Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 106 of 665
CVE-2025-68319LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68319 [LOW] CVE-2025-68319: linux - In the Linux kernel, the following vulnerability has been resolved: netconsole:...
In the Linux kernel, the following vulnerability has been resolved: netconsole: Acquire su_mutex before navigating configs hierarchy There is a race between operations that iterate over the userdata cg_children list and concurrent add/remove of userdata items through configfs. The update_userdata() function iterates over the nt->userdata_group.cg_children list, and cou
debian
CVE-2025-38649LOWCVSS 5.52025
CVE-2025-38649 [MEDIUM] CVE-2025-38649: linux - In the Linux kernel, the following vulnerability has been resolved: arm64: dts:...
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight An infinite loop has been created by the Coresight devices. When only a source device is enabled, the coresight_find_activated_sysfs_sink function is recursively invoked in an attempt to locate an active sink device, u
debian
CVE-2025-39818LOWCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39818 [HIGH] CVE-2025-39818: linux - In the Linux kernel, the following vulnerability has been resolved: HID: intel-...
In the Linux kernel, the following vulnerability has been resolved: HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save Improper use of secondary pointer (&dev->i2c_subip_regs) caused kernel crash and out-of-bounds error: BUG: KASAN: slab-out-of-bounds in _regmap_bulk_read+0x449/0x510 Write of size 4 at addr ffff888136005dc0 by task kworke
debian
CVE-2025-38019LOWCVSS 7.8fixed in linux 6.12.30-1 (forky)2025
CVE-2025-38019 [HIGH] CVE-2025-38019: linux - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spec...
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices The driver only offloads neighbors that are constructed on top of net devices registered by it or their uppers (which are all Ethernet). The device supports GRE encapsulation and decapsulation of forwarded traffic, but the driver
debian
CVE-2025-40265LOWfixed in linux 6.17.10-1 (forky)2025
CVE-2025-40265 [LOW] CVE-2025-40265: linux - In the Linux kernel, the following vulnerability has been resolved: vfat: fix m...
In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme device on qemu with both logical_block_size and physical_block_size set to 8 KiB, but without format, a kernel panic was triggered during the early boot stage while attempting to mount a vfat filesystem. [95553.682035] EXT4
debian
CVE-2025-68243LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68243 [LOW] CVE-2025-68243: linux - In the Linux kernel, the following vulnerability has been resolved: NFS: Check ...
In the Linux kernel, the following vulnerability has been resolved: NFS: Check the TLS certificate fields in nfs_match_client() If the TLS security policy is of type RPC_XPRTSEC_TLS_X509, then the cert_serial and privkey_serial fields need to match as well since they define the client's identity, as presented to the server.
Scope: local
bookworm: resolved
bullseye: res
debian
CVE-2025-38296LOWCVSS 5.52025
CVE-2025-38296 [MEDIUM] CVE-2025-38296: linux - In the Linux kernel, the following vulnerability has been resolved: ACPI: platf...
In the Linux kernel, the following vulnerability has been resolved: ACPI: platform_profile: Avoid initializing on non-ACPI platforms The platform profile driver is loaded even on platforms that do not have ACPI enabled. The initialization of the sysfs entries was recently moved from platform_profile_register() to the module init call, and those entries need acpi_kob
debian
CVE-2025-39890LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-39890 [MEDIUM] CVE-2025-39890: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps is not freed in the failure case, causing a memory leak. The following trace is observed in kmemleak: unreferenced object 0xffff8b3eb5789c00 (size 1024): comm "sof
debian
CVE-2025-37755LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37755 [MEDIUM] CVE-2025-37755: linux - In the Linux kernel, the following vulnerability has been resolved: net: libwx:...
In the Linux kernel, the following vulnerability has been resolved: net: libwx: handle page_pool_dev_alloc_pages error page_pool_dev_alloc_pages could return NULL. There was a WARN_ON(!page) but it would still proceed to use the NULL pointer and then crash. This is similar to commit 001ba0902046 ("net: fec: handle page_pool_dev_alloc_pages error"). This is found by
debian
CVE-2025-22012LOWCVSS 5.52025
CVE-2025-22012 [MEDIUM] CVE-2025-22012: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "arm...
In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu" There are reports that the pagetable walker cache coherency is not a given across the spectrum of SDM845/850 devices, leading to lock-ups and resets. It works fine on some devices (like the Dragonboard 845c, but not so much on the Leno
debian
CVE-2025-37996LOWCVSS 5.52025
CVE-2025-37996 [MEDIUM] CVE-2025-37996: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: arm64:...
