Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 15 of 665
CVE-2026-23376LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23376 [LOW] CVE-2026-23376: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-fcloo... In the Linux kernel, the following vulnerability has been resolved: nvmet-fcloop: Check remoteport port_state before calling done callback In nvme_fc_handle_ls_rqst_work, the lsrsp->done callback is only set when remoteport->port_state is FC_OBJSTATE_ONLINE. Otherwise, the nvme_fc_xmt_ls_rsp's LLDD call to lport->ops->xmt_ls_rsp is expected to fail and the nvme-fc tran
debian
CVE-2026-23413LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23413 [LOW] CVE-2026-23413: linux - In the Linux kernel, the following vulnerability has been resolved: clsact: Fix... In the Linux kernel, the following vulnerability has been resolved: clsact: Fix use-after-free in init/destroy rollback asymmetry Fix a use-after-free in the clsact qdisc upon init/destroy rollback asymmetry. The latter is achieved by first fully initializing a clsact instance, and then in a second step having a replacement failure for the new clsact qdisc instance. cl
debian
CVE-2026-23299LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23299 [LOW] CVE-2026-23299: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: purge error queues in socket destructors When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued into sk_error_queue and will stay there until consumed. If userspace never gets to read the timestamps, or if the controller is removed unexpectedly, these SKBs will leak. Fix by
debian
CVE-2026-22987LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-22987 [MEDIUM] CVE-2026-22987: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot reported a crash in tc_act_in_hw() during netns teardown where tcf_idrinfo_destroy() passed an ERR_PTR(-EBUSY) value as a tc_action pointer, leading to an invalid dereference. Guard against ERR_PTR entries when iterating t
debian
CVE-2026-23166LOWCVSS 5.5fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23166 [MEDIUM] CVE-2026-23166: linux - In the Linux kernel, the following vulnerability has been resolved: ice: Fix NU... In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues Add NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes during resume from suspend when rings[q_idx]->q_vector is NULL. Tested adaptor: 60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for
debian
CVE-2026-23314LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23314 [LOW] CVE-2026-23314: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ... In the Linux kernel, the following vulnerability has been resolved: regulator: bq257xx: Fix device node reference leak in bq257xx_reg_dt_parse_gpio() In bq257xx_reg_dt_parse_gpio(), if fails to get subchild, it returns without calling of_node_put(child), causing the device node reference leak. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in
debian
CVE-2026-23055LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23055 [LOW] CVE-2026-23055: linux - In the Linux kernel, the following vulnerability has been resolved: i2c: riic: ... In the Linux kernel, the following vulnerability has been resolved: i2c: riic: Move suspend handling to NOIRQ phase Commit 53326135d0e0 ("i2c: riic: Add suspend/resume support") added suspend support for the Renesas I2C driver and following this change on RZ/G3E the following WARNING is seen on entering suspend ... [ 134.275704] Freezing remaining freezable tasks compl
debian
CVE-2026-23466LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23466 [LOW] CVE-2026-23466: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe: Ope... In the Linux kernel, the following vulnerability has been resolved: drm/xe: Open-code GGTT MMIO access protection GGTT MMIO access is currently protected by hotplug (drm_dev_enter), which works correctly when the driver loads successfully and is later unbound or unloaded. However, if driver load fails, this protection is insufficient because drm_dev_unplug() is never c
debian
CVE-2026-23189LOWCVSS 5.5fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23189 [MEDIUM] CVE-2026-23189: linux - In the Linux kernel, the following vulnerability has been resolved: ceph: fix N... In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer dereference in ceph_mds_auth_match() The CephFS kernel client has regression starting from 6.18-rc1. We have issue in ceph_mds_auth_match() if fs_name == NULL: const char fs_name = mdsc->fsc->mount_options->mds_namespace; ... if (auth->match.fs_name && strcmp(auth->match.fs_na
debian
CVE-2026-23334LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23334 [LOW] CVE-2026-23334: linux - In the Linux kernel, the following vulnerability has been resolved: can: usb: f... In the Linux kernel, the following vulnerability has been resolved: can: usb: f81604: handle short interrupt urb messages properly If an interrupt urb is received that is not the correct length, properly detect it and don't attempt to treat the data as valid. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 6.19.8-1) sid: resolved (fixed in
debian
