Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 87 of 665
CVE-2025-39905LOWCVSS 7.0fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39905 [HIGH] CVE-2025-39905: linux - In the Linux kernel, the following vulnerability has been resolved: net: phylin...
In the Linux kernel, the following vulnerability has been resolved: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver Currently phylink_resolve() protects itself against concurrent phylink_bringup_phy() or phylink_disconnect_phy() calls which modify pl->phydev by relying on pl->state_mutex. The problem is that in phylink_resolve(), pl->
debian
CVE-2025-39924LOWCVSS 5.5fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39924 [MEDIUM] CVE-2025-39924: linux - In the Linux kernel, the following vulnerability has been resolved: erofs: fix ...
In the Linux kernel, the following vulnerability has been resolved: erofs: fix invalid algorithm for encoded extents The current algorithm sanity checks do not properly apply to new encoded extents. Unify the algorithm check with Z_EROFS_COMPRESSION(_RUNTIME)_MAX and ensure consistency with sbi->available_compr_algs.
Scope: local
bookworm: resolved
bullseye: resolve
debian
CVE-2025-23152LOWCVSS 5.52025
CVE-2025-23152 [MEDIUM] CVE-2025-23152: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/crc-t...
In the Linux kernel, the following vulnerability has been resolved: arm64/crc-t10dif: fix use of out-of-scope array in crc_t10dif_arch() Fix a silly bug where an array was used outside of its scope.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-40000LOWfixed in linux 6.16.12-1 (forky)2025
CVE-2025-40000 [LOW] CVE-2025-40000: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89...
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() There is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to access already freed skb_data: BUG: KFENCE: use-after-free write in rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110 CPU: 6 UID: 0 P
debian
CVE-2025-21974LOWCVSS 5.5fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21974 [MEDIUM] CVE-2025-21974: linux - In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: ...
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() The bnxt_queue_mem_alloc() is called to allocate new queue memory when a queue is restarted. It internally accesses rx buffer descriptor corresponding to the index. The rx buffer descriptor is allocated and set when the interface
debian
CVE-2025-38247LOWCVSS 5.52025
CVE-2025-38247 [MEDIUM] CVE-2025-38247: linux - In the Linux kernel, the following vulnerability has been resolved: userns and ...
In the Linux kernel, the following vulnerability has been resolved: userns and mnt_idmap leak in open_tree_attr(2) Once want_mount_setattr() has returned a positive, it does require finish_mount_kattr() to release ->mnt_userns. Failing do_mount_setattr() does not change that. As the result, we can end up leaking userns and possibly mnt_idmap as well.
Scope: local
bo
debian
CVE-2025-68306LOWfixed in linux 6.17.11-1 (forky)2025
CVE-2025-68306 [LOW] CVE-2025-68306: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface When performing reset tests and encountering abnormal card drop issues that lead to a kernel crash, it is necessary to perform a null check before releasing resources to avoid attempting to release a null pointer. [ 29.158070
debian
CVE-2025-39900LOWCVSS 5.5fixed in linux 6.16.6-1 (forky)2025
CVE-2025-39900 [MEDIUM] CVE-2025-39900: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y syzbot reported a WARNING in est_timer() [1] Problem here is that with CONFIG_PREEMPT_RT=y, timer callbacks can be preempted. Adopt preempt_disable_nested()/preempt_enable_nested() to fix this. [1] WARNING: CPU: 0 PID: 16 at ./include/
debian
CVE-2025-40050LOW2025
CVE-2025-40050 [LOW] CVE-2025-40050: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Skip s...
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer, these scalar adjustments are unnecessary and potenti
debian
CVE-2025-68172LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68172 [LOW] CVE-2025-68172: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: asp...
In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the manual clock cleanu
debian
CVE-2025-68763LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68763 [LOW] CVE-2025-68763: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: sta...
