Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 30 of 665
CVE-2025-39944HIGHCVSS 7.8fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39944 [HIGH] CVE-2025-39944: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-p... In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() The original code relies on cancel_delayed_work() in otx2_ptp_destroy(), which does not ensure that the delayed work item synctstamp_work has fully completed if it was already running. This leads to use-after-free scenarios where otx2_ptp is
debian
CVE-2025-71238HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-71238 [HIGH] CVE-2025-71238: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: qla2x... In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] P
debian
CVE-2025-38428HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38428 [HIGH] CVE-2025-38428: linux - In the Linux kernel, the following vulnerability has been resolved: Input: ims-... In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);" Scop
debian
CVE-2025-40082HIGHCVSS 7.1fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-40082 [HIGH] CVE-2025-40082: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi... In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186 Read of size 2 at addr ffff8880289ef218 by task syz.6.248/14290 CPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full) Hardware name: Q
debian
CVE-2025-39967HIGHCVSS 7.8fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39967 [HIGH] CVE-2025-39967: linux - In the Linux kernel, the following vulnerability has been resolved: fbcon: fix ... In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulnerabilities occur when: 1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount mult
debian
CVE-2025-38146HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38146 [HIGH] CVE-2025-38146: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs... In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix the dead loop of MPLS parse The unexpected MPLS packet may not end with the bottom label stack. When there are many stacks, The label count value has wrapped around. A dead loop occurs, soft lockup/CPU stuck finally. stack backtrace: UBSAN: array-index-out-of-bounds in /build/lin
debian
CVE-2025-38211HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38211 [HIGH] CVE-2025-38211: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: ... In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_c
debian
CVE-2025-38230HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38230 [HIGH] CVE-2025-38230: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: valida... In the Linux kernel, the following vulnerability has been resolved: jfs: validate AG parameters in dbMount() to prevent crashes Validate db_agheight, db_agwidth, and db_agstart in dbMount to catch corrupted metadata early and avoid undefined behavior in dbAllocAG. Limits are derived from L2LPERCTL, LPERCTL/MAXAG, and CTLTREESIZE: - agheight: 0 to L2LPERCTL/2 (0 to 5)
debian
CVE-2025-39806HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39806 [HIGH] CVE-2025-39806: linux - In the Linux kernel, the following vulnerability has been resolved: HID: multit... In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() A malicious HID device can trigger a slab out-of-bounds during mt_report_fixup() by passing in report descriptor smaller than 607 bytes. mt_report_fixup() attempts to patch byte offset 607 of the descriptor with 0x25 by first checking
debian
CVE-2025-71073HIGHCVSS 7.8fixed in linux 6.18.3-1 (forky)2025
CVE-2025-71073 [HIGH] CVE-2025-71073: linux - In the Linux kernel, the following vulnerability has been resolved: Input: lkkb... In the Linux kernel, the following vulnerability has been resolved: Input: lkkbd - disable pending work before freeing device lkkbd_interrupt() schedules lk->tq via schedule_work(), and the work handler lkkbd_reinit() dereferences the lkkbd structure and its serio/input_dev fields. lkkbd_disconnect() and error paths in lkkbd_connect() free the lkkbd structure without
debian
CVE-2025-38548HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38548 [HIGH] CVE-2025-38548: linux - In the Linux kernel, the following vulnerability has been resolved: hwmon: (cor... In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd(). Scope: local bookworm: resolved (fixed in 6.1.147-1) bullseye: resolved (fixed in 5.10.244-1) forky: resolved (fixed in 6.16.3
debian
CVE-2025-38585HIGHCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38585 [HIGH] CVE-2025-38585: linux - In the Linux kernel, the following vulnerability has been resolved: staging: me... In the Linux kernel, the following vulnerability has been resolved: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() When gmin_get_config_var() calls efi.get_variable() and the EFI variable is larger than the expected buffer size, two behaviors combine to create a stack buffer overflow: 1. gmin_get_config_var() does not return the proper error
debian
CVE-2025-38618HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38618 [HIGH] CVE-2025-38618: linux - In the Linux kernel, the following vulnerability has been resolved: vsock: Do n... In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it w
debian
CVE-2025-37789HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37789 [HIGH] CVE-2025-37789: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs... In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first. Scope: local bookworm: resolved (fixed in 6.1.135-1) bullseye: resolved (fixed in 5.10.237-1) forky: res
debian
CVE-2025-38153HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38153 [HIGH] CVE-2025-38153: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: a... In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: fix error handling of usbnet read calls Syzkaller, courtesy of syzbot, identified an error (see report [1]) in aqc111 driver, caused by incomplete sanitation of usb read calls' results. This problem is quite similar to the one fixed in commit 920a9fa27e78 ("net: asix: add proper erro
debian
CVE-2025-21812HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21812 [HIGH] CVE-2025-21812: linux - In the Linux kernel, the following vulnerability has been resolved: ax25: rcu p... In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should remove ax25 RTNL dependency in ax25_setsockopt() This should also fix a variety of possible UAF in ax25. [1] WARNING: possible circular locking dependency detected 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not tainted ------
debian
CVE-2025-39689HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39689 [HIGH] CVE-2025-39689: linux - In the Linux kernel, the following vulnerability has been resolved: ftrace: Als... In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to its iterator. Unlike the writer that allocates a copy of the hash, the reader keeps the pointer to the filter hashes. This
debian
CVE-2025-38250HIGHCVSS 7.8fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38250 [HIGH] CVE-2025-38250: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported use-after-free in vhci_flush() without repro. [0] From the splat, a thread close()d a vhci file descriptor while its device was being used by iotcl() on another thread. Once the last fd refcnt is released, vhci_release() calls hci
debian
CVE-2025-21763HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21763 [HIGH] CVE-2025-21763: linux - In the Linux kernel, the following vulnerability has been resolved: neighbour: ... In the Linux kernel, the following vulnerability has been resolved: neighbour: use RCU protection in __neigh_notify() __neigh_notify() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF. Scope: local bookworm: resolved (fixed in 6.1.129-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.12.16-1) sid: resolved (
debian
CVE-2025-21999HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21999 [HIGH] CVE-2025-21999: linux - In the Linux kernel, the following vulnerability has been resolved: proc: fix U... In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/un
debian