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix uninitialized memcache pointer in user_mem_abort() Commit fce886a60207 ("KVM: arm64: Plumb the pKVM MMU in KVM") made the initialization of the local memcache variable in user_mem_abort() conditional, leaving a codepath where it is used uninitialized via kvm_pgtable_stage2_map(). Thi
debian
CVE-2025-71124LOWCVSS 5.5fixed in linux 6.18.3-1 (forky)2025
CVE-2025-71124 [MEDIUM] CVE-2025-71124: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6x...
In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: move preempt_prepare_postamble after error check Move the call to preempt_prepare_postamble() after verifying that preempt_postamble_ptr is valid. If preempt_postamble_ptr is NULL, dereferencing it in preempt_prepare_postamble() would lead to a crash. This change avoids calling the pre
debian
CVE-2025-68298LOWfixed in linux 6.17.11-1 (forky)2025
CVE-2025-68298 [LOW] CVE-2025-68298: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref In btusb_mtk_setup(), we set `btmtk_data->isopkt_intf` to: usb_ifnum_to_if(data->udev, MTK_ISO_IFNUM) That function can return NULL in some cases. Even when it returns NULL, though, we still go on to call btusb_mtk_claim_iso_intf()
debian
CVE-2025-21737LOWCVSS 5.5fixed in linux 6.12.15-1 (forky)2025
CVE-2025-21737 [MEDIUM] CVE-2025-21737: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: fix m...
In the Linux kernel, the following vulnerability has been resolved: ceph: fix memory leak in ceph_mds_auth_match() We now free the temporary target path substring allocation on every possible branch, instead of omitting the default branch. In some cases, a memory leak occured, which could rapidly crash the system (depending on how many file accesses were attempted).
debian
CVE-2025-68355LOW2025
CVE-2025-68355 [LOW] CVE-2025-68355: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ex...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix exclusive map memory leak When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also needs to be freed. Otherwise, the map memory will not be reclaimed, just like the memory leak problem reported by syzbot [1]. syzbot reported: BUG: memory leak backtrace (crc 7b9fb9b4): map_cre
debian
CVE-2025-40305LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40305 [LOW] CVE-2025-40305: linux - In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd...
In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN p9_read_work() doesn't set Rworksched and doesn't do schedule_work(m->rq) if list_empty(&m->req_list). However, if the pipe is full, we need to read more data and this used to work prior to commit aaec5a95d59615 ("pipe_read: don't wake up the writer
debian
CVE-2025-39966LOWCVSS 7.0fixed in linux 6.16.10-1 (forky)2025
CVE-2025-39966 [HIGH] CVE-2025-39966: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd: Fi...
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix race during abort for file descriptors fput() doesn't actually call file_operations release() synchronously, it puts the file on a work queue and it will be released eventually. This is normally fine, except for iommufd the file and the iommufd_object are tied to gether. The file has the
debian
CVE-2025-39723LOWCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39723 [HIGH] CVE-2025-39723: linux - In the Linux kernel, the following vulnerability has been resolved: netfs: Fix ...
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix unbuffered write error handling If all the subrequests in an unbuffered write stream fail, the subrequest collector doesn't update the stream->transferred value and it retains its initial LONG_MAX value. Unfortunately, if all active streams fail, then we take the smallest value of { LONG_MA
debian
CVE-2025-38413LOWCVSS 5.5fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38413 [MEDIUM] CVE-2025-38413: linux - In the Linux kernel, the following vulnerability has been resolved: virtio-net:...
In the Linux kernel, the following vulnerability has been resolved: virtio-net: xsk: rx: fix the frame's length check When calling buf_to_xdp, the len argument is the frame data's length without virtio header's length (vi->hdr_len). We check that len with xsk_pool_get_rx_frame_size() + vi->hdr_len to ensure the provided len does not larger than the allocated chunk s
debian
CVE-2025-40326LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40326 [LOW] CVE-2025-40326: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: Defin...
In the Linux kernel, the following vulnerability has been resolved: NFSD: Define actions for the new time_deleg FATTR4 attributes NFSv4 clients won't send legitimate GETATTR requests for these new attributes because they are intended to be used only with CB_GETATTR and SETATTR. But NFSD has to do something besides crashing if it ever sees a GETATTR request that queries
debian