Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 59 of 665
CVE-2025-39907MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39907 [MEDIUM] CVE-2025-39907: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: rawnan...
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer Avoid below overlapping mappings by using a contiguous non-cacheable buffer. [ 4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST, overlapping mappings aren't supported [ 4.089103] WARNING: CPU: 1 P
debian
CVE-2025-38277MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38277 [MEDIUM] CVE-2025-38277: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: nand: ...
In the Linux kernel, the following vulnerability has been resolved: mtd: nand: ecc-mxic: Fix use of uninitialized variable ret If ctx->steps is zero, the loop processing ECC steps is skipped, and the variable ret remains uninitialized. It is later checked and returned, which leads to undefined behavior and may cause unpredictable results in user space or kernel cras
debian
CVE-2025-21676MEDIUMCVSS 5.5fixed in linux 6.12.11-1 (forky)2025
CVE-2025-21676 [MEDIUM] CVE-2025-21676: linux - In the Linux kernel, the following vulnerability has been resolved: net: fec: h...
In the Linux kernel, the following vulnerability has been resolved: net: fec: handle page_pool_dev_alloc_pages error The fec_enet_update_cbd function calls page_pool_dev_alloc_pages but did not handle the case when it returned NULL. There was a WARN_ON(!new_page) but it would still proceed to use the NULL pointer and then crash. This case does seem somewhat rare but
debian
CVE-2025-37806MEDIUMCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37806 [MEDIUM] CVE-2025-37806: linux - In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: K...
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Keep write operations atomic syzbot reported a NULL pointer dereference in __generic_file_write_iter. [1] Before the write operation is completed, the user executes ioctl[2] to clear the compress flag of the file, which causes the is_compressed() judgment to return 0, further causing the p
debian
CVE-2025-38115MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38115 [MEDIUM] CVE-2025-38115: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: fix a potential crash on gso_skb handling SFQ has an assumption of always being able to queue at least one packet. However, after the blamed commit, sch->q.len can be inflated by packets in sch->gso_skb, and an enqueue() on an empty SFQ qdisc can be followed by an immediate drop.
debian
CVE-2025-38597MEDIUMCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38597 [MEDIUM] CVE-2025-38597: linux - In the Linux kernel, the following vulnerability has been resolved: drm/rockchi...
In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port Each window of a vop2 is usable by a specific set of video ports, so while binding the vop2, we look through the list of available windows trying to find one designated as primary-plane and usable by that specific port. The
debian
CVE-2025-37964MEDIUMCVSS 5.5fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37964 [MEDIUM] CVE-2025-37964: linux - In the Linux kernel, the following vulnerability has been resolved: x86/mm: Eli...
In the Linux kernel, the following vulnerability has been resolved: x86/mm: Eliminate window where TLB flushes may be inadvertently skipped tl;dr: There is a window in the mm switching code where the new CR3 is set and the CPU should be getting TLB flushes for the new mm. But should_flush_tlb() has a bug and suppresses the flush. Fix it by widening the window where
debian
CVE-2025-40300MEDIUMCVSS 5.5fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-40300 [MEDIUM] CVE-2025-40300: linux - In the Linux kernel, the following vulnerability has been resolved: x86/vmscape...
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flu
debian
CVE-2025-22037MEDIUMCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-22037 [MEDIUM] CVE-2025-22037: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in alloc_preauth_hash() The Client send malformed smb2 negotiate request. ksmbd return error response. Subsequently, the client can send smb2 session setup even thought conn->preauth_info is not allocated. This patch add KSMBD_SESS_NEED_SETUP status of connection
debian
CVE-2025-39989MEDIUMCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-39989 [MEDIUM] CVE-2025-39989: linux - In the Linux kernel, the following vulnerability has been resolved: x86/mce: us...
In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This patchset resolves two critical regressions related to memory failure handling that have appeared in the upstream kernel
debian
CVE-2025-37945MEDIUMCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37945 [MEDIUM] CVE-2025-37945: linux - In the Linux kernel, the following vulnerability has been resolved: net: phy: a...
