Propagating the error
pointers will lead to an Oops in the caller, so change the error pointers
to
nvd
CVE-2025-39724MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39724 [MEDIUM] CVE-2025-39724: In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: fix panic due to
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: fix panic due to PSLVERR
When the PSLVERR_RESP_EN parameter is set to 1, the device generates
an error response if an attempt is made to read an empty RBR (Receive
Buffer Register) while the FIFO is enabled.
In serial8250_do_startup(), calling serial_port_out(port, UART_LCR,
nvd
CVE-2025-38732MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-38732 [MEDIUM] CVE-2025-38732: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_reject: don't lea
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_reject: don't leak dst refcount for loopback packets
recent patches to add a WARN() when replacing skb dst entry found an
old bug:
WARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline]
WARNING: include/linux/skbuff.h:1165 skb_dst_set
nvd
CVE-2025-39692MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39692 [MEDIUM] CWE-476 CVE-2025-39692: In the Linux kernel, the following vulnerability has been resolved:
smb: server: split ksmbd_rdma_s
In the Linux kernel, the following vulnerability has been resolved:
smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()
We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()!
Otherwise already existing connections try to use smb_direct_wq as
a NULL pointer.
nvd
CVE-2025-39715MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39715 [MEDIUM] CVE-2025-39715: In the Linux kernel, the following vulnerability has been resolved:
parisc: Revise gateway LWS call
In the Linux kernel, the following vulnerability has been resolved:
parisc: Revise gateway LWS calls to probe user read access
We use load and stbys,e instructions to trigger memory reference
interruptions without writing to memory. Because of the way read
access support is implemented, read access interruptions are only
triggered at privilege levels 2 an
nvd
CVE-2025-39718MEDIUMCVSS 5.5v11.02025-09-05
CVE-2025-39718 [MEDIUM] CWE-787 CVE-2025-39718: In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Validate length i
In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Validate length in packet header before skb_put()
When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length
nvd
CVE-2025-38714HIGHCVSS 7.1v11.02025-09-04
CVE-2025-38714 [HIGH] CWE-125 CVE-2025-38714: In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
The hfsplus_bnode_read() method can trigger the issue:
[ 174.852007][ T9784] ==================================================================
[ 174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0
nvd
CVE-2025-38728HIGHCVSS 7.1v11.02025-09-04
CVE-2025-38728 [HIGH] CWE-125 CVE-2025-38728: In the Linux kernel, the following vulnerability has been resolved:
smb3: fix for slab out of bound
In the Linux kernel, the following vulnerability has been resolved:
smb3: fix for slab out of bounds on mount to ksmbd
With KASAN enabled, it is possible to get a slab out of bounds
during mount to ksmbd due to missing check in parse_server_interfaces()
(see below):
BUG: KASAN: slab-out-of-bounds in
parse_server_interfaces+0x14ee/0x1880 [cifs]
Read
nvd
CVE-2025-38679HIGHCVSS 7.1v11.02025-09-04
CVE-2025-38679 [HIGH] CWE-125 CVE-2025-38679: In the Linux kernel, the following vulnerability has been resolved:
media: venus: Fix OOB read due
In the Linux kernel, the following vulnerability has been resolved:
media: venus: Fix OOB read due to missing payload bound check
Currently, The event_seq_changed() handler processes a variable number
of properties sent by the firmware. The number of properties is indicated
by the firmware and used to iterate over the payload. However, the
payload si
nvd
CVE-2025-38685HIGHCVSS 7.8v11.02025-09-04
CVE-2025-38685 [HIGH] CWE-787 CVE-2025-38685: In the Linux kernel, the following vulnerability has been resolved:
fbdev: Fix vmalloc out-of-bound
In the Linux kernel, the following vulnerability has been resolved:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
This issue triggers when a userspace program does an ioctl
FBIOPUT_CON2FBMAP by passing console number and frame buffer number.
Ideally this maps console to frame buffer and updates the screen if
console is visible.
As part o
nvd