Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 114 of 665
CVE-2025-39872LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39872 [MEDIUM] CVE-2025-39872: linux - In the Linux kernel, the following vulnerability has been resolved: hsr: hold r...
In the Linux kernel, the following vulnerability has been resolved: hsr: hold rcu and dev lock for hsr_get_port_ndev hsr_get_port_ndev calls hsr_for_each_port, which need to hold rcu lock. On the other hand, before return the port device, we need to hold the device reference to avoid UaF in the caller function.
Scope: local
bookworm: resolved
bullseye: resolved
fork
debian
CVE-2025-40148LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40148 [LOW] CVE-2025-40148: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions The function dc_stream_set_cursor_attributes() currently dereferences the `stream` pointer and nested members `stream->ctx->dc->current_state` without checking for NULL. All callers of these functions, such as in `dcn30_ap
debian
CVE-2025-40175LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40175 [LOW] CVE-2025-40175: linux - In the Linux kernel, the following vulnerability has been resolved: idpf: clean...
In the Linux kernel, the following vulnerability has been resolved: idpf: cleanup remaining SKBs in PTP flows When the driver requests Tx timestamp value, one of the first steps is to clone SKB using skb_get. It increases the reference counter for that SKB to prevent unexpected freeing by another component. However, there may be a case where the index is requested, SKB
debian
CVE-2025-38509LOWCVSS 5.52025
CVE-2025-38509 [MEDIUM] CVE-2025-38509: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: reject VHT opmode for unsupported channel widths VHT operating mode notifications are not defined for channel widths below 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the VHT specification and must be rejected. Without this check, malformed notifications using these w
debian
CVE-2025-37888LOWCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37888 [MEDIUM] CVE-2025-37888: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: F...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table() Add NULL check for mlx5_get_flow_namespace() returns in mlx5_create_inner_ttc_table() and mlx5_create_ttc_table() to prevent NULL pointer dereference.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.12.27
debian
CVE-2025-40221LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40221 [LOW] CVE-2025-40221: linux - In the Linux kernel, the following vulnerability has been resolved: media: pci:...
In the Linux kernel, the following vulnerability has been resolved: media: pci: mg4b: fix uninitialized iio scan data Fix potential leak of uninitialized stack data to userspace by ensuring that the `scan` structure is zeroed before use.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.17.6-1)
sid: resolved (fixed in 6.17.6-1)
trixie: reso
debian
CVE-2025-68253LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-68253 [LOW] CVE-2025-68253: linux - In the Linux kernel, the following vulnerability has been resolved: mm: don't s...
In the Linux kernel, the following vulnerability has been resolved: mm: don't spin in add_stack_record when gfp flags don't allow syzbot was able to find the following path: add_stack_record_to_list mm/page_owner.c:182 [inline] inc_stack_record_count mm/page_owner.c:214 [inline] __set_page_owner+0x2c3/0x4a0 mm/page_owner.c:333 set_page_owner include/linux/page_owner.h:
debian
CVE-2025-71231LOWCVSS 7.1fixed in linux 6.18.12-1 (forky)2025
CVE-2025-71231 [HIGH] CVE-2025-71231: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: iaa...
In the Linux kernel, the following vulnerability has been resolved: crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode The local variable 'i' is initialized with -EINVAL, but the for loop immediately overwrites it and -EINVAL is never returned. If no empty compression mode can be found, the function would return the out-of-bounds index IAA_COMP_M
debian
CVE-2025-39729LOWCVSS 5.52025
CVE-2025-39729 [MEDIUM] CVE-2025-39729: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: ccp...
In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Fix dereferencing uninitialized error pointer Fix below smatch warnings: drivers/crypto/ccp/sev-dev.c:1312 __sev_platform_init_locked() error: we previously assumed 'error' could be null
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-22087LOWCVSS 7.1fixed in linux 6.12.25-1 (forky)2025
CVE-2025-22087 [HIGH] CVE-2025-22087: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ar...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix array bounds error with may_goto may_goto uses an additional 8 bytes on the stack, which causes the interpreters[] array to go out of bounds when calculating index by stack_size. 1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT cases, reject loading directly. 2. For n
debian
CVE-2025-21813LOWCVSS 5.5fixed in linux 6.12.15-1 (forky)2025
CVE-2025-21813 [MEDIUM] CVE-2025-21813: linux - In the Linux kernel, the following vulnerability has been resolved: timers/migr...
