Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 116 of 665
CVE-2025-38224LOWCVSS 7.1fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38224 [HIGH] CVE-2025-38224: linux - In the Linux kernel, the following vulnerability has been resolved: can: kvaser...
In the Linux kernel, the following vulnerability has been resolved: can: kvaser_pciefd: refine error prone echo_skb_max handling logic echo_skb_max should define the supported upper limit of echo_skb[] allocated inside the netdevice's priv. The corresponding size value provided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT which is 17. But later e
debian
CVE-2025-21879LOWCVSS 7.82025
CVE-2025-21879 [HIGH] CVE-2025-21879: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free on inode when scanning root during em shrinking At btrfs_scan_root() we are accessing the inode's root (and fs_info) in a call to btrfs_fs_closing() after we have scheduled the inode for a delayed iput, and that can result in a use-after-free on the inode in case the cleaner
debian
CVE-2025-39930LOWCVSS 5.52025
CVE-2025-39930 [MEDIUM] CVE-2025-39930: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: simpl...
In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() commit 419d1918105e ("ASoC: simple-card-utils: use __free(device_node) for device node") uses __free(device_node) for dlc->of_node, but we need to keep it while driver is in use. Don't use __free(device_node) in graph_u
debian
CVE-2025-21940LOWCVSS 5.5fixed in linux 6.12.19-1 (forky)2025
CVE-2025-21940 [MEDIUM] CVE-2025-21940: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix NULL Pointer Dereference in KFD queue Through KFD IOCTL Fuzzing we encountered a NULL pointer derefrence when calling kfd_queue_acquire_buffers. (cherry picked from commit 049e5bf3c8406f87c3d8e1958e0a16804fa1d530)
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fi
debian
CVE-2025-68210LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68210 [LOW] CVE-2025-68210: linux - In the Linux kernel, the following vulnerability has been resolved: erofs: avoi...
In the Linux kernel, the following vulnerability has been resolved: erofs: avoid infinite loop due to incomplete zstd-compressed data Currently, the decompression logic incorrectly spins if compressed data is truncated in crafted (deliberately corrupted) images.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.17.9-1)
sid: resolved (fixed
debian
CVE-2025-21868LOWCVSS 5.5fixed in linux 6.12.17-1 (forky)2025
CVE-2025-21868 [MEDIUM] CVE-2025-21868: linux - In the Linux kernel, the following vulnerability has been resolved: net: allow ...
In the Linux kernel, the following vulnerability has been resolved: net: allow small head cache usage with large MAX_SKB_FRAGS values Sabrina reported the following splat: WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_locked+0x8f2/0xba0 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.14.0-rc1-net-00092-g011b03359038 #996 H
debian
CVE-2025-21882LOWCVSS 5.52025
CVE-2025-21882 [MEDIUM] CVE-2025-21882: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: F...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix vport QoS cleanup on error When enabling vport QoS fails, the scheduling node was never freed, causing a leak. Add the missing free and reset the vport scheduling node pointer to NULL.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-22016LOWCVSS 5.5fixed in linux 6.12.21-1 (forky)2025
CVE-2025-22016 [MEDIUM] CVE-2025-22016: linux - In the Linux kernel, the following vulnerability has been resolved: dpll: fix x...
In the Linux kernel, the following vulnerability has been resolved: dpll: fix xa_alloc_cyclic() error handling In case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will be returned, which will cause IS_ERR() to be false. Which can lead to dereference not allocated pointer (pin). Fix it by checking if err is lower than zero. This wasn't found in real u
debian
CVE-2025-39979LOWfixed in linux 6.16.10-1 (forky)2025
CVE-2025-39979 [LOW] CVE-2025-39979: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: f...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, fix UAF in flow counter release Fix a kernel trace [1] caused by releasing an HWS action of a local flow counter in mlx5_cmd_hws_delete_fte(), where the HWS action refcount and mutex were not initialized and the counter struct could already be freed when deleting the rule. Fix it by addin
debian
CVE-2025-40216LOWfixed in linux 6.12.37-1 (forky)2025
CVE-2025-40216 [LOW] CVE-2025-40216: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/rs...
In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: don't rely on user vaddr alignment There is no guaranteed alignment for user pointers, however the calculation of an offset of the first page into a folio after coalescing uses some weird bit mask logic, get rid of it.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (f
debian
CVE-2025-38137LOWCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38137 [HIGH] CVE-2025-38137: linux - In the Linux kernel, the following vulnerability has been resolved: PCI/pwrctrl...
