Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 107 of 665
CVE-2025-38032LOWCVSS 5.52025
CVE-2025-38032 [MEDIUM] CVE-2025-38032: linux - In the Linux kernel, the following vulnerability has been resolved: mr: consoli... In the Linux kernel, the following vulnerability has been resolved: mr: consolidate the ipmr_can_free_table() checks. Guoyu Yin reported a splat in the ipmr netns cleanup path: WARNING: CPU: 2 PID: 14564 at net/ipv4/ipmr.c:440 ipmr_free_table net/ipv4/ipmr.c:440 [inline] WARNING: CPU: 2 PID: 14564 at net/ipv4/ipmr.c:440 ipmr_rules_exit+0x135/0x1c0 net/ipv4/ipmr.c:36
debian
CVE-2025-21773LOWCVSS 5.5fixed in linux 6.12.16-1 (forky)2025
CVE-2025-21773 [MEDIUM] CVE-2025-21773: linux - In the Linux kernel, the following vulnerability has been resolved: can: etas_e... In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: fix potential NULL pointer dereference on udev->serial The driver assumed that es58x_dev->udev->serial could never be NULL. While this is true on commercially available devices, an attacker could spoof the device identity providing a NULL USB serial number. That would trigger a NULL
debian
CVE-2025-40009LOWfixed in linux 6.16.10-1 (forky)2025
CVE-2025-40009 [LOW] CVE-2025-40009: linux - In the Linux kernel, the following vulnerability has been resolved: fs/proc/tas... In the Linux kernel, the following vulnerability has been resolved: fs/proc/task_mmu: check p->vec_buf for NULL When the PAGEMAP_SCAN ioctl is invoked with vec_len = 0 reaches pagemap_scan_backout_range(), kernel panics with null-ptr-deref: [ 44.936808] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP DEBUG_PAGEALLOC
debian
CVE-2025-71090LOWCVSS 5.5fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71090 [MEDIUM] CVE-2025-71090: linux - In the Linux kernel, the following vulnerability has been resolved: nfsd: fix n... In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg() nfsd4_add_rdaccess_to_wrdeleg() unconditionally overwrites fp->fi_fds[O_RDONLY] with a newly acquired nfsd_file. However, if the client already has a SHARE_ACCESS_READ open from a previous OPEN operation, this action overwrites th
debian
CVE-2025-68323LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68323 [LOW] CVE-2025-68323: linux - In the Linux kernel, the following vulnerability has been resolved: usb: typec:... In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: fix use-after-free caused by uec->work The delayed work uec->work is scheduled in gaokun_ucsi_probe() but never properly canceled in gaokun_ucsi_remove(). This creates use-after-free scenarios where the ucsi and gaokun_ucsi structure are freed after ucsi_destroy() completes execution,
debian
CVE-2025-40045LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40045 [LOW] CVE-2025-40045: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: codec... In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the comp soundwire port correctly For some reason we endup with setting soundwire port for HPHL_COMP and HPHR_COMP as zero, this can potentially result in a memory corruption due to accessing and setting -1 th element of port_map array. Scope: local bookworm: resolved bullsey
debian
CVE-2025-71100LOWCVSS 7.8fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71100 [HIGH] CVE-2025-71100: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwi... In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() TID getting from ieee80211_get_tid() might be out of range of array size of sta_entry->tids[], so check TID is less than MAX_TID_COUNT. Othwerwise, UBSAN warn: UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi
debian
CVE-2025-22110LOWCVSS 5.52025
CVE-2025-22110 [MEDIUM] CVE-2025-22110: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: Initialize ctx to avoid memory allocation error It is possible that ctx in nfqnl_build_packet_message() could be used before it is properly initialize, which is only initialized by nfqnl_get_sk_secctx(). This patch corrects this problem by initializing the lsmctx to a saf
debian
CVE-2025-40208LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40208 [LOW] CVE-2025-40208: linux - In the Linux kernel, the following vulnerability has been resolved: media: iris... In the Linux kernel, the following vulnerability has been resolved: media: iris: fix module removal if firmware download failed Fix remove if firmware failed to load: qcom-iris aa00000.video-codec: Direct firmware load for qcom/vpu/vpu33_p4.mbn failed with error -2 qcom-iris aa00000.video-codec: firmware download failed qcom-iris aa00000.video-codec: core init failed t
debian
CVE-2025-21783LOWCVSS 5.5fixed in linux 6.12.16-1 (forky)2025
CVE-2025-21783 [MEDIUM] CVE-2025-21783: linux - In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fi... In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fix crash on error in gpiochip_get_ngpios() The gpiochip_get_ngpios() uses chip_*() macros to print messages. However these macros rely on gpiodev to be initialised and set, which is not the case when called via bgpio_init(). In such a case the printing messages will crash on NULL pointer d
debian
CVE-2025-39887LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39887 [MEDIUM] CVE-2025-39887: linux - In the Linux kernel, the following vulnerability has been resolved: tracing/osn... In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Fix null-ptr-deref in bitmap_parselist() A crash was observed with the following output: BUG: kernel NULL pointer dereference, address: 0000000000000010 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 2 UID: 0 PID: 92 Comm: osnoise_cpus Not tainted 6.17.0-rc4-00201-gd69eb204c255 #138 PREEMPT(v
debian
CVE-2025-40232LOW2025
CVE-2025-40232 [LOW] CVE-2025-40232: linux - In the Linux kernel, the following vulnerability has been resolved: rv: Fully c... In the Linux kernel, the following vulnerability has been resolved: rv: Fully convert enabled_monitors to use list_head as iterator The callbacks in enabled_monitors_seq_ops are inconsistent. Some treat the iterator as struct rv_monitor *, while others treat the iterator as struct list_head *. This causes a wrong type cast and crashes the system as reported by Nathan.
