Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 119 of 665
CVE-2025-38674LOWCVSS 5.52025
CVE-2025-38674 [MEDIUM] CVE-2025-38674: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "drm... In the Linux kernel, the following vulnerability has been resolved: Revert "drm/prime: Use dma_buf from GEM object instance" This reverts commit f83a9b8c7fd0557b0c50784bfdc1bbe9140c9bf8. The dma_buf field in struct drm_gem_object is not stable over the object instance's lifetime. The field becomes NULL when user space releases the final GEM handle on the buffer obje
debian
CVE-2025-71187LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2025
CVE-2025-71187 [MEDIUM] CVE-2025-71187: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: sh: rz-dmac: fix device leak on probe failure Make sure to drop the reference taken when looking up the ICU device during probe also on probe failures (e.g. probe deferral). Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 6.18.8-1) sid: resolved (fixed in 6.18
debian
CVE-2025-38306LOWCVSS 4.7fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38306 [MEDIUM] CVE-2025-38306: linux - In the Linux kernel, the following vulnerability has been resolved: fs/fhandle.... In the Linux kernel, the following vulnerability has been resolved: fs/fhandle.c: fix a race in call of has_locked_children() may_decode_fh() is calling has_locked_children() while holding no locks. That's an oopsable race... The rest of the callers are safe since they are holding namespace_sem and are guaranteed a positive refcount on the mount in question. Rename
debian
CVE-2025-38532LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38532 [MEDIUM] CVE-2025-38532: linux - In the Linux kernel, the following vulnerability has been resolved: net: libwx:... In the Linux kernel, the following vulnerability has been resolved: net: libwx: properly reset Rx ring descriptor When device reset is triggered by feature changes such as toggling Rx VLAN offload, wx->do_reset() is called to reinitialize Rx rings. The hardware descriptor ring may retain stale values from previous sessions. And only set the length to 0 in rx_desc[0]
debian
CVE-2025-38087LOWCVSS 7.8fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38087 [HIGH] CVE-2025-38087: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this. Scope: local bookworm: resolved b
debian
CVE-2025-22120LOWCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-22120 [MEDIUM] CVE-2025-22120: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: goto ... In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unlock mapping->invalidate_lock. Like this: EXT4-fs error (device sda) in ext4_setattr:5557: Out of memory INFO: task fs
debian
CVE-2025-68234LOWfixed in linux 6.17.10-1 (forky)2025
CVE-2025-68234 [LOW] CVE-2025-68234: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/cm... In the Linux kernel, the following vulnerability has been resolved: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of
debian
CVE-2025-38730LOWCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38730 [HIGH] CVE-2025-38730: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/ne... In the Linux kernel, the following vulnerability has been resolved: io_uring/net: commit partial buffers on retry Ring provided buffers are potentially only valid within the single execution context in which they were acquired. io_uring deals with this and invalidates them on retry. But on the networking side, if MSG_WAITALL is set, or if the socket is of the streamin
debian
CVE-2025-39997LOWfixed in linux 6.16.11-1 (forky)2025
CVE-2025-39997 [LOW] CVE-2025-39997: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free The previous commit 0718a78f6a9f ("ALSA: usb-audio: Kill timer properly at removal") patched a UAF issue caused by the error timer. However, because the error timer kill added in this patch occurs after the endpoint delete, a race condition
debian
CVE-2025-38475LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38475 [MEDIUM] CVE-2025-38475: linux - In the Linux kernel, the following vulnerability has been resolved: smc: Fix va... In the Linux kernel, the following vulnerability has been resolved: smc: Fix various oops due to inet_sock type confusion. syzbot reported weird splats [0][1] in cipso_v4_sock_setattr() while freeing inet_sk(sk)->inet_opt. The address was freed multiple times even though it was read-only memory. cipso_v4_sock_setattr() did nothing wrong, and the root cause was type
debian
CVE-2025-71157LOWCVSS 7.8fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71157 [HIGH] CVE-2025-71157: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/core: ... In the Linux kernel, the following vulnerability has been resolved: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() Since nldev_deldev() (introduced by commit 060c642b2ab8 ("RDMA/nldev: Add support to add/delete a sub IB device through netlink") grabs a reference using ib_device_get_by_index() before calling ib_del_sub_device_and_put(), we need t
debian
CVE-2025-68240LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68240 [LOW] CVE-2025-68240: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: avo... In the Linux kernel, the following vulnerability has been resolved: nilfs2: avoid having an active sc_timer before freeing sci Because kthread_stop did not stop sc_task properly and returned -EINTR, the sc_timer was not properly closed, ultimately causing the problem [1] reported by syzbot when freeing sci due to the sc_timer not being closed. Because the thread sc_tas
debian
CVE-2025-39704LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39704 [MEDIUM] CVE-2025-39704: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ... In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix stack protector issue in send_ipi_data() Function kvm_io_bus_read() is called in function send_ipi_data(), buffer size of parameter *val should be at least 8 bytes. Since some emulation functions like loongarch_ipi_readl() and kvm_eiointc_read() will write the buffer *val with 8
debian
CVE-2025-37944LOWCVSS 7.8fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37944 [HIGH] CVE-2025-37944: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12... In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process Currently, ath12k_dp_mon_srng_process uses ath12k_hal_srng_src_get_next_entry to fetch the next entry from the destination ring. This is incorrect because ath12k_hal_srng_src_get_next_entry is intended for source rings, not destinatio
debian
CVE-2025-68317LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68317 [LOW] CVE-2025-68317: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/zc... In the Linux kernel, the following vulnerability has been resolved: io_uring/zctx: check chained notif contexts Send zc only links ubuf_info for requests coming from the same context. There are some ambiguous syz reports, so let's check the assumption on notification completion. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 6.17.8-1) sid:
debian
CVE-2025-40162LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40162 [LOW] CVE-2025-40162: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: amd/s... In the Linux kernel, the following vulnerability has been resolved: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails devm_kasprintf() may return NULL on memory allocation failure, but the debug message prints cpus->dai_name before checking it. Move the dev_dbg() call after the NULL check to prevent potential NULL pointer dereference. Scope: local bookw
debian
CVE-2025-40329LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40329 [LOW] CVE-2025-40329: linux - In the Linux kernel, the following vulnerability has been resolved: drm/sched: ... In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb The Mesa issue referenced below pointed out a possible deadlock: [ 1231.611031] Possible interrupt unsafe locking scenario: [ 1231.611033] CPU0 CPU1 [ 1231.611034] ---- ---- [ 1231.611035] lock(&xa->xa_lock#17); [ 1231.611038] local_irq_disable()
debian
CVE-2025-39906LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39906 [MEDIUM] CVE-2025-39906: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: remove oem i2c adapter on finish Fixes a bug where unbinding of the GPU would leave the oem i2c adapter registered resulting in a null pointer dereference when applications try to access the invalid device. (cherry picked from commit 89923fb7ead4fdd37b78dd49962d9bb5892403e6) Scope:
debian
CVE-2025-68329LOWfixed in linux 6.17.11-1 (forky)2025
CVE-2025-68329 [LOW] CVE-2025-68329: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Fi... In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel calls vm_ops->close on each portion. For trace buffer mappings, this results in ring_buffer_unmap() being called multiple times while ring_buffer_map() was only calle
debian
CVE-2025-40344LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40344 [LOW] CVE-2025-40344: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel... In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: avs: Disable periods-elapsed work when closing PCM avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio stream while period-elapsed work services its IRQs. As the former frees the DAI's private context, these two operations shall be synchronized to avoid slab-use-after-fre
debian