Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 92 of 665
CVE-2025-23154LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-23154 [MEDIUM] CVE-2025-23154: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/ne... In the Linux kernel, the following vulnerability has been resolved: io_uring/net: fix io_req_post_cqe abuse by send bundle [ 114.987980][ T5313] WARNING: CPU: 6 PID: 5313 at io_uring/io_uring.c:872 io_req_post_cqe+0x12e/0x4f0 [ 114.991597][ T5313] RIP: 0010:io_req_post_cqe+0x12e/0x4f0 [ 115.001880][ T5313] Call Trace: [ 115.002222][ T5313] [ 115.007813][ T5313] io_s
debian
CVE-2025-38490LOWCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38490 [HIGH] CVE-2025-38490: linux - In the Linux kernel, the following vulnerability has been resolved: net: libwx:... In the Linux kernel, the following vulnerability has been resolved: net: libwx: remove duplicate page_pool_put_full_page() page_pool_put_full_page() should only be invoked when freeing Rx buffers or building a skb if the size is too short. At other times, the pages need to be reused. So remove the redundant page put. In the original code, double free pages cause kerne
debian
CVE-2025-40228LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40228 [LOW] CVE-2025-40228: linux - In the Linux kernel, the following vulnerability has been resolved: mm/damon/sy... In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: catch commit test ctx alloc failure Patch series "mm/damon/sysfs: fix commit test damon_ctx [de]allocation". DAMON sysfs interface dynamically allocates and uses a damon_ctx object for testing if given inputs for online DAMON parameters update is valid. The object is being used without
debian
CVE-2025-68749LOWCVSS 4.7fixed in linux 6.17.13-1 (forky)2025
CVE-2025-68749 [MEDIUM] CVE-2025-68749: linux - In the Linux kernel, the following vulnerability has been resolved: accel/ivpu:... In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix race condition when unbinding BOs Fix 'Memory manager not clean during takedown' warning that occurs when ivpu_gem_bo_free() removes the BO from the BOs list before it gets unmapped. Then file_priv_unbind() triggers a warning in drm_mm_takedown() during context teardown. Protect the
debian
CVE-2025-37882LOWCVSS 7.8fixed in linux 6.12.27-1 (forky)2025
CVE-2025-37882 [HIGH] CVE-2025-37882: linux - In the Linux kernel, the following vulnerability has been resolved: usb: xhci: ... In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix isochronous Ring Underrun/Overrun event handling The TRB pointer of these events points at enqueue at the time of error occurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we are handling the event, a new TD may be queued at this ring position. I can trigger this race by
debian
CVE-2025-23149LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-23149 [MEDIUM] CVE-2025-23149: linux - In the Linux kernel, the following vulnerability has been resolved: tpm: do not... In the Linux kernel, the following vulnerability has been resolved: tpm: do not start chip while suspended Checking TPM_CHIP_FLAG_SUSPENDED after the call to tpm_find_get_ops() can lead to a spurious tpm_chip_start() call: [35985.503771] i2c i2c-1: Transfer while suspended [35985.503796] WARNING: CPU: 0 PID: 74 at drivers/i2c/i2c-core.h:56 __i2c_transfer+0xbe/0x810
debian
CVE-2025-68738LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68738 [LOW] CVE-2025-68738: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mt76:... In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: fix null pointer deref in mt7996_conf_tx() If a link does not have an assigned channel yet, mt7996_vif_link returns NULL. We still need to store the updated queue settings in that case, and apply them later. Move the location of the queue params to within struct mt7996_vif_link. Sco
debian
CVE-2025-68248LOW2025
CVE-2025-68248 [LOW] CVE-2025-68248: linux - In the Linux kernel, the following vulnerability has been resolved: vmw_balloon... In the Linux kernel, the following vulnerability has been resolved: vmw_balloon: indicate success when effectively deflating during migration When migrating a balloon page, we first deflate the old page to then inflate the new page. However, if inflating the new page succeeded, we effectively deflated the old page, reducing the balloon size. In that case, the migration
debian
CVE-2025-38559LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38559 [MEDIUM] CVE-2025-38559: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8... In the Linux kernel, the following vulnerability has been resolved: platform/x86/intel/pmt: fix a crashlog NULL pointer access Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The current use of the endpoint value is only valid for telemetry endpoint usage. Without the ep, the crashlog usage causes the following NULL pointer exception: BUG: kernel
debian
CVE-2025-38269LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38269 [MEDIUM] CVE-2025-38269: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: exit... In the Linux kernel, the following vulnerability has been resolved: btrfs: exit after state insertion failure at btrfs_convert_extent_bit() If insert_state() state failed it returns an error pointer and we call extent_io_tree_panic() which will trigger a BUG() call. However if CONFIG_BUG is disabled, which is an uncommon and exotic scenario, then we fallthrough and
debian
CVE-2025-39941LOWCVSS 4.7fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39941 [MEDIUM] CVE-2025-39941: linux - In the Linux kernel, the following vulnerability has been resolved: zram: fix s... In the Linux kernel, the following vulnerability has been resolved: zram: fix slot write race condition Parallel concurrent writes to the same zram index result in leaked zsmalloc handles. Schematically we can have something like this: CPU0 CPU1 zram_slot_lock() zs_free(handle) zram_slot_lock() zram_slot_lock() zs_free(handle) zram_slot_lock() compress compress hand
debian
CVE-2025-40199LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40199 [LOW] CVE-2025-40199: linux - In the Linux kernel, the following vulnerability has been resolved: page_pool: ... In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches Helge reported that the introduction of PP_MAGIC_MASK let to crashes on boot on his 32-bit parisc machine. The cause of this is the mask is set too wide, so the page_pool_page_is_pp() incurs false positives which crashes the machine.