In the Linux kernel, the following vulnerability has been resolved: net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY DSA has 2 kinds of drivers: 1. Those who call dsa_switch_suspend() and dsa_switch_resume() from their device PM ops: qca8k-8xxx, bcm_sf2, microchip ksz 2. Those who don't: all others. The above methods should be o
debian
CVE-2025-22070MEDIUMCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-22070 [MEDIUM] CVE-2025-22070: linux - In the Linux kernel, the following vulnerability has been resolved: fs/9p: fix ...
In the Linux kernel, the following vulnerability has been resolved: fs/9p: fix NULL pointer dereference on mkdir When a 9p tree was mounted with option 'posixacl', parent directory had a default ACL set for its subdirectories, e.g.: setfacl -m default:group:simpsons:rwx parentdir then creating a subdirectory crashed 9p client, as v9fs_fid_add() call in function v9fs
debian
CVE-2025-21645MEDIUMCVSS 5.5fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-21645 [MEDIUM] CVE-2025-21645: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it Wakeup for IRQ1 should be disabled only in cases where i8042 had actually enabled it, otherwise "wake_depth" for this IRQ will try to drop below zero and there will be an unpleasant WARN() logged: kernel: atkbd serio0: Di
debian
CVE-2025-21944MEDIUMCVSS 5.5fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21944 [MEDIUM] CVE-2025-21944: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix bug on trap in smb2_lock If lock count is greater than 1, flags could be old value. It should be checked with flags of smb_lock, not flags. It will cause bug-on trap from locks_free_lock in error handling routine.
Scope: local
bookworm: resolved (fixed in 6.1.133-1)
bullseye: resolved
for
debian
CVE-2025-38455MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38455 [MEDIUM] CVE-2025-38455: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: R...
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight Reject migration of SEV{-ES} state if either the source or destination VM is actively creating a vCPU, i.e. if kvm_vm_ioctl_create_vcpu() is in the section between incrementing created_vcpus and online_vcpus. The bulk of vC
debian
CVE-2025-38659MEDIUMCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38659 [MEDIUM] CVE-2025-38659: linux - In the Linux kernel, the following vulnerability has been resolved: gfs2: No mo...
In the Linux kernel, the following vulnerability has been resolved: gfs2: No more self recovery When a node withdraws and it turns out that it is the only node that has the filesystem mounted, gfs2 currently tries to replay the local journal to bring the filesystem back into a consistent state. Not only is that a very bad idea, it has also never worked because gfs2_
debian
CVE-2025-38262MEDIUMCVSS 5.5fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38262 [MEDIUM] CVE-2025-38262: linux - In the Linux kernel, the following vulnerability has been resolved: tty: serial...
In the Linux kernel, the following vulnerability has been resolved: tty: serial: uartlite: register uart driver in init When two instances of uart devices are probing, a concurrency race can occur. If one thread calls uart_register_driver function, which first allocates and assigns memory to 'uart_state' member of uart_driver structure, the other instance can bypass
debian
CVE-2025-68340MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68340 [MEDIUM] CVE-2025-68340: linux - In the Linux kernel, the following vulnerability has been resolved: team: Move ...
In the Linux kernel, the following vulnerability has been resolved: team: Move team device type change at the end of team_port_add Attempting to add a port device that is already up will expectedly fail, but not before modifying the team device header_ops. In the case of the syzbot reproducer the gre0 device is already in state UP when it attempts to add it as a por
debian
CVE-2025-21738MEDIUMCVSS 5.5fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21738 [MEDIUM] CVE-2025-21738: linux - In the Linux kernel, the following vulnerability has been resolved: ata: libata...
In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA command set to ATA_NOP, and protocol set to ATA_PROT_PIO, can cause ata_pio_sector() to write
debian
CVE-2025-21675MEDIUMCVSS 5.5fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21675 [MEDIUM] CVE-2025-21675: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: C...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Clear port select structure when fail to create Clear the port select structure on error so no stale values left after definers are destroyed. That's because the mlx5_lag_destroy_definers() always try to destroy all lag definers in the tt_map, so in the flow below lag definers get double-d
debian