Debian Security Vulnerabilities (CVEs)

Track 1,405 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

182 Critical
923 High
300 Medium
🔔 Get Alerts for Debian
CVE-2025-21605 7.5

CVE-2025-21605 is a memory exhaustion vulnerability in Redis where unauthenticated clients can cause unlimited growth of output buffers, leading to se...

Apr 23, 2025
CVE-2025-38637 5.5

A Linux kernel vulnerability in the SKBPRIO queue discipline (qdisc) causes assertion failures when used as a child qdisc under TBF (Token Bucket Filt...

Apr 18, 2025
CVE-2025-32433 10.0

This CVE describes a critical vulnerability in Erlang/OTP's SSH server that allows unauthenticated remote code execution. Attackers can exploit a flaw...

Apr 16, 2025
CVE-2025-2291 8.1

This vulnerability in PgBouncer allows attackers to authenticate with expired passwords when using auth_query mode. The connection pooler fails to che...

Apr 16, 2025
CVE-2025-22119 5.5

A race condition vulnerability in the Linux kernel's cfg80211 WiFi subsystem where wiphy_work_lock is accessed before proper initialization when rfkil...

Apr 16, 2025
CVE-2025-32728 4.3

OpenSSH versions before 10.0 have a bug where the DisableForwarding directive fails to properly disable X11 and agent forwarding as documented. This a...

Apr 10, 2025
CVE-2025-29769 5.5

A heap buffer overflow vulnerability in libvips' heifsave operation when processing specially crafted TIFF images with 4 channels. This could cause ap...

Apr 7, 2025
CVE-2025-3155 7.4

CVE-2025-3155 is a vulnerability in Yelp (the GNOME help application) that allows malicious help documents to execute arbitrary scripts. This could en...

Apr 3, 2025
CVE-2025-21950 7.1

This CVE describes an information disclosure vulnerability in the Linux kernel's ACRN hypervisor subsystem. The vulnerability allows uninitialized ker...

Apr 1, 2025
CVE-2023-52935 7.8

This is a race condition vulnerability in the Linux kernel's memory management subsystem (khugepaged) that can lead to use-after-free access. It affec...

Mar 27, 2025
CVE-2024-40635 4.6

A vulnerability in containerd allows containers launched with UID/GID values exceeding 32-bit signed integer limits to overflow and run as root (UID 0...

Mar 17, 2025
CVE-2023-52927 7.8

This Linux kernel vulnerability in the netfilter subsystem allows expectations (exp) to remain in hash tables when they should be removed, potentially...

Mar 14, 2025
CVE-2025-24201 10.0

This critical vulnerability allows malicious web content to break out of the Web Content sandbox via an out-of-bounds write issue, potentially enablin...

Mar 11, 2025
CVE-2025-27363 8.1

This CVE describes an out-of-bounds write vulnerability in FreeType versions 2.13.0 and below when parsing TrueType GX and variable font files. The vu...

Mar 11, 2025
CVE-2025-24813 9.8

This vulnerability in Apache Tomcat allows path traversal attacks via internal dot handling in filenames, potentially leading to remote code execution...

Mar 10, 2025
CVE-2025-26699 5.0

A denial-of-service vulnerability exists in Django's text wrapping functions when processing extremely long strings. Attackers can cause excessive CPU...

Mar 6, 2025
CVE-2024-58054 7.1

A use-after-free vulnerability in the Linux kernel's max96712 media driver causes a kernel oops (crash) when removing the module. This affects systems...

Mar 6, 2025
CVE-2025-27516 8.8

CVE-2025-27516 is a sandbox escape vulnerability in Jinja templating engine that allows attackers who control template content to execute arbitrary Py...

Mar 5, 2025
CVE-2025-1080 7.8

This vulnerability in LibreOffice allows attackers to craft malicious links using the 'vnd.libreoffice.command' URI scheme that can execute internal m...

Mar 4, 2025
CVE-2025-0838 9.8

This CVE describes a heap buffer overflow vulnerability in Abseil-cpp's hash containers where oversized size arguments can cause integer overflow and ...

Feb 21, 2025
CVE-2025-25475 7.5

A NULL pointer dereference vulnerability in DCMTK's DICOM file processing component allows attackers to cause denial of service by sending specially c...

Feb 18, 2025
CVE-2025-22921 6.5

This vulnerability in FFmpeg's JPEG2000 decoder allows attackers to cause a segmentation fault (crash) by processing specially crafted JPEG2000 images...

Feb 18, 2025
CVE-2025-26465 6.8

This OpenSSH vulnerability allows machine-in-the-middle attacks when VerifyHostKeyDNS is enabled. Attackers can impersonate legitimate servers by expl...

Feb 18, 2025
CVE-2025-23419 4.3

This CVE describes a client certificate authentication bypass vulnerability in nginx when multiple server blocks share the same IP/port. Attackers can...

