Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 103 of 665
CVE-2025-40041LOW2025
CVE-2025-40041 [LOW] CVE-2025-40041: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ... In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign-extend struct ops return values properly The ns_bpf_qdisc selftest triggers a kernel panic: Oops[#1]: CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4 CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G
debian
CVE-2025-38049LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-38049 [MEDIUM] CVE-2025-38049: linux - In the Linux kernel, the following vulnerability has been resolved: x86/resctrl... In the Linux kernel, the following vulnerability has been resolved: x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitors Commit 6eac36bb9eb0 ("x86/resctrl: Allocate the cleanest CLOSID by searching closid_num_dirty_rmid") added logic that causes resctrl to search for the CLOSID with the fewest dirty cache lines when creating a new control gro
debian
CVE-2025-38256LOWCVSS 5.5fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38256 [MEDIUM] CVE-2025-38256: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/rs... In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: fix folio unpinning syzbot complains about an unmapping failure: [ 108.070381][ T14] kernel BUG at mm/gup.c:71! [ 108.070502][ T14] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 108.123672][ T14] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20250221-8.fc42 02/21/2025 [
debian
CVE-2025-38123LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38123 [MEDIUM] CVE-2025-38123: linux - In the Linux kernel, the following vulnerability has been resolved: net: wwan: ... In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Fix napi rx poll issue When driver handles the napi rx polling requests, the netdev might have been released by the dellink logic triggered by the disconnect operation on user plane. However, in the logic of processing skb in polling, an invalid netdev is still being used, which cau
debian
CVE-2025-21921LOWCVSS 5.5fixed in linux 6.12.19-1 (forky)2025
CVE-2025-21921 [MEDIUM] CVE-2025-21921: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethtoo... In the Linux kernel, the following vulnerability has been resolved: net: ethtool: netlink: Allow NULL nlattrs when getting a phy_device ethnl_req_get_phydev() is used to lookup a phy_device, in the case an ethtool netlink command targets a specific phydev within a netdev's topology. It takes as a parameter a const struct nlattr *header that's used for error handling
debian
CVE-2025-39717LOWCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39717 [HIGH] CVE-2025-39717: linux - In the Linux kernel, the following vulnerability has been resolved: open_tree_a... In the Linux kernel, the following vulnerability has been resolved: open_tree_attr: do not allow id-mapping changes without OPEN_TREE_CLONE As described in commit 7a54947e727b ('Merge patch series "fs: allow changing idmappings"'), open_tree_attr(2) was necessary in order to allow for a detached mount to be created and have its idmappings changed without the risk of a
debian
CVE-2025-22051LOWCVSS 5.52025
CVE-2025-22051 [MEDIUM] CVE-2025-22051: linux - In the Linux kernel, the following vulnerability has been resolved: staging: gp... In the Linux kernel, the following vulnerability has been resolved: staging: gpib: Fix Oops after disconnect in agilent usb If the agilent usb dongle is disconnected subsequent calls to the driver cause a NULL dereference Oops as the bus_interface is set to NULL on disconnect. This problem was introduced by setting usb_dev from the bus_interface for dev_xxx messages
debian
CVE-2025-38580LOWCVSS 7.82025
CVE-2025-38580 [HIGH] CVE-2025-38580: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix i... In the Linux kernel, the following vulnerability has been resolved: ext4: fix inode use after free in ext4_end_io_rsv_work() In ext4_io_end_defer_completion(), check if io_end->list_vec is empty to avoid adding an io_end that requires no conversion to the i_rsv_conversion_list, which in turn prevents starting an unnecessary worker. An ext4_emergency_state() check is a
debian
CVE-2025-38196LOWCVSS 5.52025
CVE-2025-38196 [MEDIUM] CVE-2025-38196: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/rs... In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: validate buffer count with offset for cloning syzbot reports that it can trigger a WARN_ON() for kmalloc() attempt that's too big: WARNING: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 Modules linked in: CPU: 0 UID: 0 PID: 6488 Comm: syz-executo
debian
CVE-2025-38620LOWCVSS 7.82025
CVE-2025-38620 [HIGH] CVE-2025-38620: linux - In the Linux kernel, the following vulnerability has been resolved: zloop: fix ... In the Linux kernel, the following vulnerability has been resolved: zloop: fix KASAN use-after-free of tag set When a zoned loop device, or zloop device, is removed, KASAN enabled kernel reports "BUG KASAN use-after-free" in blk_mq_free_tag_set(). The BUG happens because zloop_ctl_remove() calls put_disk(), which invokes zloop_free_disk(). The zloop_free_disk() frees
