Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 97 of 665
CVE-2025-39958LOWCVSS 7.8fixed in linux 6.16.9-1 (forky)2025
CVE-2025-39958 [HIGH] CVE-2025-39958: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/s390:...
In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Make attach succeed when the device was surprise removed When a PCI device is removed with surprise hotplug, there may still be attempts to attach the device to the default domain as part of tear down via (__iommu_release_dma_ownership()), or because the removal happens during probe (__iom
debian
CVE-2025-22098LOWCVSS 5.52025
CVE-2025-22098 [MEDIUM] CVE-2025-22098: linux - In the Linux kernel, the following vulnerability has been resolved: drm: zynqmp...
In the Linux kernel, the following vulnerability has been resolved: drm: zynqmp_dp: Fix a deadlock in zynqmp_dp_ignore_hpd_set() Instead of attempting the same mutex twice, lock and unlock it. This bug has been detected by the Clang thread-safety analyzer.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-38318LOWCVSS 5.5fixed in linux 6.12.35-1 (forky)2025
CVE-2025-38318 [MEDIUM] CVE-2025-38318: linux - In the Linux kernel, the following vulnerability has been resolved: perf: arm-n...
In the Linux kernel, the following vulnerability has been resolved: perf: arm-ni: Fix missing platform_set_drvdata() Add missing platform_set_drvdata in arm_ni_probe(), otherwise calling platform_get_drvdata() in remove returns NULL.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.12.35-1)
sid: resolved (fixed in 6.12.35-1)
trixie: res
debian
CVE-2025-40031LOWfixed in linux 6.17.6-1 (forky)2025
CVE-2025-40031 [LOW] CVE-2025-40031: linux - In the Linux kernel, the following vulnerability has been resolved: tee: fix re...
In the Linux kernel, the following vulnerability has been resolved: tee: fix register_shm_helper() In register_shm_helper(), fix incorrect error handling for a call to iov_iter_extract_pages(). A case is missing for when iov_iter_extract_pages() only got some pages and return a number larger than 0, but not the requested amount. This fixes a possible NULL pointer deref
debian
CVE-2025-38355LOWCVSS 5.5fixed in linux 6.12.37-1 (forky)2025
CVE-2025-38355 [MEDIUM] CVE-2025-38355: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe: Pro...
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Process deferred GGTT node removals on device unwind While we are indirectly draining our dedicated workqueue ggtt->wq that we use to complete asynchronous removal of some GGTT nodes, this happends as part of the managed-drm unwinding (ggtt_fini_early), which could be later then manage-devic
debian
CVE-2025-68333LOWCVSS 5.5fixed in linux 6.17.12-1 (forky)2025
CVE-2025-68333 [MEDIUM] CVE-2025-68333: linux - In the Linux kernel, the following vulnerability has been resolved: sched_ext: ...
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix possible deadlock in the deferred_irq_workfn() For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in the per-cpu irq_work/* task context and not disable-irq, if the rq returned by container_of() is current CPU's rq, the following scenarios may occur: lock(&rq->__lock); lo
debian
CVE-2025-37872LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-37872 [MEDIUM] CVE-2025-37872: linux - In the Linux kernel, the following vulnerability has been resolved: net: txgbe:...
In the Linux kernel, the following vulnerability has been resolved: net: txgbe: fix memory leak in txgbe_probe() error path When txgbe_sw_init() is called, memory is allocated for wx->rss_key in wx_init_rss_key(). However, in txgbe_probe() function, the subsequent error paths after txgbe_sw_init() don't free the rss_key. Fix that by freeing it in error path along wi
debian
CVE-2025-38054LOWCVSS 5.5fixed in linux 6.12.32-1 (forky)2025
CVE-2025-38054 [MEDIUM] CVE-2025-38054: linux - In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: L...
In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: Limit signal/freq counts in summary output functions The debugfs summary output could access uninitialized elements in the freq_in[] and signal_out[] arrays, causing NULL pointer dereferences and triggering a kernel Oops (page_fault_oops). This patch adds u8 fields (nr_freq_in, nr_signal_o
debian
CVE-2025-71203LOWCVSS 7.0fixed in linux 6.18.10-1 (forky)2025
CVE-2025-71203 [HIGH] CVE-2025-71203: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: Sani...
In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table. Use array_index_nospec() to clamp this value after the bounds check to prevent speculative out-of-bounds access and subsequent data leakage via cache side channe
debian
CVE-2025-37918LOWCVSS 5.5fixed in linux 6.12.29-1 (forky)2025
CVE-2025-37918 [MEDIUM] CVE-2025-37918: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() A NULL pointer dereference can occur in skb_dequeue() when processing a QCA firmware crash dump on WCN7851 (0489:e0f3). [ 93.672166] Bluetooth: hci0: ACL memdump size(589824) [ 93.672475] BUG: kernel NULL pointer dereference, address:
debian
CVE-2025-68316LOWfixed in linux 6.17.8-1 (forky)2025
CVE-2025-68316 [LOW] CVE-2025-68316: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix invalid probe error return value After DME Link Startup, the error return value is set to the MIPI UniPro GenericErrorCode which can be 0 (SUCCESS) or 1 (FAILURE). Upon failure during driver probe, the error code 1 is propagated back to the driver probe function which must return a
debian
CVE-2025-38314LOWCVSS 5.52025
CVE-2025-38314 [MEDIUM] CVE-2025-38314: linux - In the Linux kernel, the following vulnerability has been resolved: virtio-pci:...
