Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 112 of 665
CVE-2025-39950LOWCVSS 5.5fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39950 [MEDIUM] CVE-2025-39950: linux - In the Linux kernel, the following vulnerability has been resolved: net/tcp: Fi... In the Linux kernel, the following vulnerability has been resolved: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR A NULL pointer dereference can occur in tcp_ao_finish_connect() during a connect() system call on a socket with a TCP-AO key added and TCP_REPAIR enabled. The function is called with skb being NULL and attempts to dereference
debian
CVE-2025-39917LOWCVSS 7.8fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39917 [HIGH] CVE-2025-39917: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ou... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt Stanislav reported that in bpf_crypto_crypt() the destination dynptr's size is not validated to be at least as large as the source dynptr's size before calling into the crypto backend with 'len = src_len'. This can result in an OOB write when the
debian
CVE-2025-22061LOWCVSS 5.52025
CVE-2025-22061 [MEDIUM] CVE-2025-22061: linux - In the Linux kernel, the following vulnerability has been resolved: net: airoha... In the Linux kernel, the following vulnerability has been resolved: net: airoha: Fix qid report in airoha_tc_get_htb_get_leaf_queue() Fix the following kernel warning deleting HTB offloaded leafs and/or root HTB qdisc in airoha_eth driver properly reporting qid in airoha_tc_get_htb_get_leaf_queue routine. $tc qdisc replace dev eth1 root handle 10: htb offload $tc cl
debian
CVE-2025-21659LOWCVSS 5.5fixed in linux 6.12.10-1 (forky)2025
CVE-2025-21659 [MEDIUM] CVE-2025-21659: linux - In the Linux kernel, the following vulnerability has been resolved: netdev: pre... In the Linux kernel, the following vulnerability has been resolved: netdev: prevent accessing NAPI instances from another namespace The NAPI IDs were not fully exposed to user space prior to the netlink API, so they were never namespaced. The netlink API must ensure that at the very least NAPI instance belongs to the same netns as the owner of the genl sock. napi_by
debian
CVE-2025-68293LOWfixed in linux 6.17.11-1 (forky)2025
CVE-2025-68293 [LOW] CVE-2025-68293: linux - In the Linux kernel, the following vulnerability has been resolved: mm/huge_mem... In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix NULL pointer deference when splitting folio Commit c010d47f107f ("mm: thp: split huge page to any lower order pages") introduced an early check on the folio's order via mapping->flags before proceeding with the split work. This check introduced a bug: for shmem folios in the swap ca
debian
CVE-2025-38589LOWCVSS 5.52025
CVE-2025-38589 [MEDIUM] CVE-2025-38589: linux - In the Linux kernel, the following vulnerability has been resolved: neighbour: ... In the Linux kernel, the following vulnerability has been resolved: neighbour: Fix null-ptr-deref in neigh_flush_dev(). kernel test robot reported null-ptr-deref in neigh_flush_dev(). [0] The cited commit introduced per-netdev neighbour list and converted neigh_flush_dev() to use it instead of the global hash table. One thing we missed is that neigh_table_clear() ca
debian
CVE-2025-38731LOWCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-38731 [HIGH] CVE-2025-38731: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix... In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix vm_bind_ioctl double free bug If the argument check during an array bind fails, the bind_ops are freed twice as seen below. Fix this by setting bind_ops to NULL after freeing. ================================================================== BUG: KASAN: double-free in xe_vm_bind_ioctl+0x1
debian
CVE-2025-38134LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38134 [MEDIUM] CVE-2025-38134: linux - In the Linux kernel, the following vulnerability has been resolved: usb: acpi: ... In the Linux kernel, the following vulnerability has been resolved: usb: acpi: Prevent null pointer dereference in usb_acpi_add_usb4_devlink() As demonstrated by the fix for update_port_device_state, commit 12783c0b9e2c ("usb: core: Prevent null pointer dereference in update_port_device_state"), usb_hub_to_struct_hub() can return NULL in certain scenarios, such as d
debian
CVE-2025-38302LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38302 [MEDIUM] CVE-2025-38302: linux - In the Linux kernel, the following vulnerability has been resolved: block: don'... In the Linux kernel, the following vulnerability has been resolved: block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work Bios queued up in the zone write plug have already gone through all all preparation in the submit_bio path, including the freeze protection. Submitting them through submit_bio_noacct_nocheck duplicates the work and can can cause d
debian
CVE-2025-40101LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40101 [LOW] CVE-2025-40101: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ... In the Linux kernel, the following vulnerability has been resolved: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST At the end of btrfs_load_block_group_zone_info() the first thing we do is to ensure that if the mapping type is not a SINGLE one and there is no RAID stripe tree, then we return early with an error. Doing that, though, prev