debian
CVE-2025-38223LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38223 [MEDIUM] CVE-2025-38223: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: avoid... In the Linux kernel, the following vulnerability has been resolved: ceph: avoid kernel BUG for encrypted inode with unaligned file size The generic/397 test hits a BUG_ON for the case of encrypted inode with unaligned file size (for example, 33K or 1K): [ 877.737811] run fstests generic/397 at 2025-01-03 12:34:40 [ 877.875761] libceph: mon0 (2)127.0.0.1:40674 sessio
debian
CVE-2025-38008LOWCVSS 4.7fixed in linux 6.12.30-1 (forky)2025
CVE-2025-38008 [MEDIUM] CVE-2025-38008: linux - In the Linux kernel, the following vulnerability has been resolved: mm/page_all... In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: fix race condition in unaccepted memory handling The page allocator tracks the number of zones that have unaccepted memory using static_branch_enc/dec() and uses that static branch in hot paths to determine if it needs to deal with unaccepted memory. Borislav and Thomas pointed out th
debian
CVE-2025-40310LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40310 [LOW] CVE-2025-40310: linux - In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd:... In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw There is race in amdgpu_amdkfd_device_fini_sw and interrupt. if amdgpu_amdkfd_device_fini_sw run in b/w kfd_cleanup_nodes and kfree(kfd), and KGD interrupt generated. kernel panic log: BUG: kernel NULL pointer dereference, address: 000000000000
debian
CVE-2025-68232LOWfixed in linux 6.17.10-1 (forky)2025
CVE-2025-68232 [LOW] CVE-2025-68232: linux - In the Linux kernel, the following vulnerability has been resolved: veth: more ... In the Linux kernel, the following vulnerability has been resolved: veth: more robust handing of race to avoid txq getting stuck Commit dc82a33297fc ("veth: apply qdisc backpressure on full ptr_ring to reduce TX drops") introduced a race condition that can lead to a permanently stalled TXQ. This was observed in production on ARM64 systems (Ampere Altra Max). The race o
debian
CVE-2025-40061LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40061 [LOW] CVE-2025-40061: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F... In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix race in do_task() when draining When do_task() exhausts its iteration budget (!ret), it sets the state to TASK_STATE_IDLE to reschedule, without a secondary check on the current task->state. This can overwrite the TASK_STATE_DRAINING state set by a concurrent call to rxe_cleanup_task() or
debian
CVE-2025-37891LOWCVSS 7.8fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37891 [HIGH] CVE-2025-37891: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: ump: ... In the Linux kernel, the following vulnerability has been resolved: ALSA: ump: Fix buffer overflow at UMP SysEx message conversion The conversion function from MIDI 1.0 to UMP packet contains an internal buffer to keep the incoming MIDI bytes, and its size is 4, as it was supposed to be the max size for a MIDI1 UMP packet data. However, the implementation overlooked t
debian
CVE-2025-37754LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37754 [MEDIUM] CVE-2025-37754: linux - In the Linux kernel, the following vulnerability has been resolved: drm/i915/hu... In the Linux kernel, the following vulnerability has been resolved: drm/i915/huc: Fix fence not released on early probe errors HuC delayed loading fence, introduced with commit 27536e03271da ("drm/i915/huc: track delayed HuC load with a fence"), is registered with object tracker early on driver probe but unregistered only from driver remove, which is not called on e
debian
CVE-2025-39834LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39834 [MEDIUM] CVE-2025-39834: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: H... In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow When an invalid stc_type is provided, the function allocates memory for shared_stc but jumps to unlock_and_out without freeing it, causing a memory leak. Fix by jumping to free_shared_stc label instead to ensure proper cleanu
debian
CVE-2025-27558LOWCVSS 3.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-27558 [LOW] CVE-2025-27558: linux - IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. I... IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. In mesh networks using Wi-Fi Protected Access (WPA, WPA2, or WPA3) or Wired Equivalent Privacy (WEP), an adversary can exploit this vulnerability to inject arbitrary frames towards devices that support receiving non-SSP A-MSDU frames. NOTE: this issue exists because of an incorrect fix for C
debian
CVE-2025-22006LOWCVSS 5.5fixed in linux 6.12.21-1 (forky)2025
CVE-2025-22006 [MEDIUM] CVE-2025-22006: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern... In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associat
debian