Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 90 of 665
CVE-2025-21990LOWCVSS 5.5fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21990 [MEDIUM] CVE-2025-21990: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags PRT BOs may not have any backing store, so bo->tbo.resource will be NULL. Check for that before dereferencing. (cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)
Scope: local
bookworm: resolved
bullseye: res
debian
CVE-2025-39755LOWCVSS 5.52025
CVE-2025-39755 [MEDIUM] CVE-2025-39755: linux - In the Linux kernel, the following vulnerability has been resolved: staging: gp...
In the Linux kernel, the following vulnerability has been resolved: staging: gpib: Fix cb7210 pcmcia Oops The pcmcia_driver struct was still only using the old .name initialization in the drv field. This led to a NULL pointer deref Oops in strcmp called from pcmcia_register_driver. Initialize the pcmcia_driver struct name field.
Scope: local
bookworm: resolved
bulls
debian
CVE-2025-21769LOWCVSS 5.52025
CVE-2025-21769 [MEDIUM] CVE-2025-21769: linux - In the Linux kernel, the following vulnerability has been resolved: ptp: vmcloc...
In the Linux kernel, the following vulnerability has been resolved: ptp: vmclock: Add .owner to vmclock_miscdev_fops Without the .owner field, the module can be unloaded while /dev/vmclock0 is open, leading to an oops.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-39991LOWfixed in linux 6.16.11-1 (forky)2025
CVE-2025-39991 [LOW] CVE-2025-39991: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() If ab->fw.m3_data points to data, then fw pointer remains null. Further, if m3_mem is not allocated, then fw is dereferenced to be passed to ath11k_err function. Replace fw->size by m3_len. Found by Linux Verification Center (linuxtesting.org)
debian
CVE-2025-38688LOWCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38688 [HIGH] CVE-2025-38688: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd: Pr...
In the Linux kernel, the following vulnerability has been resolved: iommufd: Prevent ALIGN() overflow When allocating IOVA the candidate range gets aligned to the target alignment. If the range is close to ULONG_MAX then the ALIGN() can wrap resulting in a corrupted iova. Open code the ALIGN() using get_add_overflow() to prevent this. This simplifies the checks as we
debian
CVE-2025-38374LOWCVSS 5.5fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38374 [MEDIUM] CVE-2025-38374: linux - In the Linux kernel, the following vulnerability has been resolved: optee: ffa:...
In the Linux kernel, the following vulnerability has been resolved: optee: ffa: fix sleep in atomic context The OP-TEE driver registers the function notif_callback() for FF-A notifications. However, this function is called in an atomic context leading to errors like this when processing asynchronous notifications: | BUG: sleeping function called from invalid context
debian
CVE-2025-1272LOWCVSS 7.72025
CVE-2025-1272 [HIGH] CVE-2025-1272: linux - The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above fo...
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking
debian
CVE-2025-68202LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68202 [LOW] CVE-2025-68202: linux - In the Linux kernel, the following vulnerability has been resolved: sched_ext: ...
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix unsafe locking in the scx_dump_state() For built with CONFIG_PREEMPT_RT=y kernels, the dump_lock will be converted sleepable spinlock and not disable-irq, so the following scenarios occur: inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage. irq_work/0/27 [HC0[0]:SC0[0]:HE1:SE1] takes: (
debian
CVE-2025-21973LOWCVSS 7.1fixed in linux 6.12.20-1 (forky)2025
CVE-2025-21973 [HIGH] CVE-2025-21973: linux - In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: ...
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} When qstats-get operation is executed, callbacks of netdev_stats_ops are called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats from sw_stats in the rings. But {rx | tx | cp}_ring are allocated when the interface is up. So, th
debian
CVE-2025-71142LOWCVSS 5.5fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71142 [MEDIUM] CVE-2025-71142: linux - In the Linux kernel, the following vulnerability has been resolved: cpuset: fix...
In the Linux kernel, the following vulnerability has been resolved: cpuset: fix warning when disabling remote partition A warning was triggered as follows: WARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110 RIP: 0010:remote_partition_disable+0xf7/0x110 RSP: 0018:ffffc90001947d88 EFLAGS: 00000206 RAX: 0000000000007fff RBX: ffff888103b6e000 RC
debian
CVE-2025-39992LOWfixed in linux 6.16.11-1 (forky)2025
CVE-2025-39992 [LOW] CVE-2025-39992: linux - In the Linux kernel, the following vulnerability has been resolved: mm: swap: c...
