Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 47 of 665
CVE-2025-37977MEDIUMCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37977 [MEDIUM] CVE-2025-37977: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set If dma-coherent property isn't set then descriptors are non-cacheable and the iocc shareability bits should be disabled. Without this UFS can end up in an incompatible configuration and suffer from random cache related stability issu
debian
CVE-2025-21829MEDIUMCVSS 5.5fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21829 [MEDIUM] CVE-2025-21829: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F...
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" The Call Trace is as below: " ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+0x84/0xd0 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? report_bug+0x105/0x180 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x19/0x70 ? asm_
debian
CVE-2025-38202MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38202 [MEDIUM] CVE-2025-38202: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Check ...
In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpf_map_lookup_percpu_elem() will not be inlined. Using it in a sleepable bpf program will trigger the
debian
CVE-2025-21913MEDIUMCVSS 5.5fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21913 [MEDIUM] CVE-2025-21913: linux - In the Linux kernel, the following vulnerability has been resolved: x86/amd_nb:...
In the Linux kernel, the following vulnerability has been resolved: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() Xen doesn't offer MSR_FAM10H_MMIO_CONF_BASE to all guests. This results in the following warning: unchecked MSR access error: RDMSR from 0xc0010058 at rIP: 0xffffffff8101d19f (xen_do_read_msr+0x7f/0xa0) Call Trace: xen_read_msr+0x1e/0x30 amd_g
debian
CVE-2025-21696MEDIUMCVSS 5.5fixed in linux 6.12.11-1 (forky)2025
CVE-2025-21696 [MEDIUM] CVE-2025-21696: linux - In the Linux kernel, the following vulnerability has been resolved: mm: clear u...
In the Linux kernel, the following vulnerability has been resolved: mm: clear uffd-wp PTE/PMD state on mremap() When mremap()ing a memory region previously registered with userfaultfd as write-protected but without UFFD_FEATURE_EVENT_REMAP, an inconsistency in flag clearing leads to a mismatch between the vma flags (which have uffd-wp cleared) and the pte/pmd flags
debian
CVE-2025-38336MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38336 [MEDIUM] CVE-2025-38336: linux - In the Linux kernel, the following vulnerability has been resolved: ata: pata_v...
In the Linux kernel, the following vulnerability has been resolved: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 The controller has a hardware bug that can hard hang the system when doing ATAPI DMAs without any trace of what happened. Depending on the device attached, it can also prevent the system from booting. In this case, the system hangs when rea
debian
CVE-2025-38693MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38693 [MEDIUM] CVE-2025-38693: linux - In the Linux kernel, the following vulnerability has been resolved: media: dvb-...
In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar In w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity c
debian
CVE-2025-37841MEDIUMCVSS 5.5fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37841 [MEDIUM] CVE-2025-37841: linux - In the Linux kernel, the following vulnerability has been resolved: pm: cpupowe...
In the Linux kernel, the following vulnerability has been resolved: pm: cpupower: bench: Prevent NULL dereference on malloc failure If malloc returns NULL due to low memory, 'config' pointer can be NULL. Add a check to prevent NULL dereference.
Scope: local
bookworm: resolved (fixed in 6.1.135-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: resolved (fixed in 6.1
debian
CVE-2025-21682MEDIUMCVSS 5.5fixed in linux 6.12.11-1 (forky)2025
CVE-2025-21682 [MEDIUM] CVE-2025-21682: linux - In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: ...