In the Linux kernel, the following vulnerability has been resolved: crypto: starfive - Correctly handle return of sg_nents_for_len The return value of sg_nents_for_len was assigned to an unsigned long in starfive_hash_digest, causing negative error codes to be converted to large positive integers. Add error checking for sg_nents_for_len and return immediately on failur
debian
CVE-2025-21815LOWCVSS 7.1fixed in linux 6.12.15-1 (forky)2025
CVE-2025-21815 [HIGH] CVE-2025-21815: linux - In the Linux kernel, the following vulnerability has been resolved: mm/compacti...
In the Linux kernel, the following vulnerability has been resolved: mm/compaction: fix UBSAN shift-out-of-bounds warning syzkaller reported a UBSAN shift-out-of-bounds warning of (1UL << order) in isolate_freepages_block(). The bogus compound_order can be any value because it is union with flags. Add back the MAX_PAGE_ORDER check to fix the warning.
Scope: local
bookw
debian
CVE-2025-38188LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38188 [MEDIUM] CVE-2025-38188: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/a7x...
In the Linux kernel, the following vulnerability has been resolved: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE Calling this packet is necessary when we switch contexts because there are various pieces of state used by userspace to synchronize between BR and BV that are persistent across submits and we need to make sure that they are in a "safe" state when switching c
debian
CVE-2025-40117LOW2025
CVE-2025-40117 [LOW] CVE-2025-40117: linux - In the Linux kernel, the following vulnerability has been resolved: misc: pci_e...
In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl() Commit eefb83790a0d ("misc: pci_endpoint_test: Add doorbell test case") added NO_BAR (-1) to the pci_barno enum which, in practical terms, changes the enum from an unsigned int to a signed int. If the user passes a negative numbe
debian
CVE-2025-39745LOWCVSS 5.52025
CVE-2025-39745 [MEDIUM] CVE-2025-39745: linux - In the Linux kernel, the following vulnerability has been resolved: rcutorture:...
In the Linux kernel, the following vulnerability has been resolved: rcutorture: Fix rcutorture_one_extend_check() splat in RT kernels For built with CONFIG_PREEMPT_RT=y kernels, running rcutorture tests resulted in the following splat: [ 68.797425] rcutorture_one_extend_check during change: Current 0x1 To add 0x1 To remove 0x0 preempt_count() 0x0 [ 68.797533] WARNIN
debian
CVE-2025-21650LOWCVSS 7.8fixed in linux 6.12.10-1 (forky)2025
CVE-2025-21650 [HIGH] CVE-2025-21650: linux - In the Linux kernel, the following vulnerability has been resolved: net: hns3: ...
In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space addresses. However, hclge_fetch_pf_reg does not distinguish the tqp space information when reading the tqp space informat
debian
CVE-2025-40352LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40352 [LOW] CVE-2025-40352: linux - In the Linux kernel, the following vulnerability has been resolved: platform/me...
In the Linux kernel, the following vulnerability has been resolved: platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init The lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting the following warning when the BlueField-3 SOC is booted: BUG: key ffff00008a3402a8 has not been registered! ------------[ cut here ]------------ DEBUG_LOCKS_W
debian
CVE-2025-37984LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-37984 [MEDIUM] CVE-2025-37984: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: ecd...
In the Linux kernel, the following vulnerability has been resolved: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() Herbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa implementation's ->key_size() callback returns an unusually large value. Herbert instead suggests (for a division by 8): X / 8 + !!(X & 7) Based on this formula
debian
CVE-2025-21965LOWCVSS 5.5fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21965 [MEDIUM] CVE-2025-21965: linux - In the Linux kernel, the following vulnerability has been resolved: sched_ext: ...
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel crash. To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and trigger an scx error if an invali
debian
CVE-2025-39712LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39712 [MEDIUM] CVE-2025-39712: linux - In the Linux kernel, the following vulnerability has been resolved: media: mt9m...
In the Linux kernel, the following vulnerability has been resolved: media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval Getting / Setting the frame interval using the V4L2 subdev pad ops get_frame_interval/set_frame_interval causes a deadlock, as the subdev state is locked in the [1] but also in the driver itself. In [2] it's described that the cal
debian