debian
CVE-2025-68737LOW2025
CVE-2025-68737 [LOW] CVE-2025-68737: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/pagea... In the Linux kernel, the following vulnerability has been resolved: arm64/pageattr: Propagate return value from __change_memory_common The rodata=on security measure requires that any code path which does vmalloc -> set_memory_ro/set_memory_rox must protect the linear map alias too. Therefore, if such a call fails, we must abort set_memory_* and caller must take approp
debian
CVE-2025-39879LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39879 [MEDIUM] CVE-2025-39879: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: alway... In the Linux kernel, the following vulnerability has been resolved: ceph: always call ceph_shift_unused_folios_left() The function ceph_process_folio_batch() sets folio_batch entries to NULL, which is an illegal state. Before folio_batch_release() crashes due to this API violation, the function ceph_shift_unused_folios_left() is supposed to remove those NULLs from t
debian
CVE-2025-21988LOWCVSS 5.5fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21988 [MEDIUM] CVE-2025-21988: linux - In the Linux kernel, the following vulnerability has been resolved: fs/netfs/re... In the Linux kernel, the following vulnerability has been resolved: fs/netfs/read_collect: add to next->prev_donated If multiple subrequests donate data to the same "next" request (depending on the subrequest completion order), each of them would overwrite the `prev_donated` field, causing data corruption and a BUG() crash ("Can't donate prior to front"). Scope: loc
debian
CVE-2025-39695LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39695 [MEDIUM] CVE-2025-39695: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F... In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Flush delayed SKBs while releasing RXE resources When skb packets are sent out, these skb packets still depends on the rxe resources, for example, QP, sk, when these packets are destroyed. If these rxe resources are released when the skb packets are destroyed, the call traces will appear.
debian
CVE-2025-38442LOWCVSS 5.52025
CVE-2025-38442 [MEDIUM] CVE-2025-38442: linux - In the Linux kernel, the following vulnerability has been resolved: block: reje... In the Linux kernel, the following vulnerability has been resolved: block: reject bs > ps block devices when THP is disabled If THP is disabled and when a block device with logical block size > page size is present, the following null ptr deref panic happens during boot: [ [13.2 mK AOSAN: null-ptr-deref in range [0x0000000000000000-0x0000000000K0 0 0[07] [ 13.017749
debian
CVE-2025-38028LOWCVSS 4.72025
CVE-2025-38028 [MEDIUM] CVE-2025-38028: linux - In the Linux kernel, the following vulnerability has been resolved: NFS/localio... In the Linux kernel, the following vulnerability has been resolved: NFS/localio: Fix a race in nfs_local_open_fh() Once the clp->cl_uuid.lock has been dropped, another CPU could come in and free the struct nfsd_file that was just added. To prevent that from happening, take the RCU read lock before dropping the spin lock. Scope: local bookworm: resolved bullseye: res
debian
CVE-2025-37894LOWCVSS 5.5fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37894 [MEDIUM] CVE-2025-37894: linux - In the Linux kernel, the following vulnerability has been resolved: net: use so... In the Linux kernel, the following vulnerability has been resolved: net: use sock_gen_put() when sk_state is TCP_TIME_WAIT It is possible for a pointer of type struct inet_timewait_sock to be returned from the functions __inet_lookup_established() and __inet6_lookup_established(). This can cause a crash when the returned pointer is of type struct inet_timewait_sock
debian
CVE-2025-21857LOWCVSS 5.5fixed in linux 6.12.17-1 (forky)2025
CVE-2025-21857 [MEDIUM] CVE-2025-21857: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: fix error handling causing NULL dereference tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can return 1 if the allocation succeeded after wrapping. This was treated as an error, with value 1 returned to caller tcf_exts_init_ex() which sets exts->actions to NULL a
debian
Debian Linux vulnerabilities | cvebase