Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 35 of 665
CVE-2025-39776HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39776 [HIGH] CVE-2025-39776: linux - In the Linux kernel, the following vulnerability has been resolved: mm/debug_vm...
In the Linux kernel, the following vulnerability has been resolved: mm/debug_vm_pgtable: clear page table entries at destroy_args() The mm/debug_vm_pagetable test allocates manually page table entries for the tests it runs, using also its manually allocated mm_struct. That in itself is ok, but when it exits, at destroy_args() it fails to clear those entries with the *
debian
CVE-2025-38563HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38563 [HIGH] CVE-2025-38563: linux - In the Linux kernel, the following vulnerability has been resolved: perf/core: ...
In the Linux kernel, the following vulnerability has been resolved: perf/core: Prevent VMA split of buffer mappings The perf mmap code is careful about mmap()'ing the user page with the ringbuffer and additionally the auxiliary buffer, when the event supports it. Once the first mapping is established, subsequent mapping have to use the same offset and the same size in
debian
CVE-2025-38361HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-38361 [HIGH] CVE-2025-38361: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check dce_hwseq before dereferencing it [WHAT] hws was checked for null earlier in dce110_blank_stream, indicating hws can be null, and should be checked whenever it is used. (cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)
Scope: local
bookworm: resolved (fixed in
debian
CVE-2025-38482HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38482 [HIGH] CVE-2025-38482: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: das...
In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ if ((1 options[1]) & 0x8cec) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could
debian
CVE-2025-21761HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21761 [HIGH] CVE-2025-21761: linux - In the Linux kernel, the following vulnerability has been resolved: openvswitch...
In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential UAF.
Scope: local
bookworm: resolved (fixed in 6.1.129-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: resolved (fixed in
debian
CVE-2025-38582HIGHCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38582 [HIGH] CVE-2025-38582: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: F...
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix double destruction of rsv_qp rsv_qp may be double destroyed in error flow, first in free_mr_init(), and then in hns_roce_exit(). Fix it by moving the free_mr_init() call into hns_roce_v2_init(). list_del corruption, ffff589732eb9b50->next is LIST_POISON1 (dead000000000100) WARNING: CPU:
debian
CVE-2025-21714HIGHCVSS 7.8fixed in linux 6.12.13-1 (forky)2025
CVE-2025-21714 [HIGH] CVE-2025-21714: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: ...
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix implicit ODP use after free Prevent double queueing of implicit ODP mr destroy work by using __xa_cmpxchg() to make sure this is the only time we are destroying this specific mr. Without this change, we could try to invalidate this mr twice, which in turn could result in queuing a MR wo
debian
CVE-2025-39877HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39877 [HIGH] CVE-2025-39877: linux - In the Linux kernel, the following vulnerability has been resolved: mm/damon/sy...
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: fix use-after-free in state_show() state_show() reads kdamond->damon_ctx without holding damon_sysfs_lock. This allows a use-after-free race: CPU 0 CPU 1 ----- ----- state_show() damon_sysfs_turn_damon_on() ctx = kdamond->damon_ctx; mutex_lock(&damon_sysfs_lock); damon_destroy_ctx(kdam
debian
CVE-2025-38377HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38377 [HIGH] CVE-2025-38377: linux - In the Linux kernel, the following vulnerability has been resolved: rose: fix d...
In the Linux kernel, the following vulnerability has been resolved: rose: fix dangling neighbour pointers in rose_rt_device_down() There are two bugs in rose_rt_device_down() that can cause use-after-free: 1. The loop bound `t->count` is modified within the loop, which can cause the loop to terminate early and miss some entries. 2. When removing an entry from the neig
debian
CVE-2025-39719HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39719 [HIGH] CVE-2025-39719: linux - In the Linux kernel, the following vulnerability has been resolved: iio: imu: b...