In the Linux kernel, the following vulnerability has been resolved: PCI/pwrctrl: Cancel outstanding rescan work when unregistering It's possible to trigger use-after-free here by: (a) forcing rescan_work_func() to take a long time and (b) utilizing a pwrctrl driver that may be unloaded for some reason Cancel outstanding work to ensure it is finished before we allow ou
debian
CVE-2025-39786LOWCVSS 7.1fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39786 [HIGH] CVE-2025-39786: linux - In the Linux kernel, the following vulnerability has been resolved: iio: adc: a...
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7173: fix channels index for syscalib_mode Fix the index used to look up the channel when accessing the syscalib_mode attribute. The address field is a 0-based index (same as scan_index) that it used to access the channel in the ad7173_channels array throughout the driver. The channels fie
debian
CVE-2025-37988LOWCVSS 4.7fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37988 [MEDIUM] CVE-2025-37988: linux - In the Linux kernel, the following vulnerability has been resolved: fix a coupl...
In the Linux kernel, the following vulnerability has been resolved: fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount() Normally do_lock_mount(path, _) is locking a mountpoint pinned by *path and at the time when matching unlock_mount() unlocks that location it is still pinned by the same thing. Unfortunately, for 'beneath' case it's no longer that
debian
CVE-2025-37935LOWCVSS 5.5fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37935 [MEDIUM] CVE-2025-37935: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern...
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM If the mtk_poll_rx() function detects the MTK_RESETTING flag, it will jump to release_desc and refill the high word of the SDP on the 4GB RFB. Subsequently, mtk_rx_clean will process an incorrect SDP, leading to a panic. Add patch from MediaTek
debian
CVE-2025-40189LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40189 [LOW] CVE-2025-40189: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: l...
In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_raw_eeprom Syzbot reported read of uninitialized variable BUG with following call stack. lan78xx 8-1:1.0 (unnamed net_device) (uninitialized): EEPROM read operation timeout ================================================
debian
CVE-2025-38110LOWCVSS 7.1fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38110 [HIGH] CVE-2025-38110: linux - In the Linux kernel, the following vulnerability has been resolved: net/mdiobus...
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via C45 (clause 45) mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. C
debian
CVE-2025-39837LOWCVSS 7.8fixed in linux 6.16.6-1 (forky)2025
CVE-2025-39837 [HIGH] CVE-2025-39837: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: asus-wmi: Fix racy registrations asus_wmi_register_driver() may be called from multiple drivers concurrently, which can lead to the racy list operations, eventually corrupting the memory and hitting Oops on some ASUS machines. Also, the error handling is missing, and it forgot to unregis
debian
CVE-2025-68353LOWfixed in linux 6.18.3-1 (forky)2025
CVE-2025-68353 [LOW] CVE-2025-68353: linux - In the Linux kernel, the following vulnerability has been resolved: net: vxlan:...
In the Linux kernel, the following vulnerability has been resolved: net: vxlan: prevent NULL deref in vxlan_xmit_one Neither sock4 nor sock6 pointers are guaranteed to be non-NULL in vxlan_xmit_one, e.g. if the iface is brought down. This can lead to the following NULL dereference: BUG: kernel NULL pointer dereference, address: 0000000000000010 Oops: Oops: 0000 [#1] SM
debian
CVE-2025-21789LOWCVSS 7.1fixed in linux 6.12.16-1 (forky)2025
CVE-2025-21789 [HIGH] CVE-2025-21789: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...
In the Linux kernel, the following vulnerability has been resolved: LoongArch: csum: Fix OoB access in IP checksum code for negative lengths Commit 69e3a6aa6be2 ("LoongArch: Add checksum optimization for 64-bit system") would cause an undefined shift and an out-of-bounds read. Commit 8bd795fedb84 ("arm64: csum: Fix OoB access in IP checksum code for negative lengths")
debian
CVE-2025-22013LOWCVSS 5.5fixed in linux 6.12.21-1 (forky)2025
CVE-2025-22013 [MEDIUM] CVE-2025-22013: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: arm64:...
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the host's FPSIMD/SVE state, including: * Host SVE being discarded unexpectedly due to inconsistent configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to result
debian