In the Linux kernel, the following vulnerability has been resolved: virtio-pci: Fix result size returned for the admin command completion The result size returned by virtio_pci_admin_dev_parts_get() is 8 bytes larger than the actual result data size. This occurs because the result_sg_size field of the command is filled with the result length from virtqueue_get_buf()
debian
CVE-2025-68739LOWfixed in linux 6.17.13-1 (forky)2025
CVE-2025-68739 [LOW] CVE-2025-68739: linux - In the Linux kernel, the following vulnerability has been resolved: PM / devfre...
In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: hisi: Fix potential UAF in OPP handling Ensure all required data is acquired before calling dev_pm_opp_put(opp) to maintain correct resource acquisition and release order.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 6.17.13-1)
sid: resolved (fixed in 6.17.
debian
CVE-2025-21828LOWCVSS 5.5fixed in linux 6.12.13-1 (forky)2025
CVE-2025-21828 [MEDIUM] CVE-2025-21828: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs If STA state is pre-moved to AUTHORIZED (such as in IBSS scenarios) and insertion fails, the station is freed. In this case, the driver never knew about the station, so trying to flush it is unexpected and may crash. Check if the sta was uploaded to the
debian
CVE-2025-21733LOWCVSS 5.5fixed in linux 6.12.15-1 (forky)2025
CVE-2025-21733 [MEDIUM] CVE-2025-21733: linux - In the Linux kernel, the following vulnerability has been resolved: tracing/osn...
In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Fix resetting of tracepoints If a timerlat tracer is started with the osnoise option OSNOISE_WORKLOAD disabled, but then that option is enabled and timerlat is removed, the tracepoints that were enabled on timerlat registration do not get disabled. If the option is disabled again an
debian
CVE-2025-22069LOWCVSS 7.82025
CVE-2025-22069 [HIGH] CVE-2025-22069: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: fgra...
In the Linux kernel, the following vulnerability has been resolved: riscv: fgraph: Fix stack layout to match __arch_ftrace_regs argument of ftrace_return_to_handler Naresh Kamboju reported a "Bad frame pointer" kernel warning while running LTP trace ftrace_stress_test.sh in riscv. We can reproduce the same issue with the following command: ``` $ cd /sys/kernel/debug/t
debian
CVE-2025-21895LOWCVSS 4.7fixed in linux 6.12.19-1 (forky)2025
CVE-2025-21895 [MEDIUM] CVE-2025-21895: linux - In the Linux kernel, the following vulnerability has been resolved: perf/core: ...
In the Linux kernel, the following vulnerability has been resolved: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list Syskaller triggers a warning due to prev_epc->pmu != next_epc->pmu in perf_event_swap_task_ctx_data(). vmcore shows that two lists have the same perf_event_pmu_context, but not in the same order. The problem is that the order
debian
CVE-2025-38648LOWCVSS 5.5fixed in linux 6.16.3-1 (forky)2025
CVE-2025-38648 [MEDIUM] CVE-2025-38648: linux - In the Linux kernel, the following vulnerability has been resolved: spi: stm32:...
In the Linux kernel, the following vulnerability has been resolved: spi: stm32: Check for cfg availability in stm32_spi_probe The stm32_spi_probe function now includes a check to ensure that the pointer returned by of_device_get_match_data is not NULL before accessing its members. This resolves a warning where a potential NULL pointer dereference could occur when ac
debian
CVE-2025-39698LOWCVSS 5.5fixed in linux 6.16.5-1 (forky)2025
CVE-2025-39698 [MEDIUM] CVE-2025-39698: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/fu...
In the Linux kernel, the following vulnerability has been resolved: io_uring/futex: ensure io_futex_wait() cleans up properly on failure The io_futex_data is allocated upfront and assigned to the io_kiocb async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at that point. Those two should always go together, as the flag tells io_uring whether the fie
debian
CVE-2025-38240LOWCVSS 5.5fixed in linux 6.12.25-1 (forky)2025
CVE-2025-38240 [MEDIUM] CVE-2025-38240: linux - In the Linux kernel, the following vulnerability has been resolved: drm/mediate...
In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr The function mtk_dp_wait_hpd_asserted() may be called before the `mtk_dp->drm_dev` pointer is assigned in mtk_dp_bridge_attach(). Specifically it can be called via this callpath: - mtk_edp_wait_hpd_asserted - [panel probe] - dp_aux_e
debian