Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 32 of 665
CVE-2025-21759HIGHCVSS 7.8fixed in linux 6.12.16-1 (forky)2025
CVE-2025-21759 [HIGH] CVE-2025-21759: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast...
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocatio
debian
CVE-2025-21914HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21914 [HIGH] CVE-2025-21914: linux - In the Linux kernel, the following vulnerability has been resolved: slimbus: me...
In the Linux kernel, the following vulnerability has been resolved: slimbus: messaging: Free transaction ID in delayed interrupt scenario In case of interrupt delay for any reason, slim_do_transfer() returns timeout error but the transaction ID (TID) is not freed. This results into invalid memory access inside qcom_slim_ngd_rx_msgq_cb() due to invalid TID. Fix the iss
debian
CVE-2025-39810HIGHCVSS 7.8fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39810 [HIGH] CVE-2025-39810: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi...
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix memory corruption when FW resources change during ifdown bnxt_set_dflt_rings() assumes that it is always called before any TC has been created. So it doesn't take bp->num_tc into account and assumes that it is always 0 or 1. In the FW resource or capability change scenario, the FW will re
debian
CVE-2025-38714HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38714 [HIGH] CVE-2025-38714: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi...
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() The hfsplus_bnode_read() method can trigger the issue: [ 174.852007][ T9784] ================================================================== [ 174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0x360 [ 174.853412][
debian
CVE-2025-38500HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38500 [HIGH] CVE-2025-38500: linux - In the Linux kernel, the following vulnerability has been resolved: xfrm: inter...
In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface collect_md property on xfrm interfaces can only be set on device creation, thus xfrmi_changelink() should fail when called on such interfaces. The check to enforce this was done only in the case where the xi was returned from
debian
CVE-2025-21947HIGHCVSS 8.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21947 [HIGH] CVE-2025-21947: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix type confusion via race condition when using ipc_msg_send_request req->handle is allocated using ksmbd_acquire_id(&ipc_ida), based on ida_alloc. req->handle from ksmbd_ipc_login_request and FSCTL_PIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion between messages, resulti
debian
CVE-2025-71112HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71112 [HIGH] CVE-2025-71112: linux - In the Linux kernel, the following vulnerability has been resolved: net: hns3: ...
In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VL
debian
CVE-2025-38068HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38068 [HIGH] CVE-2025-38068: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: lzo...
In the Linux kernel, the following vulnerability has been resolved: crypto: lzo - Fix compression buffer overrun Unlike the decompression code, the compression code in LZO never checked for output overruns. It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller. Add a safe compression interface tha
debian
CVE-2025-37738HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37738 [HIGH] CVE-2025-37738: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: ignor...
In the Linux kernel, the following vulnerability has been resolved: ext4: ignore xattrs past end Once inside 'ext4_xattr_inode_dec_ref_all' we should ignore xattrs entries past the 'end' entry. This fixes the following KASAN reported issue: ================================================================== BUG: KASAN: slab-use-after-free in ext4_xattr_inode_dec_ref_al
debian
CVE-2025-38552HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38552 [HIGH] CVE-2025-38552: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: plug...
In the Linux kernel, the following vulnerability has been resolved: mptcp: plug races between subflow fail and subflow creation We have races similar to the one addressed by the previous patch between subflow failing and additional subflow creation. They are just harder to trigger. The solution is similar. Use a separate flag to track the condition 'socket state preve
debian
CVE-2025-38718HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-38718 [HIGH] CVE-2025-38718: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: linea...
In the Linux kernel, the following vulnerability has been resolved: sctp: linearize cloned gso packets in sctp_rcv A cloned head skb still shares these frag skbs in fraglist with the original head skb. It's not safe to access these frag skbs. syzbot reported two use-of-uninitialized-memory bugs caused by this: BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net
debian
CVE-2025-39702HIGHCVSS 7.0fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39702 [HIGH] CVE-2025-39702: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: F...
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolved (fixed in 5.10.249-1)
forky: resolved (fixed in 6.16.5-1)
sid: re
debian
CVE-2025-21671HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21671 [HIGH] CVE-2025-21671: linux - In the Linux kernel, the following vulnerability has been resolved: zram: fix p...
In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table If zram_meta_alloc failed early, it frees allocated zram->table without setting it NULL. Which will potentially cause zram_meta_free to access the table if user reset an failed and uninitialized device.
Scope: local
bookworm: resolved (fixed in 6.1.128-1)
bullseye
debian
CVE-2025-37780HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37780 [HIGH] CVE-2025-37780: linux - In the Linux kernel, the following vulnerability has been resolved: isofs: Prev...
In the Linux kernel, the following vulnerability has been resolved: isofs: Prevent the use of too small fid syzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1] The handle_bytes value passed in by the reproducing program is equal to 12. In handle_to_path(), only 12 bytes of memory are allocated for the structure file_handle->f_handle member, which caus
debian
CVE-2025-39797HIGHCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-39797 [HIGH] CVE-2025-39797: linux - In the Linux kernel, the following vulnerability has been resolved: xfrm: Dupli...
In the Linux kernel, the following vulnerability has been resolved: xfrm: Duplicate SPI Handling The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI Netlink message, which triggers the kernel function xfrm_alloc_spi(). This function is expected to ensure uniqueness of the Security Parameter Index (SPI) for inbound Security Associations (SAs). However,
debian
CVE-2025-22038HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22038 [HIGH] CVE-2025-22038: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: vali...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read. This patch adds a validation step to ensure num_subauth != 0 before sub_auth is accessed.
Scope: local
bookworm: resolve
debian
CVE-2025-39889HIGHCVSS 8.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-39889 [HIGH] CVE-2025-39889: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: Check encryption key size on incoming connection This is required for passing GAP/SEC/SEM/BI-04-C PTS test case: Security Mode 4 Level 4, Responder - Invalid Encryption Key Size - 128 bit This tests the security key with size from 1 to 15 bytes while the Security Mode 4 Level 4 reque
debian
CVE-2025-21794HIGHCVSS 7.1fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21794 [HIGH] CVE-2025-21794: linux - In the Linux kernel, the following vulnerability has been resolved: HID: hid-th...
In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from hid-thrustmaster driver. This array is passed to usb_check_int_endpoints function from usb.c core driver, which executes a for loop that iterates
debian
CVE-2025-21905HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21905 [HIGH] CVE-2025-21905: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi...
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the
debian
CVE-2025-38280HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38280 [HIGH] CVE-2025-38280: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid ...
In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid __bpf_prog_ret0_warn when jit fails syzkaller reported an issue: WARNING: CPU: 3 PID: 217 at kernel/bpf/core.c:2357 __bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357 Modules linked in: CPU: 3 UID: 0 PID: 217 Comm: kworker/u32:6 Not tainted 6.15.0-rc4-syzkaller-00040-g8bac8898fe39 RIP: 00
debian