Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Debian — Vulnerabilities & Security Advisories 24

Browse all 24 CVE security advisories affecting Debian. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Debian is a free operating system primarily used as a server backend and development environment for Linux-based applications. Its extensive package repository and strict adherence to free software guidelines make it a foundational choice for enterprise infrastructure. Historically, vulnerabilities within Debian packages have frequently involved remote code execution and privilege escalation, often stemming from buffer overflows or improper input validation in widely used libraries. Notable incidents include the OpenSSL Heartbleed bug, which affected Debian’s default configuration, exposing sensitive memory data. The distribution’s security team actively manages these risks through regular updates and the Common Vulnerabilities and Exposures tracking system. With twenty-four recorded CVEs currently, Debian maintains a robust security posture by prioritizing long-term stability and rigorous code auditing, ensuring that critical flaws are patched promptly to protect the vast ecosystem of dependent systems.

CVE IDTitleCVSSSeverityPublished
CVE-2026-2219 dpkg-deb 安全漏洞 — dpkg 5.5 -2026-03-07
CVE-2025-68462 Freedombox 安全漏洞 — FreedomBoxCWE-732 3.2 Low2025-12-18
CVE-2025-8454 Debian devscripts 安全漏洞 — devscripts 6.5 -2025-08-01
CVE-2025-6297 dpkg-deb: Fix cleanup for control member with restricted directories — dpkg 5.5AIMediumAI2025-07-01
CVE-2025-53391 zuluCrypt 安全漏洞 — zulucryptCWE-863 9.3 Critical2025-06-28
CVE-2014-7210 PowerDNS 安全漏洞 — pdns 8.8AIHighAI2025-06-26
CVE-2025-47153 Node.js 安全漏洞 — trixieCWE-1102 6.5 Medium2025-05-01
CVE-2024-2312 GNU grub2 安全漏洞 — Debian based GNU GRUB 6.7 Medium2024-04-05
CVE-2023-7207 CPIO 安全漏洞 — Debian cpio 4.9 Medium2024-01-05
CVE-2022-2787 stricter rules on chroot names — schroot 6.5 -2022-08-27
CVE-2022-1664 directory traversal for in-place extracts with untrusted v2 and v3 source packages with debian.tar — dpkg 8.4 -2022-05-26
CVE-2016-1239 duck 安全漏洞 — duck 9.8 -2022-02-19
CVE-2022-0543 Redis 代码注入漏洞 — redis 10.0 -2022-02-18
CVE-2021-20001 debian 安全漏洞 — debian-edu-config 8.4 -2022-02-11
CVE-2020-3811 qmail-verify 输入验证错误漏洞 — netqmail 7.5 -2020-05-26
CVE-2020-3812 qmail-verify 信息泄露漏洞 — netqmail 5.5 -2020-05-26
CVE-2020-3810 apt 缓冲区错误漏洞 — apt 5.5 -2020-05-15
CVE-2012-1093 Debian x11-common package init脚本安全漏洞 — x11-common 7.8 -2020-02-21
CVE-2019-3467 Debian Edu 安全漏洞 — Debian Edu 8.8 -2019-12-23
CVE-2017-5332 icoutils 缓冲区错误漏洞 — icoutils 8.4 -2019-11-04
CVE-2017-5331 icoutils 输入验证错误漏洞 — icoutils 7.8 -2019-11-04
CVE-2017-5333 icoutils 输入验证错误漏洞 — icoutils 7.8 -2019-11-04
CVE-2018-5735 Backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c:1858 — BIND9 7.5 High2019-10-30
CVE-2017-0359 diffoscope writes to arbitrary locations on disk based on the contents of an untrusted archive — diffoscope 9.8 -2018-04-13

This page lists every published CVE security advisory associated with Debian. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.