Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 10 of 665
CVE-2026-23179LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23179 [LOW] CVE-2026-23179: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: ... In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held. So we need to check if we are in TCP_LISTEN before attempting to ge
debian
CVE-2026-23345LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23345 [LOW] CVE-2026-23345: linux - In the Linux kernel, the following vulnerability has been resolved: arm64: gcs:... In the Linux kernel, the following vulnerability has been resolved: arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled When FEAT_LPA2 is enabled, bits 8-9 of the PTE replace the shareability attribute with bits 50-51 of the output address. The _PAGE_GCS{,_RO} definitions include the PTE_SHARED bits as 0b11 (this matches the other _PAGE_* definiti
debian
CVE-2026-23163LOWCVSS 5.5fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23163 [MEDIUM] CVE-2026-23163: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove On APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and ih2 interrupt ring buffers are not initialized. This is by design, as these secondary IH rings are only available on discrete GPUs. See vega10_ih_sw_init
debian
CVE-2026-23215LOWCVSS 5.5fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23215 [MEDIUM] CVE-2026-23215: linux - In the Linux kernel, the following vulnerability has been resolved: x86/vmware:... In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG: unable to handle page fault for address: 0000000040003e54 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20251119-3.fc
debian
CVE-2026-23260LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23260 [LOW] CVE-2026-23260: linux - In the Linux kernel, the following vulnerability has been resolved: regmap: map... In the Linux kernel, the following vulnerability has been resolved: regmap: maple: free entry on mas_store_gfp() failure regcache_maple_write() allocates a new block ('entry') to merge adjacent ranges and then stores it with mas_store_gfp(). When mas_store_gfp() fails, the new 'entry' remains allocated and is never freed, leaking memory. Free 'entry' on the failure pat
debian
CVE-2026-23127LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23127 [MEDIUM] CVE-2026-23127: linux - In the Linux kernel, the following vulnerability has been resolved: perf: Fix r... In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on event->mmap_count increment When calling refcount_inc(&event->mmap_count) inside perf_mmap_rb(), the following warning is triggered: refcount_t: addition on 0; use-after-free. WARNING: lib/refcount.c:25 PoC: struct perf_event_attr attr = {0}; int fd = syscall(__NR_perf_
debian
CVE-2026-23294LOWCVSS 7.0fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23294 [HIGH] CVE-2026-23294: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ra... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix race in devmap on PREEMPT_RT On PREEMPT_RT kernels, the per-CPU xdp_dev_bulk_queue (bq) can be accessed concurrently by multiple preemptible tasks on the same CPU. The original code assumes bq_enqueue() and __dev_flush() run atomically with respect to each other on the same CPU, relying on lo
debian
CVE-2026-23349LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23349 [LOW] CVE-2026-23349: linux - In the Linux kernel, the following vulnerability has been resolved: HID: pidff:... In the Linux kernel, the following vulnerability has been resolved: HID: pidff: Fix condition effect bit clearing As reported by MPDarkGuy on discord, NULL pointer dereferences were happening because not all the conditional effects bits were cleared. Properly clear all conditional effect bits from ffbit Scope: local bookworm: resolved bullseye: resolved forky: resolved
debian
CVE-2026-23131LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23131 [MEDIUM] CVE-2026-23131: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8... In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names The hp-bioscfg driver attempts to register kobjects with empty names when the HP BIOS returns attributes with empty name strings. This causes multiple kernel warnings: kobject: (00000000135fb5e6): attempted to be registered wit
debian
CVE-2026-23042LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23042 [LOW] CVE-2026-23042: linux - In the Linux kernel, the following vulnerability has been resolved: idpf: fix a... In the Linux kernel, the following vulnerability has been resolved: idpf: fix aux device unplugging when rdma is not supported by vport If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not allocate vdev_info for this vport. This leads to kernel NULL pointer dereference in idpf_idc_vport_dev_down(), which references vdev_info for every vport regard
debian
CVE-2026-23309LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23309 [LOW] CVE-2026-23309: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Ad... In the Linux kernel, the following vulnerability has been resolved: tracing: Add NULL pointer check to trigger_data_free() If trigger_data_alloc() fails and returns NULL, event_hist_trigger_parse() jumps to the out_free error path. While kfree() safely handles a NULL pointer, trigger_data_free() does not. This causes a NULL pointer dereference in trigger_data_free() wh
debian
CVE-2026-23007LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23007 [MEDIUM] CVE-2026-23007: linux - In the Linux kernel, the following vulnerability has been resolved: block: zero... In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity buffer for writes needs to be fully initialized before being passed to the underlying block device, otherwise the uninitialized memory can be read back by userspace or anyone with physical access to the storage device.
debian
CVE-2026-23008LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23008 [MEDIUM] CVE-2026-23008: linux - In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:... In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surfaces so there is no backing buffer for surface backed FBs. This would result in a nullptr dereference and crash the driver causing a black screen. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed
debian
CVE-2026-23358LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23358 [LOW] CVE-2026-23358: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix error handling in slot reset If the device has not recovered after slot reset is called, it goes to out label for error handling. There it could make decision based on uninitialized hive pointer and could result in accessing an uninitialized list. Initialize the list and hive properly s
debian
CVE-2026-23009LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23009 [MEDIUM] CVE-2026-23009: linux - In the Linux kernel, the following vulnerability has been resolved: xhci: sideb... In the Linux kernel, the following vulnerability has been resolved: xhci: sideband: don't dereference freed ring when removing sideband endpoint xhci_sideband_remove_endpoint() incorrecly assumes that the endpoint is running and has a valid transfer ring. Lianqin reported a crash during suspend/wake-up stress testing, and found the cause to be dereferencing a non-ex
debian
CVE-2026-23301LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23301 [LOW] CVE-2026-23301: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA:... In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: Add allocation failure check for Entity name Currently find_sdca_entity_iot() can allocate a string for the Entity name but it doesn't check if that allocation succeeded. Add the missing NULL check after the allocation. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fix
debian
CVE-2026-23311LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23311 [LOW] CVE-2026-23311: linux - In the Linux kernel, the following vulnerability has been resolved: perf/core: ... In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the event scheduling when a pinned event was failed and wakes up the threads in the ring buffer like below. It seems it should not grab a wait-queue lock under perf-context lock. Let's do it with irq_work. [ 39.913691] =======
debian
CVE-2026-23114LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23114 [MEDIUM] CVE-2026-23114: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/fpsim... In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems When SVE is supported but SME is not supported, a ptrace write to the NT_ARM_SVE regset can place the tracee into an invalid state where (non-streaming) SVE register data is stored in FP_STATE_SVE format but TIF_SVE is clear. This can result in a
debian
CVE-2026-23445LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23445 [LOW] CVE-2026-23445: linux - In the Linux kernel, the following vulnerability has been resolved: igc: fix pa... In the Linux kernel, the following vulnerability has been resolved: igc: fix page fault in XDP TX timestamps handling If an XDP application that requested TX timestamping is shutting down while the link of the interface in use is still up the following kernel splat is reported: [ 883.803618] [ T1554] BUG: unable to handle page fault for address: ffffcfb6200fd008 ... [
debian
CVE-2026-23283LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23283 [LOW] CVE-2026-23283: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ... In the Linux kernel, the following vulnerability has been resolved: regulator: fp9931: Fix PM runtime reference leak in fp9931_hwmon_read() In fp9931_hwmon_read(), if regmap_read() failed, the function returned the error code without calling pm_runtime_put_autosuspend(), causing a PM reference leak. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fi
debian
Debian Linux vulnerabilities | cvebase