Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 16 of 665
CVE-2026-23152LOWCVSS 5.5fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23152 [MEDIUM] CVE-2026-23152: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped. Note that access points should not explicitly report an advertised TTLM with a default mapp
debian
CVE-2026-23018LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23018 [MEDIUM] CVE-2026-23018: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: rele...
In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before initializing extent tree in btrfs_read_locked_inode() In btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree() while holding a path with a read locked leaf from a subvolume tree, and btrfs_init_file_extent_tree() may do a GFP_KERNEL allocation, which can t
debian
CVE-2026-23043LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23043 [LOW] CVE-2026-23043: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix NULL pointer dereference in do_abort_log_replay() Coverity reported a NULL pointer dereference issue (CID 1666756) in do_abort_log_replay(). When btrfs_alloc_path() fails in replay_one_buffer(), wc->subvol_path is NULL, but btrfs_abort_log_replay() calls do_abort_log_replay() which unconditi
debian
CVE-2026-23044LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23044 [LOW] CVE-2026-23044: linux - In the Linux kernel, the following vulnerability has been resolved: PM: hiberna...
In the Linux kernel, the following vulnerability has been resolved: PM: hibernate: Fix crash when freeing invalid crypto compressor When crypto_alloc_acomp() fails, it returns an ERR_PTR value, not NULL. The cleanup code in save_compressed_image() and load_compressed_image() unconditionally calls crypto_free_acomp() without checking for ERR_PTR, which causes crypto_aco
debian
CVE-2026-23429LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23429 [LOW] CVE-2026-23429: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/sva: ...
In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be freed by iommu_domain_free(): iommu_domain_free() mmdrop() __mmdrop() mm_pasid_drop() After iommu_domain_free() returns, accessing domain->mm->iommu_mm may dereference a freed mm structure, leading to a crash. Fix this by mov
debian
CVE-2026-23244LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23244 [LOW] CVE-2026-23244: linux - In the Linux kernel, the following vulnerability has been resolved: nvme: fix m...
In the Linux kernel, the following vulnerability has been resolved: nvme: fix memory allocation in nvme_pr_read_keys() nvme_pr_read_keys() takes num_keys from userspace and uses it to calculate the allocation size for rse via struct_size(). The upper limit is PR_KEYS_MAX (64K). A malicious or buggy userspace can pass a large num_keys value that results in a 4MB allocat
debian
CVE-2026-23412LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23412 [LOW] CVE-2026-23412: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: defer hook memory release until rcu readers are done Yiming Qian reports UaF when concurrent process is dumping hooks via nfnetlink_hooks: BUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0 Read of size 8 at addr ffff888003edbf88 by task poc/79 Call Trace: nfnl_ho
debian
CVE-2026-23470LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23470 [LOW] CVE-2026-23470: linux - In the Linux kernel, the following vulnerability has been resolved: drm/imagina...
In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Fix deadlock in soft reset sequence The soft reset sequence is currently executed from the threaded IRQ handler, hence it cannot call disable_irq() which internally waits for IRQ handlers, i.e. itself, to complete. Use disable_irq_nosync() during a soft reset instead.
Scope: local
book
debian
CVE-2026-23248LOWCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23248 [HIGH] CVE-2026-23248: linux - In the Linux kernel, the following vulnerability has been resolved: perf/core: ...
In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix refcount bug and potential UAF in perf_mmap Syzkaller reported a refcount_t: addition on 0; use-after-free warning in perf_mmap. The issue is caused by a race condition between a failing mmap() setup and a concurrent mmap() on a dependent event (e.g., using output redirection). In perf_
debian
CVE-2026-23053LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23053 [LOW] CVE-2026-23053: linux - In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a ...
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a deadlock involving nfs_release_folio() Wang Zhaolong reports a deadlock involving NFSv4.1 state recovery waiting on kthreadd, which is attempting to reclaim memory by calling nfs_release_folio(). The latter cannot make progress due to state recovery being needed. It seems that the only safe
debian
CVE-2026-23217LOWCVSS 5.5fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23217 [MEDIUM] CVE-2026-23217: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: trac...