In the Linux kernel, the following vulnerability has been resolved: iio: imu: bno055: fix OOB access of hw_xlate array Fix a potential out-of-bounds array access of the hw_xlate array in bno055.c. In bno055_get_regmask(), hw_xlate was iterated over the length of the vals array instead of the length of the hw_xlate array. In the case of bno055_gyr_scale, the vals array
debian
CVE-2025-38342HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38342 [HIGH] CVE-2025-38342: linux - In the Linux kernel, the following vulnerability has been resolved: software no...
In the Linux kernel, the following vulnerability has been resolved: software node: Correct a OOB check in software_node_get_reference_args() software_node_get_reference_args() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed pr
debian
CVE-2025-38069HIGHCVSS 7.8fixed in linux 6.12.32-1 (forky)2025
CVE-2025-38069 [HIGH] CVE-2025-38069: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: endpoi...
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops Fix a kernel oops found while testing the stm32_pcie Endpoint driver with handling of PERST# deassertion: During EP initialization, pci_epf_test_alloc_space() allocates all BARs, which are further freed if epc_set_bar() fails (for
debian
CVE-2025-38323HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38323 [HIGH] CVE-2025-38323: linux - In the Linux kernel, the following vulnerability has been resolved: net: atm: a...
In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lecp[] uses from lecd_attach(), lec_vcc_attach() and lec_mcast_attach(). Following patch will use this mutex for /proc/net/atm
debian
CVE-2025-71137HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71137 [HIGH] CVE-2025-71137: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-p...
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" This patch ensures that the RX ring size (rx_pending) is not set below the permitted length. This avoids UBSAN shift-out-of-bounds errors when users passes small or zero ring sizes via ethtool -G.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
debian
CVE-2025-39738HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39738 [HIGH] CVE-2025-39738: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: do n...
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not allow relocation of partially dropped subvolumes [BUG] There is an internal report that balance triggered transaction abort, with the following call trace: item 85 key (594509824 169 0) itemoff 12599 itemsize 33 extent refs 1 gen 197740 flags 2 ref#0: tree block backref root 7 item 86 ke
debian
CVE-2025-37926HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-37926 [HIGH] CVE-2025-37926: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_session_rpc_open A UAF issue can occur due to a race condition between ksmbd_session_rpc_open() and __session_rpc_close(). Add rpc_lock to the session to protect it.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
bullseye: resolved
forky: resolved (fixed in 6.1
debian
CVE-2025-38198HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38198 [HIGH] CVE-2025-38198: linux - In the Linux kernel, the following vulnerability has been resolved: fbcon: Make...
In the Linux kernel, the following vulnerability has been resolved: fbcon: Make sure modelist not set on unregistered console It looks like attempting to write to the "store_modes" sysfs node will run afoul of unregistered consoles: UBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28 index -1 is out of range for type 'fb_info *[32]' ... fbcon_i
debian
CVE-2025-21739HIGHCVSS 7.8fixed in linux 6.12.15-1 (forky)2025
CVE-2025-21739 [HIGH] CVE-2025-21739: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths devm_blk_crypto_profile_init() registers a cleanup handler to run when the associated (platform-) device is being released. For UFS, the crypto private data and pointers are stored as part of the ufs_hba's data structure 'struct ufs_hb
debian
CVE-2025-39701HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39701 [HIGH] CVE-2025-39701: linux - In the Linux kernel, the following vulnerability has been resolved: ACPI: pfr_u...
In the Linux kernel, the following vulnerability has been resolved: ACPI: pfr_update: Fix the driver update version check The security-version-number check should be used rather than the runtime version check for driver updates. Otherwise, the firmware update would fail when the update binary had a lower runtime version number than the current one. [ rjw: Changelog ed
debian
CVE-2025-38476HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38476 [HIGH] CVE-2025-38476: linux - In the Linux kernel, the following vulnerability has been resolved: rpl: Fix us...
In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after skb_cow_head(), which is illegal as the header could be freed then. Let's fix it by making oldhdr to a
debian