Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 51 of 665
CVE-2025-38698MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38698 [MEDIUM] CVE-2025-38698: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: Regula...
In the Linux kernel, the following vulnerability has been resolved: jfs: Regular file corruption check The reproducer builds a corrupted file on disk with a negative i_size value. Add a check when opening this file to avoid subsequent operation failures.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolved (fixed in 5.10.244-1)
forky: resolved (fi
debian
CVE-2025-21638MEDIUMCVSS 5.5fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21638 [MEDIUM] CVE-2025-21638: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: sysct...
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nspro
debian
CVE-2025-38615MEDIUMCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38615 [MEDIUM] CVE-2025-38615: linux - In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: c...
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: cancle set bad inode after removing name fails The reproducer uses a file0 on a ntfs3 file system with a corrupted i_link. When renaming, the file0's inode is marked as a bad inode because the file name cannot be deleted. The underlying bug is that make_bad_inode() is called on a live inod
debian
CVE-2025-39876MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39876 [MEDIUM] CVE-2025-39876: linux - In the Linux kernel, the following vulnerability has been resolved: net: fec: F...
In the Linux kernel, the following vulnerability has been resolved: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() The function of_phy_find_device may return NULL, so we need to take care before dereferencing phy_dev.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolved (fixed in 5.10.247-1)
forky: resolved (fixed in 6.16.8-1)
debian
CVE-2025-38303MEDIUMCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38303 [MEDIUM] CVE-2025-38303: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: eir: Fix possible crashes on eir_create_adv_data eir_create_adv_data may attempt to add EIR_FLAGS and EIR_TX_POWER without checking if that would fit.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 6.12.35-1)
sid: resolved (fixed in 6.12.35-1)
trixie: resolved (f
debian
CVE-2025-71189MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71189 [MEDIUM] CVE-2025-71189: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ...
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw: dmamux: fix OF node leak on route allocation failure Make sure to drop the reference taken to the DMA master OF node also on late route allocation failures.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
bullseye: resolved
forky: resolved (fixed in 6.18.8-1)
sid: resolved (fixed
debian
CVE-2025-37850MEDIUMCVSS 5.5fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37850 [MEDIUM] CVE-2025-37850: linux - In the Linux kernel, the following vulnerability has been resolved: pwm: mediat...
In the Linux kernel, the following vulnerability has been resolved: pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() With CONFIG_COMPILE_TEST && !CONFIG_HAVE_CLK, pwm_mediatek_config() has a divide-by-zero in the following line: do_div(resolution, clk_get_rate(pc->clk_pwms[pwm->hwpwm])); due to the fact that the !CONFIG_HAVE_CLK version of clk_get_rate
debian
CVE-2025-38160MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38160 [MEDIUM] CVE-2025-38160: linux - In the Linux kernel, the following vulnerability has been resolved: clk: bcm: r...
In the Linux kernel, the following vulnerability has been resolved: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() devm_kasprintf() returns NULL when memory allocation fails. Currently, raspberrypi_clk_register() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue.
Scope:
debian
CVE-2025-39732MEDIUMCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-39732 [MEDIUM] CVE-2025-39732: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() ath11k_mac_disable_peer_fixed_rate() is passed as the iterator to ieee80211_iterate_stations_atomic(). Note in this case the iterator is required to be atomic, however ath11k_mac_disable_peer_fixed_rate() does not follow it as
debian
CVE-2025-38609MEDIUMCVSS 5.5fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38609 [MEDIUM] CVE-2025-38609: linux - In the Linux kernel, the following vulnerability has been resolved: PM / devfre...
In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Check governor before using governor->name Commit 96ffcdf239de ("PM / devfreq: Remove redundant governor_name from struct devfreq") removes governor_name and uses governor->name to replace it. But devfreq->governor may be NULL and directly using devfreq->governor->name may cause null p
debian
CVE-2025-39833MEDIUMCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39833 [MEDIUM] CVE-2025-39833: linux - In the Linux kernel, the following vulnerability has been resolved: mISDN: hfcp...
