Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 40 of 665
CVE-2025-21703HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21703 [HIGH] CVE-2025-21703: linux - In the Linux kernel, the following vulnerability has been resolved: netem: Upda...
In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc before calling it. Otherwise it would miss the opportunity to call cops->qlen_notify(), in the ca
debian
CVE-2025-21920HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21920 [HIGH] CVE-2025-21920: linux - In the Linux kernel, the following vulnerability has been resolved: vlan: enfor...
In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_appl
debian
CVE-2025-38574HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38574 [HIGH] CVE-2025-38574: linux - In the Linux kernel, the following vulnerability has been resolved: pptp: ensur...
In the Linux kernel, the following vulnerability has been resolved: pptp: ensure minimal skb length in pptp_xmit() Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data on ppp_sync_txmung") fixed ppp_sync_txmunge() We need a similar fix in pptp_xmit(), otherwise we might read uninit data as reported by syzbot. BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x27
debian
CVE-2025-38636HIGHCVSS 7.1fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38636 [HIGH] CVE-2025-38636: linux - In the Linux kernel, the following vulnerability has been resolved: rv: Use str...
In the Linux kernel, the following vulnerability has been resolved: rv: Use strings in da monitors tracepoints Using DA monitors tracepoints with KASAN enabled triggers the following warning: BUG: KASAN: global-out-of-bounds in do_trace_event_raw_event_event_da_monitor+0xd6/0x1a0 Read of size 32 at addr ffffffffaada8980 by task ... Call Trace: [...] do_trace_event_raw
debian
CVE-2025-39952HIGHCVSS 7.8fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39952 [HIGH] CVE-2025-39952: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1...
In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: avoid buffer overflow in WID string configuration Fix the following copy overflow warning identified by Smatch checker. drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame() error: '__memcpy()' 'cfg->s[i]->str' copy overflow (512 vs 65537) This patch i
debian
CVE-2025-39870HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39870 [HIGH] CVE-2025-39870: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ...
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix double free in idxd_setup_wqs() The clean up in idxd_setup_wqs() has had a couple bugs because the error handling is a bit subtle. It's simpler to just re-write it in a cleaner way. The issues here are: 1) If "idxd->max_wqs" is <= 0 then we call put_device(conf_dev) when "conf_dev
debian
CVE-2025-38471HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38471 [HIGH] CVE-2025-38471: linux - In the Linux kernel, the following vulnerability has been resolved: tls: always...
In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-f
debian
CVE-2025-37777HIGHCVSS 7.8fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37777 [HIGH] CVE-2025-37777: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in __smb2_lease_break_noti() Move tcp_transport free to ksmbd_conn_free. If ksmbd connection is referenced when ksmbd server thread terminates, It will not be freed, but conn->tcp_transport is freed. __smb2_lease_break_noti can be performed asynchronously when the connection
debian
CVE-2025-38488HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38488 [HIGH] CVE-2025-38488: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in crypt_message when using async crypto The CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto operations are synchronous. However, when hardware crypto accelerators are used, this can cause use-after-free crashes: crypt_m
debian
CVE-2025-21631HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21631 [HIGH] CVE-2025-21631: linux - In the Linux kernel, the following vulnerability has been resolved: block, bfq:...
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958 Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726 CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0
debian
CVE-2025-38081HIGHCVSS 7.1fixed in linux 6.12.32-1 (forky)2025
CVE-2025-38081 [HIGH] CVE-2025-38081: linux - In the Linux kernel, the following vulnerability has been resolved: spi-rockchi...
In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 6.12.32-1)
sid: resolved (fixed in 6.12.32-1)
debian
CVE-2025-21718HIGHCVSS 7.0fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21718 [HIGH] CVE-2025-21718: linux - In the Linux kernel, the following vulnerability has been resolved: net: rose: ...
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix timer races against user threads Rose timers only acquire the socket spinlock, without checking if the socket is owned by one user thread. Add a check and rearm the timers if needed. BUG: KASAN: slab-use-after-free in rose_timer_expiry+0x31d/0x360 net/rose/rose_timer.c:174 Read of size
debian
CVE-2025-39730HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-39730 [HIGH] CVE-2025-39730: linux - In the Linux kernel, the following vulnerability has been resolved: NFS: Fix fi...
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.
Scope: local
bookworm: resolved (fixed in 6.1.148-1)
bullseye: resolved (fixed in 5.10.244-1)
forky: resolved (fixed in 6.16.3-1)
sid: resol
debian
CVE-2025-37838HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37838 [HIGH] CVE-2025-37838: linux - In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_pr...
In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work. If we remo
debian
CVE-2025-37797HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37797 [HIGH] CVE-2025-37797: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerabilit
debian
CVE-2025-38699HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38699 [HIGH] CVE-2025-38699: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo()
debian
CVE-2025-38728HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38728 [HIGH] CVE-2025-38728: linux - In the Linux kernel, the following vulnerability has been resolved: smb3: fix f...
In the Linux kernel, the following vulnerability has been resolved: smb3: fix for slab out of bounds on mount to ksmbd With KASAN enabled, it is possible to get a slab out of bounds during mount to ksmbd due to missing check in parse_server_interfaces() (see below): BUG: KASAN: slab-out-of-bounds in parse_server_interfaces+0x14ee/0x1880 [cifs] Read of size 4 at addr f
debian
CVE-2025-38052HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38052 [HIGH] CVE-2025-38052: linux - In the Linux kernel, the following vulnerability has been resolved: net/tipc: f...
In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ================================================================== BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840 Read of s
debian
CVE-2025-37810HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37810 [HIGH] CVE-2025-37810: linux - In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: ...
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-
debian
CVE-2025-21724HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21724 [HIGH] CVE-2025-21724: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd/iov...
In the Linux kernel, the following vulnerability has been resolved: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant "1" (of type int) by bitmap->mapped.pgshift (an unsigned long value) could result in undefined behavior. The constant "1"
debian