debian
CVE-2025-38662LOWCVSS 7.8fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38662 [HIGH] CVE-2025-38662: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: media... In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv Given mt8365_dai_set_priv allocate priv_size space to copy priv_data which means we should pass mt8365_i2s_priv[i] or "struct mtk_afe_i2s_priv" instead of afe_priv which has the size of "struct mt8365_afe_private". Otherwise the
debian
CVE-2025-38316LOWCVSS 5.52025
CVE-2025-38316 [MEDIUM] CVE-2025-38316: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mt76:... In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: avoid NULL pointer dereference in mt7996_set_monitor() The function mt7996_set_monitor() dereferences phy before the NULL sanity check. Fix this to avoid NULL pointer dereference by moving the dereference after the check. Scope: local bookworm: resolved bullseye: resolved forky:
debian
CVE-2025-38505LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38505 [MEDIUM] CVE-2025-38505: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mwifi... In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: discard erroneous disassoc frames on STA interface When operating in concurrent STA/AP mode with host MLME enabled, the firmware incorrectly sends disassociation frames to the STA interface when clients disconnect from the AP interface. This causes kernel warnings as the STA interface
debian
CVE-2025-38128LOWCVSS 5.52025
CVE-2025-38128 [MEDIUM] CVE-2025-38128: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: reject malformed HCI_CMD_SYNC commands In 'mgmt_hci_cmd_sync()', check whether the size of parameters passed in 'struct mgmt_cp_hci_cmd_sync' matches the total size of the data (i.e. 'sizeof(struct mgmt_cp_hci_cmd_sync)' plus trailing bytes). Otherwise, large invalid 'params_len' wi
debian
CVE-2025-38407LOWCVSS 5.5fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38407 [MEDIUM] CVE-2025-38407: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: cpu_... In the Linux kernel, the following vulnerability has been resolved: riscv: cpu_ops_sbi: Use static array for boot_data Since commit 6b9f29b81b15 ("riscv: Enable pcpu page first chunk allocator"), if NUMA is enabled, the page percpu allocator may be used on very sparse configurations, or when requested on boot with percpu_alloc=page. In that case, percpu data gets pu
debian
CVE-2025-68744LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68744 [LOW] CVE-2025-68744: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Free s... In the Linux kernel, the following vulnerability has been resolved: bpf: Free special fields when update [lru_,]percpu_hash maps As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the map gets freed. Fix this by calli
debian
CVE-2025-37870LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37870 [MEDIUM] CVE-2025-37870: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: prevent hang on link training fail [Why] When link training fails, the phy clock will be disabled. However, in enable_streams, it is assumed that link training succeeded and the mux selects the phy clock, causing a hang when a register write is made. [How] When enable_stream is hit,
debian
CVE-2025-38010LOWCVSS 5.5fixed in linux 6.12.30-1 (forky)2025
CVE-2025-38010 [MEDIUM] CVE-2025-38010: linux - In the Linux kernel, the following vulnerability has been resolved: phy: tegra:... In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking The current implementation uses bias_pad_enable as a reference count to manage the shared bias pad for all UTMI PHYs. However, during system suspension with connected USB devices, multiple power-down requests for the UTMI pad result i
debian