In the Linux kernel, the following vulnerability has been resolved: mm: swap: check for stable address space before operating on the VMA It is possible to hit a zero entry while traversing the vmas in unuse_mm() called from swapoff path and accessing it causes the OOPS: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000446--> Loading the
debian
CVE-2025-40340LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-40340 [LOW] CVE-2025-40340: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix...
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test. I saw an oops in xe_gem_fault when running the xe-fast-feedback testlist against the realtime kernel without debug options enabled. The panic happens after core_hotunplug unbind-rebind finishes. Presumably what happens is that a process
debian
CVE-2025-71110LOWCVSS 7.82025
CVE-2025-71110 [HIGH] CVE-2025-71110: linux - In the Linux kernel, the following vulnerability has been resolved: mm/slub: re...
In the Linux kernel, the following vulnerability has been resolved: mm/slub: reset KASAN tag in defer_free() before accessing freed memory When CONFIG_SLUB_TINY is enabled, kfree_nolock() calls kasan_slab_free() before defer_free(). On ARM64 with MTE (Memory Tagging Extension), kasan_slab_free() poisons the memory and changes the tag from the original (e.g., 0xf3) to
debian
CVE-2025-22000LOWCVSS 5.5fixed in linux 6.12.21-1 (forky)2025
CVE-2025-22000 [MEDIUM] CVE-2025-22000: linux - In the Linux kernel, the following vulnerability has been resolved: mm/huge_mem...
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: drop beyond-EOF folios with the right number of refs When an after-split folio is large and needs to be dropped due to EOF, folio_put_refs(folio, folio_nr_pages(folio)) should be used to drop all page cache refs. Otherwise, the folio will not be freed, causing memory leak. This leak
debian
CVE-2025-22122LOWCVSS 5.5fixed in linux 6.12.33-1 (forky)2025
CVE-2025-22122 [MEDIUM] CVE-2025-22122: linux - In the Linux kernel, the following vulnerability has been resolved: block: fix ...
In the Linux kernel, the following vulnerability has been resolved: block: fix adding folio to bio >4GB folio is possible on some ARCHs, such as aarch64, 16GB hugepage is supported, then 'offset' of folio can't be held in 'unsigned int', cause warning in bio_add_folio_nofail() and IO failure. Fix it by adjusting 'page' & trimming 'offset' so that `->bi_offset` won't
debian
CVE-2025-39768LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39768 [MEDIUM] CVE-2025-39768: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: H...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, fix complex rules rehash error flow Moving rules from matcher to matcher should not fail. However, if it does fail due to various reasons, the error flow should allow the kernel to continue functioning (albeit with broken steering rules) instead of going into series of soft lock-ups o
debian
CVE-2025-38496LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38496 [MEDIUM] CVE-2025-38496: linux - In the Linux kernel, the following vulnerability has been resolved: dm-bufio: f...
In the Linux kernel, the following vulnerability has been resolved: dm-bufio: fix sched in atomic context If "try_verify_in_tasklet" is set for dm-verity, DM_BUFIO_CLIENT_NO_SLEEP is enabled for dm-bufio. However, when bufio tries to evict buffers, there is a chance to trigger scheduling in spin_lock_bh, the following warning is hit: BUG: sleeping function called fr
debian
CVE-2025-68752LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68752 [LOW] CVE-2025-68752: linux - In the Linux kernel, the following vulnerability has been resolved: iavf: Imple...
In the Linux kernel, the following vulnerability has been resolved: iavf: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference. The fix is similar to commit 329d050bbe63 ("gve: Implement settime64 with -EOPNOTSUPP").
Scope: local
bookworm: resolved
bullseye:
debian
CVE-2025-38317LOWCVSS 7.8fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38317 [HIGH] CVE-2025-38317: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix buffer overflow in debugfs If the user tries to write more than 32 bytes then it results in memory corruption. Fortunately, this is debugfs so it's limited to root users.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.12.35-1)
sid: resolved (fixed in 6
debian
CVE-2025-38292LOWCVSS 7.1fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38292 [HIGH] CVE-2025-38292: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free
debian