Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 108 of 665
CVE-2025-71139LOWCVSS 5.5fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71139 [MEDIUM] CVE-2025-71139: linux - In the Linux kernel, the following vulnerability has been resolved: kernel/kexe...
In the Linux kernel, the following vulnerability has been resolved: kernel/kexec: fix IMA when allocation happens in CMA area *** Bug description *** When I tested kexec with the latest kernel, I ran into the following warning: [ 40.712410] ------------[ cut here ]------------ [ 40.712576] WARNING: CPU: 2 PID: 1562 at kernel/kexec_core.c:1001 kimage_map_segment+0x14
debian
CVE-2025-22102LOWCVSS 5.5fixed in linux 6.12.30-1 (forky)2025
CVE-2025-22102 [MEDIUM] CVE-2025-22102: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Fix kernel panic during FW release This fixes a kernel panic seen during release FW in a stress test scenario where WLAN and BT FW download occurs simultaneously, and due to a HW bug, chip sends out only 1 bootloader signatures. When driver receives the bootloader signature, it
debian
CVE-2025-68741LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68741 [LOW] CVE-2025-68741: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: qla2x...
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix improper freeing of purex item In qla2xxx_process_purls_iocb(), an item is allocated via qla27xx_copy_multiple_pkt(), which internally calls qla24xx_alloc_purex_item(). The qla24xx_alloc_purex_item() function may return a pre-allocated item from a per-adapter pool for small allocatio
debian
CVE-2025-40276LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-40276 [LOW] CVE-2025-40276: linux - In the Linux kernel, the following vulnerability has been resolved: drm/panthor...
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Flush shmem writes before mapping buffers CPU-uncached The shmem layer zeroes out the new pages using cached mappings, and if we don't CPU-flush we might leave dirty cachelines behind, leading to potential data leaks and/or asynchronous buffer corruption when dirty cachelines are evicted.
debian
CVE-2025-68368LOWfixed in linux 6.18.3-1 (forky)2025
CVE-2025-68368 [LOW] CVE-2025-68368: linux - In the Linux kernel, the following vulnerability has been resolved: md: init bi...
In the Linux kernel, the following vulnerability has been resolved: md: init bioset in mddev_init IO operations may be needed before md_run(), such as updating metadata after writing sysfs. Without bioset, this triggers a NULL pointer dereference as below: BUG: kernel NULL pointer dereference, address: 0000000000000020 Call Trace: md_update_sb+0x658/0xe00 new_level_sto
debian
CVE-2025-71145LOWCVSS 7.82025
CVE-2025-71145 [HIGH] CVE-2025-71145: linux - In the Linux kernel, the following vulnerability has been resolved: usb: phy: i...
In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF device reference imbalance A recent change fixing a device reference leak in a UDC driver introduced a potential use-after-free in the non-OF case as the isp1301_get_client() helper only increases the reference count for the returned I2C device in the OF case. Increment t
debian
CVE-2025-39926LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39926 [MEDIUM] CVE-2025-39926: linux - In the Linux kernel, the following vulnerability has been resolved: genetlink: ...
In the Linux kernel, the following vulnerability has been resolved: genetlink: fix genl_bind() invoking bind() after -EPERM Per family bind/unbind callbacks were introduced to allow families to track multicast group consumer presence, e.g. to start or stop producing events depending on listeners. However, in genl_bind() the bind() callback was invoked even if capabi
debian
CVE-2025-22094LOWCVSS 5.52025
CVE-2025-22094 [MEDIUM] CVE-2025-22094: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/per...
In the Linux kernel, the following vulnerability has been resolved: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' Commit 176cda0619b6 ("powerpc/perf: Add perf interface to expose vpa counters") introduced 'vpa_pmu' to expose Book3s-HV nested APIv2 provided L1L2 context switch latency counters to L1 user-space via perf-events. However the newly introduced PMU n
debian
CVE-2025-38130LOWCVSS 5.52025
CVE-2025-38130 [MEDIUM] CVE-2025-38130: linux - In the Linux kernel, the following vulnerability has been resolved: drm/connect...
In the Linux kernel, the following vulnerability has been resolved: drm/connector: only call HDMI audio helper plugged cb if non-null On driver remove, sound/soc/codecs/hdmi-codec.c calls the plugged_cb with NULL as the callback function and codec_dev, as seen in its hdmi_remove function. The HDMI audio helper then happily tries calling said null function pointer, a
debian
CVE-2025-68356LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68356 [LOW] CVE-2025-68356: linux - In the Linux kernel, the following vulnerability has been resolved: gfs2: Preve...