Feb 5, 2025
CVE-2025-0781 8.6

CVE-2025-0781 is a sandbox escape vulnerability in FlightGear's Nasal scripting engine that allows attackers to write arbitrary files to any location ...

Jan 28, 2025
CVE-2025-21490 4.9

This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...

Jan 21, 2025
CVE-2024-50349 4.7

This vulnerability allows attackers to craft malicious Git repository URLs containing ANSI escape sequences that manipulate terminal output during cre...

Jan 14, 2025
CVE-2024-52006 7.5

This vulnerability allows attackers to inject malicious commands into Git credential helpers by exploiting how some ecosystems interpret carriage retu...

Jan 14, 2025
CVE-2024-56374 5.8

This vulnerability in Django allows attackers to cause denial-of-service by sending specially crafted IPv6 addresses to vulnerable validation function...

Jan 14, 2025
CVE-2023-27539 5.3

CVE-2023-27539 is a denial-of-service vulnerability in Rack's header parsing component that allows attackers to cause excessive memory consumption by ...

Jan 9, 2025
CVE-2024-46981 7.0

This CVE describes a use-after-free vulnerability in Redis where an authenticated user can craft a malicious Lua script to manipulate the garbage coll...

Jan 6, 2025
CVE-2024-56644 5.5

This CVE describes a memory leak vulnerability in the Linux kernel's IPv6 networking stack where expired exception destination cache entries are not p...

Dec 27, 2024
CVE-2024-53197 7.8

This vulnerability in the Linux kernel's ALSA USB audio subsystem allows a malicious USB device to trigger out-of-bounds memory accesses. Attackers co...

Dec 27, 2024
CVE-2024-53150 7.1

This vulnerability in the Linux kernel's USB audio driver allows out-of-bounds memory reads when processing malicious USB audio device descriptors. At...

Dec 24, 2024
CVE-2024-47606 9.8

This vulnerability in GStreamer's qtdemux component allows integer underflow leading to heap corruption and arbitrary code execution. Attackers can ex...

Dec 12, 2024
CVE-2024-53566 5.5

A path traversal vulnerability in the action_listcategories() function of Asterisk allows attackers to access files outside the intended directory. Th...

Dec 2, 2024
CVE-2024-53104 7.8

This CVE is an out-of-bounds write vulnerability in the Linux kernel's UVC video driver (uvcvideo). Attackers could exploit this to crash the system o...

Dec 2, 2024
CVE-2024-44309 6.1

This vulnerability in Apple's Safari browser and related operating systems allows cross-site scripting (XSS) attacks due to improper cookie management...

Nov 20, 2024
CVE-2024-52316 9.8

This vulnerability in Apache Tomcat allows authentication bypass when using custom Jakarta Authentication components that throw exceptions without set...

Nov 18, 2024
CVE-2024-10978 4.2

This PostgreSQL vulnerability allows a less-privileged application user to view or modify unintended database rows when the application uses SET ROLE ...

Nov 14, 2024
CVE-2024-49369 9.8

CVE-2024-49369 is a critical TLS certificate validation flaw in Icinga 2 that allows attackers to impersonate trusted cluster nodes and API users usin...

Nov 12, 2024
CVE-2024-52533 9.8

This vulnerability is a buffer overflow in GLib's SOCKS4 proxy implementation due to an off-by-one error. It allows attackers to execute arbitrary cod...

Nov 11, 2024
CVE-2024-46952 7.8

This vulnerability in Artifex Ghostscript allows buffer overflow during PDF XRef stream handling, potentially enabling remote code execution. It affec...

Nov 10, 2024
CVE-2024-46956 7.8

This vulnerability in Ghostscript allows out-of-bounds memory access in the filenameforall function, which could lead to arbitrary code execution. It ...

Nov 10, 2024
CVE-2024-47685 9.1

This CVE-2024-47685 is a Linux kernel vulnerability in the netfilter IPv6 rejection module where uninitialized memory from TCP header reserved bits co...

Oct 21, 2024
CVE-2024-41311 8.1

CVE-2024-41311 is an out-of-bounds read/write vulnerability in Libheif's ImageOverlay::parse() function when processing malicious HEIF files with forg...

Oct 15, 2024
CVE-2024-9680 9.8

This critical vulnerability allows remote attackers to execute arbitrary code by exploiting a use-after-free flaw in Firefox's animation timeline impl...

Oct 9, 2024
CVE-2024-47175 8.6

CVE-2024-47175 is a vulnerability in CUPS libppd where the ppdCreatePPDFromIPP2 function fails to sanitize IPP attributes when creating PPD buffers. T...

Sep 26, 2024
CVE-2024-46544 5.9

This vulnerability allows local users on Unix-like systems to view and modify shared memory containing mod_jk configuration due to incorrect default p...

Sep 23, 2024
CVE-2024-42472 10.0

This vulnerability in Flatpak allows malicious or compromised applications using persistent directories to escape sandbox restrictions and access/writ...

Aug 15, 2024

Why Monitor Debian Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,405+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.

Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Debian CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Debian CVEs Free