Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 28 of 665
CVE-2025-38497HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38497 [HIGH] CVE-2025-38497: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a che
debian
CVE-2025-23156HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-23156 [HIGH] CVE-2025-23156: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu... In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi_parser: refactor hfi packet parsing logic words_count denotes the number of words in total payload, while data points to payload of various property within it. When words_count reaches last word, data can access memory beyond the total payload. This can lead to OOB access. With this
debian
CVE-2025-21722HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21722 [HIGH] CVE-2025-21722: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: do ... In the Linux kernel, the following vulnerability has been resolved: nilfs2: do not force clear folio if buffer is referenced Patch series "nilfs2: protect busy buffer heads from being force-cleared". This series fixes the buffer head state inconsistency issues reported by syzbot that occurs when the filesystem is corrupted and falls back to read-only, and the associat
debian
CVE-2025-38422HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38422 [HIGH] CVE-2025-38422: linux - In the Linux kernel, the following vulnerability has been resolved: net: lan743... In the Linux kernel, the following vulnerability has been resolved: net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices Maximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb and 64 Kb respectively. Adjust max size definitions and return correct EEPROM length based on device. Also prevent out-of-bound read/write. Scope: local bookworm: res
debian
CVE-2025-39683HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39683 [HIGH] CVE-2025-39683: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Li... In the Linux kernel, the following vulnerability has been resolved: tracing: Limit access to parser->buffer when trace_get_user failed When the length of the string written to set_ftrace_filter exceeds FTRACE_BUFF_MAX, the following KASAN alarm will be triggered: BUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0 Read of size 1 at addr ffff0000d00bd5ba by task ash/1
debian
CVE-2025-22097HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22097 [HIGH] CVE-2025-22097: linux - In the Linux kernel, the following vulnerability has been resolved: drm/vkms: F... In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization
debian
CVE-2025-37952HIGHCVSS 7.8fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37952 [HIGH] CVE-2025-37952: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix ... In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix UAF in __close_file_table_ids A use-after-free is possible if one thread destroys the file via __ksmbd_close_fd while another thread holds a reference to it. The existing checks on fp->refcount are not sufficient to prevent this. The fix takes ft->lock around the section which removes the f
debian
CVE-2025-21734HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21734 [HIGH] CVE-2025-21734: linux - In the Linux kernel, the following vulnerability has been resolved: misc: fastr... In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix copy buffer page size For non-registered buffer, fastrpc driver copies the buffer and pass it to the remote subsystem. There is a problem with current implementation of page size calculation which is not considering the offset in the calculation. This might lead to passing of improp
debian
CVE-2025-21772HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21772 [HIGH] CVE-2025-21772: linux - In the Linux kernel, the following vulnerability has been resolved: partitions:... In the Linux kernel, the following vulnerability has been resolved: partitions: mac: fix handling of bogus partition table Fix several issues in partition probing: - The bailout for a bad partoffset must use put_dev_sector(), since the preceding read_part_sector() succeeded. - If the partition table claims a silly sector size like 0xfff bytes (which results in partiti
debian
CVE-2025-21726HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21726 [HIGH] CVE-2025-21726: linux - In the Linux kernel, the following vulnerability has been resolved: padata: avo... In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and ps UAF for _do_serial, it can not avoid potential UAF issue for reorder_work. This issue can happen just as below: crypto_request crypto_request crypto_del_alg padata_do_serial ... padata_reorder // processes all remaining
debian
CVE-2025-37927HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37927 [HIGH] CVE-2025-37927: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/amd: ... In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid There is a string parsing logic error which can lead to an overflow of hid or uid buffers. Comparing ACPIID_LEN against a total string length doesn't take into account the lengths of individual hid and uid buffers so the check is insuffici
debian
CVE-2025-37957HIGHCVSS 7.8fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37957 [HIGH] CVE-2025-37957: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: F... In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception Previously, commit ed129ec9057f ("KVM: x86: forcibly leave nested mode on vCPU reset") addressed an issue where a triple fault occurring in nested mode could lead to use-after-free scenarios. However, the commit did not handle the analogous si
debian
CVE-2025-22004HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-22004 [HIGH] CVE-2025-22004: linux - In the Linux kernel, the following vulnerability has been resolved: net: atm: f... In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free. Scope: local bookworm: resolved (fixed in 6.1.133-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.12.21-1) sid: resolved (fixed in 6
debian
CVE-2025-38679HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38679 [HIGH] CVE-2025-38679: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu... In the Linux kernel, the following vulnerability has been resolved: media: venus: Fix OOB read due to missing payload bound check Currently, The event_seq_changed() handler processes a variable number of properties sent by the firmware. The number of properties is indicated by the firmware and used to iterate over the payload. However, the payload size is not being va
debian
CVE-2025-39869HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39869 [HIGH] CVE-2025-39869: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insufficient memory. The code declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8), but allocated memory using
debian
CVE-2025-38530HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38530 [HIGH] CVE-2025-38530: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: pcl... In the Linux kernel, the following vulnerability has been resolved: comedi: pcl812: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: if ((1 options[1]) & board->irq_bits) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requir
debian
CVE-2025-38346HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38346 [HIGH] CVE-2025-38346: linux - In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix... In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix UAF when lookup kallsym after ftrace disabled The following issue happens with a buggy module: BUG: unable to handle page fault for address: ffffffffc05d0218 PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0 Oops: Oops: 0000 [#1] SMP KASAN PTI Tainted: [O]=OOT_MODULE, [E]=UNSIG
debian
CVE-2025-38729HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38729 [HIGH] CVE-2025-38729: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 power domain descriptors, too UAC3 power domain descriptors need to be verified with its variable bLength for avoiding the unexpected OOB accesses by malicious firmware, too. Scope: local bookworm: resolved (fixed in 6.1.153-1) bullseye: resolved (fixed in 5.10.244-1) fo
debian
CVE-2025-38286HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38286 [HIGH] CVE-2025-38286: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: at... In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91: Fix possible out-of-boundary access at91_gpio_probe() doesn't check that given OF alias is not available or something went wrong when trying to get it. This might have consequences when accessing gpio_chips array with that value as an index. Note, that BUG() can be compiled out and henc
debian
CVE-2025-68817HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68817 [HIGH] CVE-2025-68817: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ... In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it. Scope: local bookworm: resolved (fixed in 6.1.162-1) bullseye:
debian