Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 53 of 665
CVE-2025-38127MEDIUMCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38127 [MEDIUM] CVE-2025-38127: linux - In the Linux kernel, the following vulnerability has been resolved: ice: fix Tx...
In the Linux kernel, the following vulnerability has been resolved: ice: fix Tx scheduler error handling in XDP callback When the XDP program is loaded, the XDP callback adds new Tx queues. This means that the callback must update the Tx scheduler with the new queue number. In the event of a Tx scheduler failure, the XDP callback should also fail and roll back any c
debian
CVE-2025-39808MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39808 [MEDIUM] CVE-2025-39808: linux - In the Linux kernel, the following vulnerability has been resolved: HID: hid-nt...
In the Linux kernel, the following vulnerability has been resolved: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() in ntrig_report_version(), hdev parameter passed from hid_probe(). sending descriptor to /dev/uhid can make hdev->dev.parent->parent to null if hdev->dev.parent->parent is null, usb_dev has invalid address(0xffffffffffffff58)
debian
CVE-2025-38727MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38727 [MEDIUM] CVE-2025-38727: linux - In the Linux kernel, the following vulnerability has been resolved: netlink: av...
In the Linux kernel, the following vulnerability has been resolved: netlink: avoid infinite retry looping in netlink_unicast() netlink_attachskb() checks for the socket's read memory allocation constraints. Firstly, it has: rmem sk_rcvbuf) to check if the just increased rmem value fits into the socket's receive buffer. If not, it proceeds and tries to wait for the m
debian
CVE-2025-21653MEDIUMCVSS 5.5fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21653 [MEDIUM] CVE-2025-21653: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift values. UBSAN: shift-out-of-bounds in net/sched/cls_flow.c:329:23 shift exponent 9445 is too large for 32-bit type 'u32'
debian
CVE-2025-21681MEDIUMCVSS 5.5fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21681 [MEDIUM] CVE-2025-21681: linux - In the Linux kernel, the following vulnerability has been resolved: openvswitch...
In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix lockup on tx to unregistering netdev with carrier Commit in a fixes tag attempted to fix the issue in the following sequence of calls: do_output -> ovs_vport_send -> dev_queue_xmit -> __dev_queue_xmit -> netdev_core_pick_tx -> skb_tx_hash When device is unregistering, the 'dev->real
debian
CVE-2025-37982MEDIUMCVSS 5.5fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37982 [MEDIUM] CVE-2025-37982: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: wl125...
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: fix memory leak in wl1251_tx_work The skb dequeued from tx_queue is lost when wl1251_ps_elp_wakeup fails with a -ETIMEDOUT error. Fix that by queueing the skb back to tx_queue.
Scope: local
bookworm: resolved (fixed in 6.1.135-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: resolved
debian
CVE-2025-39773MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39773 [MEDIUM] CVE-2025-39773: linux - In the Linux kernel, the following vulnerability has been resolved: net: bridge...
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix soft lockup in br_multicast_query_expired() When set multicast_query_interval to a large value, the local variable 'time' in br_multicast_send_query() may overflow. If the time is smaller than jiffies, the timer will expire immediately, and then call mod_timer() again, which creates
debian
CVE-2025-38612MEDIUMCVSS 5.5fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38612 [MEDIUM] CVE-2025-38612: linux - In the Linux kernel, the following vulnerability has been resolved: staging: fb...
In the Linux kernel, the following vulnerability has been resolved: staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() In the error paths after fb_info structure is successfully allocated, the memory allocated in fb_deferred_io_init() for info->pagerefs is not freed. Fix that by adding the cleanup function on the error path.
Scope: local
bookworm
debian
CVE-2025-39707MEDIUMCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39707 [MEDIUM] CVE-2025-39707: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities HUBBUB structure is not initialized on DCE hardware, so check if it is NULL to avoid null dereference while accessing amdgpu_dm_capabilities file in debugfs.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 6.1
debian
CVE-2025-71121MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71121 [MEDIUM] CVE-2025-71121: linux - In the Linux kernel, the following vulnerability has been resolved: parisc: Do ...
In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affinitiy on ASP chip The ASP chip is a very old variant of the GSP chip and is used e.g. in HP 730 workstations. When trying to reprogram the affinity it will crash with a HPMC as the relevant registers don't seem to be at the usual location. Let's avoid the crash by checki
debian
CVE-2025-38683MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38683 [MEDIUM] CVE-2025-38683: linux - In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: ...