CVE-2026-23122LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23122 [MEDIUM] CVE-2026-23122: linux - In the Linux kernel, the following vulnerability has been resolved: igc: Reduce... In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per queue caused TX unit hangs under heavy timestamping load. Reducing to 5 KB avoids these hangs and matches the TSN recommendation in I225/I226 SW User Manual Section 7.5.4. The 8 KB "freed" by this change is currently un
debian
CVE-2026-23285LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23285 [LOW] CVE-2026-23285: linux - In the Linux kernel, the following vulnerability has been resolved: drbd: fix n... In the Linux kernel, the following vulnerability has been resolved: drbd: fix null-pointer dereference on local read error In drbd_request_endio(), READ_COMPLETED_WITH_ERROR is passed to __req_mod() with a NULL peer_device: __req_mod(req, what, NULL, &m); The READ_COMPLETED_WITH_ERROR handler then unconditionally passes this NULL peer_device to drbd_set_out_of_sync(),
debian
CVE-2026-23440LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23440 [LOW] CVE-2026-23440: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ... In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix race condition during IPSec ESN update In IPSec full offload mode, the device reports an ESN (Extended Sequence Number) wrap event to the driver. The driver validates this event by querying the IPSec ASO and checking that the esn_event_arm field is 0x0, which indicates an event has occur
debian
CVE-2026-23261LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23261 [LOW] CVE-2026-23261: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-fc: re... In the Linux kernel, the following vulnerability has been resolved: nvme-fc: release admin tagset if init fails nvme_fabrics creates an NVMe/FC controller in following path: nvmf_dev_write() -> nvmf_create_ctrl() -> nvme_fc_create_ctrl() -> nvme_fc_init_ctrl() nvme_fc_init_ctrl() allocates the admin blk-mq resources right after nvme_add_ctrl() succeeds. If any of the s
debian
CVE-2026-23039LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23039 [LOW] CVE-2026-23039: linux - In the Linux kernel, the following vulnerability has been resolved: drm/gud: fi... In the Linux kernel, the following vulnerability has been resolved: drm/gud: fix NULL fb and crtc dereferences on USB disconnect On disconnect drm_atomic_helper_disable_all() is called which sets both the fb and crtc for a plane to NULL before invoking a commit. This causes a kernel oops on every display disconnect. Add guards for those dereferences. Scope: local bookw
debian
CVE-2026-23344LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23344 [LOW] CVE-2026-23344: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: ccp... In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Fix use-after-free on error path In the error path of sev_tsm_init_locked(), the code dereferences 't' after it has been freed with kfree(). The pr_err() statement attempts to access t->tio_en and t->tio_init_done after the memory has been released. Move the pr_err() call before kfree(t)
debian
CVE-2026-23423LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23423 [LOW] CVE-2026-23423: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: free... In the Linux kernel, the following vulnerability has been resolved: btrfs: free pages on error in btrfs_uring_read_extent() In this function the 'pages' object is never freed in the hopes that it is picked up by btrfs_uring_read_finished() whenever that executes in the future. But that's just the happy path. Along the way previous allocations might have gone wrong, or
debian
CVE-2026-23188LOWCVSS 5.5fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23188 [MEDIUM] CVE-2026-23188: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: r... In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume reset deadlock rtl8152 can trigger device reset during reset which potentially can result in a deadlock: **** DPM device timeout after 10 seconds; 15 seconds until panic **** Call Trace: schedule+0x483/0x1370 schedule_preempt_disabled+0x15/0x30 __mutex_lock_common+0x1fd/0
debian
CVE-2026-31394LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31394 [LOW] CVE-2026-31394: linux - In the Linux kernel, the following vulnerability has been resolved: mac80211: f... In the Linux kernel, the following vulnerability has been resolved: mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations ieee80211_chan_bw_change() iterates all stations and accesses link->reserved.oper via sta->sdata->link[link_id]. For stations on AP_VLAN interfaces (e.g. 4addr WDS clients), sta->sdata points to the VLAN sdata, whose link never partic
debian
CVE-2026-23177LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23177 [LOW] CVE-2026-23177: linux - In the Linux kernel, the following vulnerability has been resolved: mm, shmem: ... In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite loop on truncate race When truncating a large swap entry, shmem_free_swap() returns 0 when the entry's index doesn't match the given index due to lookup alignment. The failure fallback path checks if the entry crosses the end border and aborts when it happens, so truncate wo
debian