In the Linux kernel, the following vulnerability has been resolved: gfs2: Prevent recursive memory reclaim Function new_inode() returns a new inode with inode->i_mapping->gfp_mask set to GFP_HIGHUSER_MOVABLE. This value includes the __GFP_FS flag, so allocations in that address space can recurse into filesystem memory reclaim. We don't want that to happen because it ca
debian
CVE-2025-38508LOWCVSS 5.52025
CVE-2025-38508 [MEDIUM] CVE-2025-38508: linux - In the Linux kernel, the following vulnerability has been resolved: x86/sev: Us...
In the Linux kernel, the following vulnerability has been resolved: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation When using Secure TSC, the GUEST_TSC_FREQ MSR reports a frequency based on the nominal P0 frequency, which deviates slightly (typically ~0.2%) from the actual mean TSC frequency due to clocking parameters. Over extended VM uptime, this dis
debian
CVE-2025-38463LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38463 [MEDIUM] CVE-2025-38463: linux - In the Linux kernel, the following vulnerability has been resolved: tcp: Correc...
In the Linux kernel, the following vulnerability has been resolved: tcp: Correct signedness in skb remaining space calculation Syzkaller reported a bug [1] where sk->sk_forward_alloc can overflow. When we send data, if an skb exists at the tail of the write queue, the kernel will attempt to append the new data to that skb. However, the code that checks for available
debian
CVE-2025-38233LOWCVSS 7.82025
CVE-2025-38233 [HIGH] CVE-2025-38233: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc64/f...
In the Linux kernel, the following vulnerability has been resolved: powerpc64/ftrace: fix clobbered r15 during livepatching While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is not restored in livepatch sequence leading to not so obvious fails like below: BUG: Unable to handle kernel data access on write at 0xc0000000000f9078 Faulting instruction address:
debian
CVE-2025-38186LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38186 [MEDIUM] CVE-2025-38186: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi...
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start() Before the commit under the Fixes tag below, bnxt_ulp_stop() and bnxt_ulp_start() were always invoked in pairs. After that commit, the new bnxt_ulp_restart() can be invoked after bnxt_ulp_stop() has been called. This may result in th
debian
CVE-2025-38594LOWCVSS 7.82025
CVE-2025-38594 [HIGH] CVE-2025-38594: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d:...
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix UAF on sva unbind with pending IOPFs Commit 17fce9d2336d ("iommu/vt-d: Put iopf enablement in domain attach path") disables IOPF on device by removing the device from its IOMMU's IOPF queue when the last IOPF-capable domain is detached from the device. Unfortunately, it did this in a w
debian
CVE-2025-38271LOWCVSS 5.52025
CVE-2025-38271 [MEDIUM] CVE-2025-38271: linux - In the Linux kernel, the following vulnerability has been resolved: net: preven...
In the Linux kernel, the following vulnerability has been resolved: net: prevent a NULL deref in rtnl_create_link() At the time rtnl_create_link() is running, dev->netdev_ops is NULL, we must not use netdev_lock_ops() or risk a NULL deref if CONFIG_NET_SHAPER is defined. Use netif_set_group() instead of dev_set_group(). RIP: 0010:netdev_need_ops_lock include/net/net
debian
CVE-2025-39878LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39878 [MEDIUM] CVE-2025-39878: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: fix c...
In the Linux kernel, the following vulnerability has been resolved: ceph: fix crash after fscrypt_encrypt_pagecache_blocks() error The function move_dirty_folio_in_page_array() was created by commit ce80b76dd327 ("ceph: introduce ceph_process_folio_batch() method") by moving code from ceph_writepages_start() to this function. This new function is supposed to return
debian
CVE-2025-39804LOWCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39804 [HIGH] CVE-2025-39804: linux - In the Linux kernel, the following vulnerability has been resolved: lib/crypto:...
In the Linux kernel, the following vulnerability has been resolved: lib/crypto: arm64/poly1305: Fix register corruption in no-SIMD contexts Restore the SIMD usability check that was removed by commit a59e5468a921 ("crypto: arm64/poly1305 - Add block-only interface"). This safety check is cheap and is well worth eliminating a footgun. While the Poly1305 functions shoul
debian
CVE-2025-68326LOWfixed in linux 6.17.11-1 (forky)2025
CVE-2025-68326 [LOW] CVE-2025-68326: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc:...
In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is enabled to fix the following call stack: [] BUG: kernel NULL pointer dereference, address: 0000000000000000 [] Workqueue: drm_sched_run_job_work [gpu_sched] [] RIP: 0010:stack_depot_save_flags+0x172/0x
debian
CVE-2025-22091LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-22091 [MEDIUM] CVE-2025-22091: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: ...
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix page_size variable overflow Change all variables storing mlx5_umem_mkc_find_best_pgsz() result to unsigned long to support values larger than 31 and avoid overflow. For example: If we try to register 4GB of memory that is contiguous in physical memory, the driver will optimize the pag
debian