Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 38 of 665
CVE-2025-39955HIGHCVSS 7.8fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39955 [HIGH] CVE-2025-39955: linux - In the Linux kernel, the following vulnerability has been resolved: tcp: Clear ...
In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSP
debian
CVE-2025-38555HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38555 [HIGH] CVE-2025-38555: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget...
In the Linux kernel, the following vulnerability has been resolved: usb: gadget : fix use-after-free in composite_dev_cleanup() 1. In func configfs_composite_bind() -> composite_os_desc_req_prepare(): if kmalloc fails, the pointer cdev->os_desc_req will be freed but not set to NULL. Then it will return a failure to the upper-level function. 2. in func configfs_composi
debian
CVE-2025-38077HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38077 [HIGH] CVE-2025-38077: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow. Add a check for an empty
debian
CVE-2025-37885HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37885 [HIGH] CVE-2025-37885: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: x86: R...
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reset IRTE to host control if *new* route isn't postable Restore an IRTE back to host control (remapped or posted MSI mode) if the *new* GSI route prevents posting the IRQ directly to a vCPU, regardless of the GSI routing type. Updating the IRTE if and only if the new GSI is an MSI results i
debian
CVE-2025-38464HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38464 [HIGH] CVE-2025-38464: linux - In the Linux kernel, the following vulnerability has been resolved: tipc: Fix u...
In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_conn_close(). syzbot reported a null-ptr-deref in tipc_conn_close() during netns dismantle. [0] tipc_topsrv_stop() iterates tipc_net(net)->topsrv->conn_idr and calls tipc_conn_close() for each tipc_conn. The problem is that tipc_conn_close() is called after releasing t
debian
CVE-2025-71071HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71071 [HIGH] CVE-2025-71071: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/media...
In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: fix use-after-free on probe deferral The driver is dropping the references taken to the larb devices during probe after successful lookup as well as on errors. This can potentially lead to a use-after-free in case a larb device has not yet been bound to its driver so that the iommu dri
debian
CVE-2025-38616HIGHCVSS 7.1fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38616 [HIGH] CVE-2025-38616: linux - In the Linux kernel, the following vulnerability has been resolved: tls: handle...
In the Linux kernel, the following vulnerability has been resolved: tls: handle data disappearing from under the TLS ULP TLS expects that it owns the receive queue of the TCP socket. This cannot be guaranteed in case the reader of the TCP socket entered before the TLS ULP was installed, or uses some non-standard read API (eg. zerocopy ones). Replace the WARN_ON() and
debian
CVE-2025-39943HIGHCVSS 7.1fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39943 [HIGH] CVE-2025-39943: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbd...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer If data_offset and data_length of smb_direct_data_transfer struct are invalid, out of bounds issue could happen. This patch validate data_offset and data_length field in recv_done.
Scope: local
bookworm: resolved
debian
CVE-2025-37923HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37923 [HIGH] CVE-2025-37923: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Fi...
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix oob write in trace_seq_to_buffer() syzbot reported this bug: ================================================================== BUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline] BUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 k
debian
CVE-2025-37921HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37921 [HIGH] CVE-2025-37921: linux - In the Linux kernel, the following vulnerability has been resolved: vxlan: vnif...
In the Linux kernel, the following vulnerability has been resolved: vxlan: vnifilter: Fix unlocked deletion of default FDB entry When a VNI is deleted from a VXLAN device in 'vnifilter' mode, the FDB entry associated with the default remote (assuming one was configured) is deleted without holding the hash lock. This is wrong and will result in a warning [1] being gene
debian
CVE-2025-40149HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-40149 [HIGH] CVE-2025-40149: linux - In the Linux kernel, the following vulnerability has been resolved: tls: Use __...
In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). get_netdev_for_sock() is called during setsockopt(), so not under RCU. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the only ->ndo_sk_get_lower_dev() user is bond_sk_get_lower_dev(
debian
CVE-2025-38369HIGHCVSS 7.8fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38369 [HIGH] CVE-2025-38369: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ...
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using Running IDXD workloads in a container with the /dev directory mounted can trigger a call trace or even a kernel panic when the parent process of the container is terminated. This issue occurs because, under certa
debian
CVE-2025-21979HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21979 [HIGH] CVE-2025-21979: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel wiphy_work before freeing wiphy A wiphy_work can be queued from the moment the wiphy is allocated and initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the rdev::wiphy_work is getting queued. If wiphy_free is called before the rdev::wiphy_work had a chance to run, th
debian
CVE-2025-38501HIGHCVSS 7.5fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38501 [HIGH] CVE-2025-38501: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: limi...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: limit repeated connections from clients with the same IP Repeated connections from clients with the same IP address may exhaust the max connections and prevent other normal client connections. This patch limit repeated connections from clients with the same IP.
Scope: local
bookworm: resolved (
debian
CVE-2025-37928HIGHCVSS 7.8PoCfixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37928 [HIGH] CVE-2025-37928: linux - In the Linux kernel, the following vulnerability has been resolved: dm-bufio: d...
In the Linux kernel, the following vulnerability has been resolved: dm-bufio: don't schedule in atomic context A BUG was reported as below when CONFIG_DEBUG_ATOMIC_SLEEP and try_verify_in_tasklet are enabled. [ 129.444685][ T934] BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2421 [ 129.444723][ T934] in_atomic(): 1, irqs_disabled(): 0, no
debian
CVE-2025-38313HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38313 [HIGH] CVE-2025-38313: linux - In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc...
In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: fix double-free on mc_dev The blamed commit tried to simplify how the deallocations are done but, in the process, introduced a double-free on the mc_dev variable. In case the MC device is a DPRC, a new mc_bus is allocated and the mc_dev variable is just a reference to one of its fields. I
debian
CVE-2025-39901HIGHCVSS 7.1fixed in linux 6.16.6-1 (forky)2025
CVE-2025-39901 [HIGH] CVE-2025-39901: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: remov...
In the Linux kernel, the following vulnerability has been resolved: i40e: remove read access to debugfs files The 'command' and 'netdev_ops' debugfs files are a legacy debugging interface supported by the i40e driver since its early days by commit 02e9c290814c ("i40e: debugfs interface"). Both of these debugfs files provide a read handler which is mostly useless, and
debian
CVE-2025-37776HIGHCVSS 7.0fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37776 [HIGH] CVE-2025-37776: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_break_all_levII_oplock() There is a room in smb_break_all_levII_oplock that can cause racy issues when unlocking in the middle of the loop. This patch use read lock to protect whole loop.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 6.12.25-
debian
CVE-2025-39710HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39710 [HIGH] CVE-2025-39710: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu...
In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a check to ensure that the packet size does not exceed the number of available words after reading the packet header from shared memory. This ensures that the size provided by the firmware is safe to process and prevent pot
debian
CVE-2025-71075HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71075 [HIGH] CVE-2025-71075: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: aic94...
In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() function fails to synchronize with pending tasklets before freeing the asd_ha structure, leading to a potential use-after-free vulnerability. When a device removal is triggered (via hot-unplug or module unload), race conditi
debian