In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot deadlock with sbi ecall If sbi_ecall.c's functions are traceable, echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter may get the kernel into a deadlock. (Functions in sbi_ecall.c are excluded from tracing if CONFIG_RISCV_ALTERNATIVE_EARLY is set.) __sbi_ec
debian
CVE-2026-23002LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23002 [MEDIUM] CVE-2026-23002: linux - In the Linux kernel, the following vulnerability has been resolved: lib/buildid...
In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read() for sleepable context Prevent a "BUG: unable to handle kernel NULL pointer dereference in filemap_read_folio". For the sleepable context, convert freader to use __kernel_read() instead of direct page cache access via read_cache_folio(). This simplifies the faultable
debian
CVE-2026-31390LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31390 [LOW] CVE-2026-31390: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix...
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix memory leak in xe_vm_madvise_ioctl When check_bo_args_are_sane() validation fails, jump to the new free_vmas cleanup label to properly free the allocated resources. This ensures proper cleanup in this error path. (cherry picked from commit 29bd06faf727a4b76663e4be0f7d770e2d2a7965)
Scope: lo
debian
CVE-2026-23183LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23183 [LOW] CVE-2026-23183: linux - In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem...
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID: 658 Co
debian
CVE-2026-23436LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23436 [LOW] CVE-2026-23436: linux - In the Linux kernel, the following vulnerability has been resolved: net: shaper...
In the Linux kernel, the following vulnerability has been resolved: net: shaper: protect from late creation of hierarchy We look up a netdev during prep of Netlink ops (pre- callbacks) and take a ref to it. Then later in the body of the callback we take its lock or RCU which are the actual protections. The netdev may get unregistered in between the time we take the ref
debian
CVE-2026-23132LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23132 [MEDIUM] CVE-2026-23132: linux - In the Linux kernel, the following vulnerability has been resolved: drm/bridge:...
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind Fix several issues in dw_dp_bind() error handling: 1. Missing return after drm_bridge_attach() failure - the function continued execution instead of returning an error. 2. Resource leak: drm_dp_aux_register() is not a devm function, so drm_d
debian
CVE-2026-23385LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23385 [LOW] CVE-2026-23385: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: clone set on flush only Syzbot with fault injection triggered a failing memory allocation with GFP_KERNEL which results in a WARN splat: iter.err WARNING: net/netfilter/nf_tables_api.c:845 at nft_map_deactivate+0x34e/0x3c0 net/netfilter/nf_tables_api.c:845, CPU#0: syz.0.17/5992 Mo
debian
CVE-2026-23366LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23366 [LOW] CVE-2026-23366: linux - In the Linux kernel, the following vulnerability has been resolved: drm/client:...
In the Linux kernel, the following vulnerability has been resolved: drm/client: Do not destroy NULL modes 'modes' in drm_client_modeset_probe may fail to kcalloc. If this occurs, we jump to 'out', calling modes_destroy on it, which dereferences it. This may result in a NULL pointer dereference in the error case. Prevent that.
Scope: local
bookworm: resolved
bullseye: r
debian
CVE-2026-23223LOWCVSS 7.8fixed in linux 6.18.12-1 (forky)2026
CVE-2026-23223 [HIGH] CVE-2026-23223: linux - In the Linux kernel, the following vulnerability has been resolved: xfs: fix UA...
In the Linux kernel, the following vulnerability has been resolved: xfs: fix UAF in xchk_btree_check_block_owner We cannot dereference bs->cur when trying to determine if bs->cur aliases bs->sc->sa.{bno,rmap}_cur after the latter has been freed. Fix this by sampling before type before any freeing could happen. The correct temporal ordering was broken when we removed x
debian
CVE-2026-23421LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23421 [LOW] CVE-2026-23421: linux - In the Linux kernel, the following vulnerability has been resolved: drm/xe/conf...
In the Linux kernel, the following vulnerability has been resolved: drm/xe/configfs: Free ctx_restore_mid_bb in release ctx_restore_mid_bb memory is allocated in wa_bb_store(), but xe_config_device_release() only frees ctx_restore_post_bb. Free ctx_restore_mid_bb[0].cs as well to avoid leaking the allocation when the configfs device is removed. (cherry picked from comm
debian