In the Linux kernel, the following vulnerability has been resolved: timers/migration: Fix off-by-one root mis-connection Before attaching a new root to the old root, the children counter of the new root is checked to verify that only the upcoming CPU's top group have been connected to it. However since the recently added commit b729cc1ec21a ("timers/migration: Fix a
debian
CVE-2025-38242LOWCVSS 4.7fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38242 [MEDIUM] CVE-2025-38242: linux - In the Linux kernel, the following vulnerability has been resolved: mm: userfau...
In the Linux kernel, the following vulnerability has been resolved: mm: userfaultfd: fix race of userfaultfd_move and swap cache This commit fixes two kinds of races, they may have different results: Barry reported a BUG_ON in commit c50f8e6053b0, we may see the same BUG_ON if the filemap lookup returned NULL and folio is added to swap cache after that. If another k
debian
CVE-2025-40177LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40177 [LOW] CVE-2025-40177: linux - In the Linux kernel, the following vulnerability has been resolved: accel/qaic:...
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix bootlog initialization ordering As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need to be setup prior to queuing the buffers. We currently initialize some of the resources after
debian
CVE-2025-39903LOWCVSS 5.5fixed in linux 6.16.6-1 (forky)2025
CVE-2025-39903 [MEDIUM] CVE-2025-39903: linux - In the Linux kernel, the following vulnerability has been resolved: of_numa: fi...
In the Linux kernel, the following vulnerability has been resolved: of_numa: fix uninitialized memory nodes causing kernel panic When there are memory-only nodes (nodes without CPUs), these nodes are not properly initialized, causing kernel panic during boot. of_numa_init of_numa_parse_cpu_nodes node_set(nid, numa_nodes_parsed); of_numa_parse_memory_nodes In of_numa
debian
CVE-2025-38504LOWCVSS 5.52025
CVE-2025-38504 [MEDIUM] CVE-2025-38504: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/zc...
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix pp destruction warnings With multiple page pools and in some other cases we can have allocated niovs on page pool destruction. Remove a misplaced warning checking that all niovs are returned to zcrx on io_pp_zc_destroy(). It was reported before but apparently got lost.
Scope: loca
debian
CVE-2025-39769LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39769 [MEDIUM] CVE-2025-39769: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi...
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix lockdep warning during rmmod The commit under the Fixes tag added a netdev_assert_locked() in bnxt_free_ntp_fltrs(). The lock should be held during normal run-time but the assert will be triggered (see below) during bnxt_remove_one() which should not need the lock. The netdev is already
debian
CVE-2025-68222LOWfixed in linux 6.17.10-1 (forky)2025
CVE-2025-68222 [LOW] CVE-2025-68222: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: s3...
In the Linux kernel, the following vulnerability has been resolved: pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc s32_pinctrl_desc is allocated with devm_kmalloc(), but not all of its fields are initialized. Notably, num_custom_params is used in pinconf_generic_parse_dt_config(), resulting in intermittent allocation errors, such as the following splat wh
debian
CVE-2025-38641LOWCVSS 5.52025
CVE-2025-38641 [MEDIUM] CVE-2025-38641: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure Avoid potential NULL pointer dereference by checking the return value of kmalloc and handling allocation failure properly.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-21869LOWCVSS 7.8fixed in linux 6.12.17-1 (forky)2025
CVE-2025-21869 [HIGH] CVE-2025-21869: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/cod...
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] ================================================================== [ 12.028198] BUG: KASAN: user-memory-access in copy_to_kernel_nofau
debian
CVE-2025-71080LOWCVSS 5.5fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71080 [MEDIUM] CVE-2025-71080: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: fix a...
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the current task can be preempted. Another task running on the same CPU may then execute rt6_make_pcpu_route() and successfully install a pcpu_rt entry. When the first task resume
debian