In the Linux kernel, the following vulnerability has been resolved: mISDN: hfcpci: Fix warning when deleting uninitialized timer With CONFIG_DEBUG_OBJECTS_TIMERS unloading hfcpci module leads to the following splat: [ 250.215892] ODEBUG: assert_init not available (active state 0) object: ffffffffc01a3dc0 object type: timer_list hint: 0x0 [ 250.217520] WARNING: CPU:
debian
CVE-2025-71118MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71118 [MEDIUM] CVE-2025-71118: linux - In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avo...
In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Namespace if start_node is NULL Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace if it is not there") fixed the situation when both start_node and acpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed on Honor Magicbook 14 Pro [1].
debian
CVE-2025-22005MEDIUMCVSS 5.5fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-22005 [MEDIUM] CVE-2025-22005: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix m...
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw(). fib_check_nh_v6_gw() expects that fib6_nh_init() cleans up everything when it fails. Commit 7dd73168e273 ("ipv6: Always allocate pcpu memory in a fib6_nh") moved fib_nh_common_init() before alloc_percpu_gfp() within fib6_nh_init() but
debian
CVE-2025-38510MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38510 [MEDIUM] CVE-2025-38510: linux - In the Linux kernel, the following vulnerability has been resolved: kasan: remo...
In the Linux kernel, the following vulnerability has been resolved: kasan: remove kasan_find_vm_area() to prevent possible deadlock find_vm_area() couldn't be called in atomic_context. If find_vm_area() is called to reports vm area information, kasan can trigger deadlock like: CPU0 CPU1 vmalloc(); alloc_vmap_area(); spin_lock(&vn->busy.lock) spin_lock_bh(&some_lock)
debian
CVE-2025-38293MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38293 [MEDIUM] CVE-2025-38293: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix node corruption in ar->arvifs list In current WLAN recovery code flow, ath11k_core_halt() only reinitializes the "arvifs" list head. This will cause the list node immediately following the list head to become an invalid list node. Because the prev of that node still points to the l
debian
CVE-2025-39767MEDIUMCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39767 [MEDIUM] CVE-2025-39767: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Optimize module load time by optimizing PLT/GOT counting When enabling CONFIG_KASAN, CONFIG_PREEMPT_VOLUNTARY_BUILD and CONFIG_PREEMPT_VOLUNTARY at the same time, there will be soft deadlock, the relevant logs are as follows: rcu: INFO: rcu_sched self-detected stall on CPU ... Call Trace:
debian
CVE-2025-71097MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71097 [MEDIUM] CVE-2025-71097: linux - In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix r...
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak when using error routes with nexthop objects When a nexthop object is deleted, it is marked as dead and then fib_table_flush() is called to flush all the routes that are using the dead nexthop. The current logic in fib_table_flush() is to only flush error routes (e.g.,
debian
CVE-2025-21790MEDIUMCVSS 5.5fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21790 [MEDIUM] CVE-2025-21790: linux - In the Linux kernel, the following vulnerability has been resolved: vxlan: chec...
In the Linux kernel, the following vulnerability has been resolved: vxlan: check vxlan_vnigroup_init() return value vxlan_init() must check vxlan_vnigroup_init() success otherwise a crash happens later, spotted by syzbot. Oops: general protection fault, probably for non-canonical address 0xdffffc000000002c: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in
debian
CVE-2025-21821MEDIUMCVSS 5.5fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21821 [MEDIUM] CVE-2025-21821: linux - In the Linux kernel, the following vulnerability has been resolved: fbdev: omap...
In the Linux kernel, the following vulnerability has been resolved: fbdev: omap: use threaded IRQ for LCD DMA When using touchscreen and framebuffer, Nokia 770 crashes easily with: BUG: scheduling while atomic: irq/144-ads7846/82/0x00010000 Modules linked in: usb_f_ecm g_ether usb_f_rndis u_ether libcomposite configfs omap_udc ohci_omap ohci_hcd CPU: 0 UID: 0 PID: 8
debian
CVE-2025-21938MEDIUMCVSS 4.7fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21938 [MEDIUM] CVE-2025-21938: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix ...
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr If multiple connection requests attempt to create an implicit mptcp endpoint in parallel, more than one caller may end up in mptcp_pm_nl_append_new_local_addr because none found the address in local_addr_list during their call
debian