In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix panic during namespace deletion with VF The existing code move the VF NIC to new namespace when NETDEV_REGISTER is received on netvsc NIC. During deletion of the namespace, default_device_exit_batch() >> default_device_exit_net() is called. When netvsc NIC is moved back and registered
debian
CVE-2025-38225MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38225 [MEDIUM] CVE-2025-38225: linux - In the Linux kernel, the following vulnerability has been resolved: media: imx-...
In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Cleanup after an allocation error When allocation failures are not cleaned up by the driver, further allocation errors will be false-positives, which will cause buffers to remain uninitialized and cause NULL pointer dereferences. Ensure proper cleanup of failed allocations to preven
debian
CVE-2025-37742MEDIUMCVSS 5.5fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37742 [MEDIUM] CVE-2025-37742: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: Fix un...
In the Linux kernel, the following vulnerability has been resolved: jfs: Fix uninit-value access of imap allocated in the diMount() function syzbot reports that hex_dump_to_buffer is using uninit-value: ===================================================== BUG: KMSAN: uninit-value in hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171 hex_dump_to_buffer+0x888/0x1100 l
debian
CVE-2025-37770MEDIUMCVSS 5.5fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37770 [MEDIUM] CVE-2025-37770: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm:...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Scope: local
bookworm: resolved (fixed in 6.1.135-1)
bullseye: resolved (fixed in 5.10.237-1)
fo
debian
CVE-2025-21801MEDIUMCVSS 5.5fixed in linux 6.12.13-1 (forky)2025
CVE-2025-21801 [MEDIUM] CVE-2025-21801: linux - In the Linux kernel, the following vulnerability has been resolved: net: ravb: ...
In the Linux kernel, the following vulnerability has been resolved: net: ravb: Fix missing rtnl lock in suspend/resume path Fix the suspend/resume path by ensuring the rtnl lock is held where required. Calls to ravb_open, ravb_close and wol operations must be performed under the rtnl lock to prevent conflicts with ongoing ndo operations. Without this fix, the follow
debian
CVE-2025-38148MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38148 [MEDIUM] CVE-2025-38148: linux - In the Linux kernel, the following vulnerability has been resolved: net: phy: m...
In the Linux kernel, the following vulnerability has been resolved: net: phy: mscc: Fix memory leak when using one step timestamping Fix memory leak when running one-step timestamping. When running one-step sync timestamping, the HW is configured to insert the TX time into the frame, so there is no reason to keep the skb anymore. As in this case the HW will never ge
debian
CVE-2025-38094MEDIUMCVSS 5.5fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-38094 [MEDIUM] CVE-2025-38094: linux - In the Linux kernel, the following vulnerability has been resolved: net: cadenc...
In the Linux kernel, the following vulnerability has been resolved: net: cadence: macb: Fix a possible deadlock in macb_halt_tx. There is a situation where after THALT is set high, TGO stays high as well. Because jiffies are never updated, as we are in a context with interrupts disabled, we never exit that loop and have a deadlock. That deadlock was noticed on a sam
debian
CVE-2025-38462MEDIUMCVSS 4.7fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38462 [MEDIUM] CVE-2025-38462: linux - In the Linux kernel, the following vulnerability has been resolved: vsock: Fix ...
In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_{g2h,h2g} TOCTOU vsock_find_cid() and vsock_dev_do_ioctl() may race with module unload. transport_{g2h,h2g} may become NULL after the NULL check. Introduce vsock_transport_local_cid() to protect from a potential null-ptr-deref. KASAN: null-ptr-deref in range [0x0000000000000118-
debian
CVE-2025-22119MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-22119 [MEDIUM] CVE-2025-22119: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: init wiphy_work before allocating rfkill fails syzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1] After rfkill allocation fails, the wiphy release process will be performed, which will cause cfg80211_dev_free to access the uninitialized wiphy_work related data.
debian
CVE-2025-23151MEDIUMCVSS 4.7fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-23151 [MEDIUM] CVE-2025-23151: linux - In the Linux kernel, the following vulnerability has been resolved: bus: mhi: h...
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Fix race between unprepare and queue_buf A client driver may use mhi_unprepare_from_transfer() to quiesce incoming data during the client driver's tear down. The client driver might also be processing data at the same time, resulting in a call to mhi_queue_buf() which will invoke mhi
debian