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: always recalculate features after XDP clearing, fix null-deref Recalculate features when XDP is detached. Before: # ip li set dev eth0 xdp obj xdp_dummy.bpf.o sec xdp # ip li set dev eth0 xdp off # ethtool -k eth0 | grep gro rx-gro-hw: off [requested on] After: # ip li set dev eth0 xdp ob
debian
CVE-2025-37807MEDIUMCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37807 [MEDIUM] CVE-2025-37807: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix km...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix kmemleak warning for percpu hashmap Vlad Poenaru reported the following kmemleak issue: unreferenced object 0x606fd7c44ac8 (size 32): backtrace (crc 0): pcpu_alloc_noprof+0x730/0xeb0 bpf_map_alloc_percpu+0x69/0xc0 prealloc_init+0x9d/0x1b0 htab_map_alloc+0x363/0x510 map_create+0x215/0x3a0 __
debian
CVE-2025-38080MEDIUMCVSS 5.5fixed in linux 6.12.32-1 (forky)2025
CVE-2025-38080 [MEDIUM] CVE-2025-38080: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_sequence buffer and corrupts block_sequence_steps, causing a crash. [How]
debian
CVE-2025-71131MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71131 [MEDIUM] CVE-2025-71131: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: seq...
In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt As soon as crypto_aead_encrypt is called, the underlying request may be freed by an asynchronous completion. Thus dereferencing req->iv after it returns is invalid. Instead of checking req->iv against info, create a new variable unaligned_
debian
CVE-2025-38665MEDIUMCVSS 5.5fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38665 [MEDIUM] CVE-2025-38665: linux - In the Linux kernel, the following vulnerability has been resolved: can: netlin...
In the Linux kernel, the following vulnerability has been resolved: can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode Andrei Lalaev reported a NULL pointer deref when a CAN device is restarted from Bus Off and the driver does not implement the struct can_priv::do_set_mode callback. There are 2 code path that call struct can_priv:
debian
CVE-2025-39770MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39770 [MEDIUM] CVE-2025-39770: linux - In the Linux kernel, the following vulnerability has been resolved: net: gso: F...
In the Linux kernel, the following vulnerability has been resolved: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM When performing Generic Segmentation Offload (GSO) on an IPv6 packet that contains extension headers, the kernel incorrectly requests checksum offload if the egress device only advertises NETIF_F_IPV6_CSUM feature, which has a
debian
CVE-2025-22103MEDIUMCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-22103 [MEDIUM] CVE-2025-22103: linux - In the Linux kernel, the following vulnerability has been resolved: net: fix NU...
In the Linux kernel, the following vulnerability has been resolved: net: fix NULL pointer dereference in l3mdev_l3_rcv When delete l3s ipvlan: ip link del link eth0 ipvlan1 type ipvlan mode l3s This may cause a null pointer dereference: Call trace: ip_rcv_finish+0x48/0xd0 ip_rcv+0x5c/0x100 __netif_receive_skb_one_core+0x64/0xb0 __netif_receive_skb+0x20/0x80 process_
debian
CVE-2025-38120MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38120 [MEDIUM] CVE-2025-38120: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo_avx2: fix initial map fill If the first field doesn't cover the entire start map, then we must zero out the remainder, else we leak those bits into the next match round map. The early fix was incomplete and did only fix up the generic C implementation. A followup patch adds
debian
CVE-2025-21664MEDIUMCVSS 5.5fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21664 [MEDIUM] CVE-2025-21664: linux - In the Linux kernel, the following vulnerability has been resolved: dm thin: ma...
In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ON
debian
CVE-2025-71098MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71098 [MEDIUM] CVE-2025-71098: linux - In the Linux kernel, the following vulnerability has been resolved: ip6_gre: ma...
In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() robust Over the years, syzbot found many ways to crash the kernel in ip6gre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_headroom and/or dev->hard_header_len In this particular crash mld_newpack() allocated an skb w
debian
CVE-2025-71129MEDIUMCVSS 5.5fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71129 [MEDIUM] CVE-2025-71129: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...
In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls so they should follow LoongArch calling conventions. Sign extend its arguments properly to avoid kernel panic. This is done by adding a new emit_abi_ext() helper. The emit_abi_ext() helper performs extension in place m
debian
CVE-2025-38460MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38460 [MEDIUM] CVE-2025-38460: linux - In the Linux kernel, the following vulnerability has been resolved: atm: clip: ...
In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip causes unregister hang"). However, it is not enough because to_atmarpd() is called without RTNL, especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable. Also,
debian