Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 91 of 665
CVE-2025-68196LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68196 [LOW] CVE-2025-68196: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Cache streams targeting link when performing LT automation [WHY] Last LT automation update can cause crash by referencing current_state and calling into dc_update_planes_and_stream which may clobber current_state. [HOW] Cache relevant stream pointers and iterate through them instead of
debian
CVE-2025-40138LOW2025
CVE-2025-40138 [LOW] CVE-2025-40138: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency() syzbot reported a f2fs bug as below: Oops: gen[ 107.736417][ T5848] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x000000000000
debian
CVE-2025-38338LOWCVSS 7.8fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38338 [HIGH] CVE-2025-38338: linux - In the Linux kernel, the following vulnerability has been resolved: fs/nfs/read... In the Linux kernel, the following vulnerability has been resolved: fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() Sometimes, when a file was read while it was being truncated by another NFS client, the kernel could deadlock because folio_unlock() was called twice, and the second call would XOR back the `PG_locked` flag. Most of the time (depending on
debian
CVE-2025-39777LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39777 [MEDIUM] CVE-2025-39777: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: aco... In the Linux kernel, the following vulnerability has been resolved: crypto: acomp - Fix CFI failure due to type punning To avoid a crash when control flow integrity is enabled, make the workspace ("stream") free function use a consistent type, and call it through a function pointer that has that same type. Scope: local bookworm: resolved bullseye: resolved forky: re
debian
CVE-2025-37877LOWCVSS 5.5fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37877 [MEDIUM] CVE-2025-37877: linux - In the Linux kernel, the following vulnerability has been resolved: iommu: Clea... In the Linux kernel, the following vulnerability has been resolved: iommu: Clear iommu-dma ops on cleanup If iommu_device_register() encounters an error, it can end up tearing down already-configured groups and default domains, however this currently still leaves devices hooked up to iommu-dma (and even historically the behaviour in this area was at best inconsisten
debian
CVE-2025-71156LOWCVSS 7.8fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71156 [HIGH] CVE-2025-71156: linux - In the Linux kernel, the following vulnerability has been resolved: gve: defer ... In the Linux kernel, the following vulnerability has been resolved: gve: defer interrupt enabling until NAPI registration Currently, interrupts are automatically enabled immediately upon request. This allows interrupt to fire before the associated NAPI context is fully initialized and cause failures like below: [ 0.946369] Call Trace: [ 0.946369] [ 0.946369] __napi_po
debian
CVE-2025-71143LOWCVSS 7.8fixed in linux 6.18.5-1 (forky)2025
CVE-2025-71143 [HIGH] CVE-2025-71143: linux - In the Linux kernel, the following vulnerability has been resolved: clk: samsun... In the Linux kernel, the following vulnerability has been resolved: clk: samsung: exynos-clkout: Assign .num before accessing .hws Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with __counted_by") annotated the hws member of 'struct clk_hw_onecell_data' with __counted_by, which informs the bounds sanitizer (UBSAN_BOUNDS) about the number of elements i
debian
CVE-2025-39983LOWfixed in linux 6.16.10-1 (forky)2025
CVE-2025-39983 [LOW] CVE-2025-39983: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue This fixes the following UAF caused by not properly locking hdev when processing HCI_EV_NUM_COMP_PKTS: BUG: KASAN: slab-use-after-free in hci_conn_tx_dequeue+0x1be/0x220 net/bluetooth/hci_conn.c:3036 Read of size 4 at addr ffff8880740f0940 by task kw
debian
CVE-2025-40239LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40239 [LOW] CVE-2025-40239: linux - In the Linux kernel, the following vulnerability has been resolved: net: phy: m... In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: always set shared->phydev for LAN8814 Currently, during the LAN8814 PTP probe shared->phydev is only set if PTP clock gets actually set, otherwise the function will return before setting it. This is an issue as shared->phydev is unconditionally being used when IRQ is being handled, es
debian
CVE-2025-40130LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40130 [LOW] CVE-2025-40130: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ... In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling The cpu_latency_qos_add/remove/update_request interfaces lack internal synchronization by design, requiring the caller to ensure thread safety. The current implementation relies on the 'pm_qos_enabled' flag, which is insufficient to
debian