debian
CVE-2025-38452LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38452 [MEDIUM] CVE-2025-38452: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern... In the Linux kernel, the following vulnerability has been resolved: net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe() Add check for the return value of rcar_gen4_ptp_alloc() to prevent potential null pointer dereference. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 6.16.3-1) sid: resolved (fixed in 6.16.3-1) trixie:
debian
CVE-2025-21827LOWCVSS 5.5fixed in linux 6.12.13-1 (forky)2025
CVE-2025-21827 [MEDIUM] CVE-2025-21827: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface() The documentation for usb_driver_claim_interface() says that "the device lock" is needed when the function is called from places other than probe(). This appears to be the lock for the USB interface device. The Mediatek btusb cod
debian
CVE-2025-40034LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40034 [LOW] CVE-2025-40034: linux - In the Linux kernel, the following vulnerability has been resolved: PCI/AER: Av... In the Linux kernel, the following vulnerability has been resolved: PCI/AER: Avoid NULL pointer dereference in aer_ratelimit() When platform firmware supplies error information to the OS, e.g., via the ACPI APEI GHES mechanism, it may identify an error source device that doesn't advertise an AER Capability and therefore dev->aer_info, which contains AER stats and ratel
debian
CVE-2025-37746LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-37746 [MEDIUM] CVE-2025-37746: linux - In the Linux kernel, the following vulnerability has been resolved: perf/dwc_pc... In the Linux kernel, the following vulnerability has been resolved: perf/dwc_pcie: fix duplicate pci_dev devices During platform_device_register, wrongly using struct device pci_dev as platform_data caused a kmemdup copy of pci_dev. Worse still, accessing the duplicated device leads to list corruption as its mutex content (e.g., list, magic) remains the same as the
debian
CVE-2025-38642LOWCVSS 5.52025
CVE-2025-38642 [MEDIUM] CVE-2025-38642: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80... In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix WARN_ON for monitor mode on some devices On devices without WANT_MONITOR_VIF (and probably without channel context support) we get a WARN_ON for changing the per-link setting of a monitor interface. Since we already skip AP_VLAN interfaces and MONITOR with WANT_MONITOR_VIF and/or
debian
CVE-2025-21958LOWCVSS 4.7fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21958 [MEDIUM] CVE-2025-21958: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "ope... In the Linux kernel, the following vulnerability has been resolved: Revert "openvswitch: switch to per-action label counting in conntrack" Currently, ovs_ct_set_labels() is only called for confirmed conntrack entries (ct) within ovs_ct_commit(). However, if the conntrack entry does not have the labels_ext extension, attempting to allocate it in ovs_ct_get_conn_label
debian
CVE-2025-68212LOWfixed in linux 6.17.10-1 (forky)2025
CVE-2025-68212 [LOW] CVE-2025-68212: linux - In the Linux kernel, the following vulnerability has been resolved: fs: Fix uni... In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized 'offp' in statmount_string() In statmount_string(), most flags assign an output offset pointer (offp) which is later updated with the string offset. However, the STATMOUNT_MNT_UIDMAP and STATMOUNT_MNT_GIDMAP cases directly set the struct fields instead of using offp. This leaves o
debian
CVE-2025-38414LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38414 [MEDIUM] CVE-2025-38414: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12... In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850 GCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash on some specific platforms. Since this register is divergent for WCN7850 and QCN9274, move it to register table to allow different definitions. Then correct the reg
debian
CVE-2025-71103LOWCVSS 5.52025
CVE-2025-71103 [MEDIUM] CVE-2025-71103: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm: ad... In the Linux kernel, the following vulnerability has been resolved: drm/msm: adreno: fix deferencing ifpc_reglist when not declared On plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist if still deferenced in a7xx_patch_pwrup_reglist() which causes a kernel crash: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 ... p
debian
CVE-2025-39963LOWCVSS 7.8fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39963 [HIGH] CVE-2025-39963: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring: f... In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb function, there is a bug where prev_notif is incorrectly assigned using 'nd' instead of 'prev_nd'. This causes the context validation check to compare the current notification with itself instead of comparing it with the previous
debian