CVE-2025-39956LOWCVSS 5.5fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39956 [MEDIUM] CVE-2025-39956: linux - In the Linux kernel, the following vulnerability has been resolved: igc: don't ... In the Linux kernel, the following vulnerability has been resolved: igc: don't fail igc_probe() on LED setup error When igc_led_setup() fails, igc_probe() fails and triggers kernel panic in free_netdev() since unregister_netdev() is not called. [1] This behavior can be tested using fault-injection framework, especially the failslab feature. [2] Since LED support is
debian
CVE-2025-39884LOWCVSS 4.7fixed in linux 6.16.8-1 (forky)2025
CVE-2025-39884 [MEDIUM] CVE-2025-39884: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ... In the Linux kernel, the following vulnerability has been resolved: btrfs: fix subvolume deletion lockup caused by inodes xarray race There is a race condition between inode eviction and inode caching that can cause a live struct btrfs_inode to be missing from the root->inodes xarray. Specifically, there is a window during evict() between the inode being unhashed an
debian
CVE-2025-68242LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68242 [LOW] CVE-2025-68242: linux - In the Linux kernel, the following vulnerability has been resolved: NFS: Fix LT... In the Linux kernel, the following vulnerability has been resolved: NFS: Fix LTP test failures when timestamps are delegated The utimes01 and utime06 tests fail when delegated timestamps are enabled, specifically in subtests that modify the atime and mtime fields using the 'nobody' user ID. The problem can be reproduced as follow: # echo "/media *(rw,no_root_squash,syn
debian
CVE-2025-40235LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40235 [LOW] CVE-2025-40235: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: dire... In the Linux kernel, the following vulnerability has been resolved: btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots() If fs_info->super_copy or fs_info->super_for_commit allocated failed in btrfs_get_tree_subvol(), then no need to call btrfs_free_fs_info(). Otherwise btrfs_check_leaked_roots() would access NULL pointer because fs_info->al
debian
CVE-2025-39976LOWfixed in linux 6.16.10-1 (forky)2025
CVE-2025-39976 [LOW] CVE-2025-39976: linux - In the Linux kernel, the following vulnerability has been resolved: futex: Use ... In the Linux kernel, the following vulnerability has been resolved: futex: Use correct exit on failure from futex_hash_allocate_default() copy_process() uses the wrong error exit path from futex_hash_allocate_default(). After exiting from futex_hash_allocate_default(), neither tasklist_lock nor siglock has been acquired. The exit label bad_fork_core_free unlocks both o
debian
CVE-2025-68199LOWfixed in linux 6.17.9-1 (forky)2025
CVE-2025-68199 [LOW] CVE-2025-68199: linux - In the Linux kernel, the following vulnerability has been resolved: codetag: de... In the Linux kernel, the following vulnerability has been resolved: codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for slabobj_ext When alloc_slab_obj_exts() fails and then later succeeds in allocating a slab extension vector, it calls handle_failed_objexts_alloc() to mark all objects in the vector as empty. As a result all objects in this slab (sl
debian
CVE-2025-68770LOWfixed in linux 6.18.3-1 (forky)2025
CVE-2025-68770 [LOW] CVE-2025-68770: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi... In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix XDP_TX path For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not correct. __bnxt_poll_work() -> bnxt_rx_pkt() -> bnxt_rx_xdp() may be looping within NAPI and some event flags may be set in earlier iterations. In particular, if BNXT_TX_EVENT is set earlier indicating some
debian
CVE-2025-68180LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68180 [LOW] CVE-2025-68180: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL deref in debugfs odm_combine_segments When a connector is connected but inactive (e.g., disabled by desktop environments), pipe_ctx->stream_res.tg will be destroyed. Then, reading odm_combine_segments causes kernel NULL pointer dereference. BUG: kernel NULL pointer dereference
debian
CVE-2025-38205LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38205 [MEDIUM] CVE-2025-38205: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 [Why] If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated then they can lead to a divide by zero in downstream callers like CalculateVMAndRowBytes() [How] Initialize dummy value to a value to avoid divide by
debian
CVE-2025-39811LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39811 [MEDIUM] CVE-2025-39811: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe/vm: ... In the Linux kernel, the following vulnerability has been resolved: drm/xe/vm: Clear the scratch_pt pointer on error Avoid triggering a dereference of an error pointer on cleanup in xe_vm_free_scratch() by clearing any scratch_pt error pointer. (cherry picked from commit 358ee50ab565f3c8ea32480e9d03127a81ba32f8) Scope: local bookworm: resolved bullseye: resolved for
debian