Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 19 of 665
CVE-2026-23151LOWCVSS 5.5fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23151 [MEDIUM] CVE-2026-23151: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory leak in set_ssp_complete Fix memory leak in set_ssp_complete() where mgmt_pending_cmd structures are not freed after being removed from the pending list. Commit 302a1f674c00 ("Bluetooth: MGMT: Fix possible UAFs") replaced mgmt_pending_foreach() calls with individual comma
debian
CVE-2026-23165LOWCVSS 5.5fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23165 [MEDIUM] CVE-2026-23165: linux - In the Linux kernel, the following vulnerability has been resolved: sfc: fix de... In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS config read Since cited commit, core locks the net_device's rss_lock when handling ethtool -x command, so driver's implementation should not lock it again. Remove the latter. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 6.18.9-1) sid: resolved
debian
CVE-2026-23059LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23059 [LOW] CVE-2026-23059: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: qla2x... In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Sanitize payload size to prevent member overflow In qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size reported by firmware is used to calculate the copy length into item->iocb. However, the iocb member is defined as a fixed-size 64-byte array within struct purex_ite
debian
CVE-2026-23109LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23109 [MEDIUM] CVE-2026-23109: linux - In the Linux kernel, the following vulnerability has been resolved: fs/writebac... In the Linux kernel, the following vulnerability has been resolved: fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes() Above the while() loop in wait_sb_inodes(), we document that we must wait for all pages under writeback for data integrity. Consequently, if a mapping, like fuse, traditionally does not have data integrity semantics, there is no ne
debian
CVE-2026-23415LOWfixed in linux 6.19.11-1 (sid)2026
CVE-2026-23415 [LOW] CVE-2026-23415: linux - In the Linux kernel, the following vulnerability has been resolved: futex: Fix ... In the Linux kernel, the following vulnerability has been resolved: futex: Fix UaF between futex_key_to_node_opt() and vma_replace_policy() During futex_key_to_node_opt() execution, vma->vm_policy is read under speculative mmap lock and RCU. Concurrently, mbind() may call vma_replace_policy() which frees the old mempolicy immediately via kmem_cache_free(). This creates
debian
CVE-2026-23022LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23022 [MEDIUM] CVE-2026-23022: linux - In the Linux kernel, the following vulnerability has been resolved: idpf: fix m... In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak in idpf_vc_core_deinit() Make sure to free hw->lan_regs. Reported by kmemleak during reset: unreferenced object 0xff1b913d02a936c0 (size 96): comm "kworker/u258:14", pid 2174, jiffies 4294958305 hex dump (first 32 bytes): 00 00 00 c0 a8 ba 2d ff 00 00 00 00 00 00 00 00 ......-.
debian
CVE-2026-23029LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23029 [LOW] CVE-2026-23029: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ... In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy() In kvm_ioctl_create_device(), kvm_device has allocated memory, kvm_device->destroy() seems to be supposed to free its kvm_device struct, but kvm_eiointc_destroy() is not currently doing this, that would lead to a memory leak. So, fix it. Scop
debian
CVE-2026-23174LOWfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23174 [LOW] CVE-2026-23174: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-pci: h... In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing device dma map requirements The initial state of dma_needs_unmap may be false, but change to true while mapping the data iterator. Enabling swiotlb is one such case that can change the result. The nvme driver needs to save the mapped dma vectors to be unmapped later, so alloca
debian
CVE-2026-23329LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23329 [LOW] CVE-2026-23329: linux - In the Linux kernel, the following vulnerability has been resolved: libie: don'... In the Linux kernel, the following vulnerability has been resolved: libie: don't unroll if fwlog isn't supported The libie_fwlog_deinit() function can be called during driver unload even when firmware logging was never properly initialized. This led to call trace: [ 148.576156] Oops: Oops: 0000 [#1] SMP NOPTI [ 148.576167] CPU: 80 UID: 0 PID: 12843 Comm: rmmod Kdump: l
debian
CVE-2026-23143LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23143 [MEDIUM] CVE-2026-23143: linux - In the Linux kernel, the following vulnerability has been resolved: virtio_net:... In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment bug in struct virtnet_info Use the new TRAILING_OVERLAP() helper to fix a misalignment bug along with the following warning: drivers/net/virtio_net.c:429:46: warning: structure containing a flexible array member is not at the end of another structure [-Wflex-array-member
debian
CVE-2026-31395LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31395 [LOW] CVE-2026-31395: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: fi... In the Linux kernel, the following vulnerability has been resolved: bnxt_en: fix OOB access in DBG_BUF_PRODUCER async event handler The ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER handler in bnxt_async_event_process() uses a firmware-supplied 'type' field directly as an index into bp->bs_trace[] without bounds validation. The 'type' field is a 16-bit value extracted fro
debian
CVE-2026-23282LOWfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23282 [LOW] CVE-2026-23282: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client... In the Linux kernel, the following vulnerability has been resolved: smb: client: fix oops due to uninitialised var in smb2_unlink() If SMB2_open_init() or SMB2_close_init() fails (e.g. reconnect), the iovs set @rqst will be left uninitialised, hence calling SMB2_open_free(), SMB2_close_free() or smb2_set_related() on them will oops. Fix this by initialising @close_iov
debian
CVE-2026-23241LOWfixed in linux 6.19.6-1 (forky)2026
CVE-2026-23241 [LOW] CVE-2026-23241: linux - In the Linux kernel, the following vulnerability has been resolved: audit: add ... In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to read class The "at" variant of getxattr() and listxattr() are missing from the audit read class. Calling getxattrat() or listxattrat() on a file to read its extended attributes will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds missing
debian
CVE-2026-23041LOWfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23041 [LOW] CVE-2026-23041: linux - In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fi... In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup When bnxt_init_one() fails during initialization (e.g., bnxt_init_int_mode returns -ENODEV), the error path calls bnxt_free_hwrm_resources() which destroys the DMA pool and sets bp->hwrm_dma_pool to NULL. Subsequently, bnxt_ptp_cle
debian
CVE-2026-23070LOWCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23070 [MEDIUM] CVE-2026-23070: linux - In the Linux kernel, the following vulnerability has been resolved: Octeontx2-a... In the Linux kernel, the following vulnerability has been resolved: Octeontx2-af: Add proper checks for fwdata firmware populates MAC address, link modes (supported, advertised) and EEPROM data in shared firmware structure which kernel access via MAC block(CGX/RPM). Accessing fwdata, on boards booted with out MAC block leading to kernel panics. Internal error: Oops:
debian
CVE-2026-23249LOWfixed in linux 6.19.6-1 (forky)2026
CVE-2026-23249 [LOW] CVE-2026-23249: linux - In the Linux kernel, the following vulnerability has been resolved: xfs: check ... In the Linux kernel, the following vulnerability has been resolved: xfs: check for deleted cursors when revalidating two btrees The free space and inode btree repair functions will rebuild both btrees at the same time, after which it needs to evaluate both btrees to confirm that the corruptions are gone. However, Jiaming Zhang ran syzbot and produced a crash in the sec
debian
CVE-2026-22995LOWCVSS 7.8fixed in linux 6.18.8-1 (forky)2026
CVE-2026-22995 [HIGH] CVE-2026-22995: linux - In the Linux kernel, the following vulnerability has been resolved: ublk: fix u... In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists between the async partition scan work and device teardown that can lead to a use-after-free of ub->ub_disk: 1. ublk_ctrl_start_dev() schedules partition_scan_work after add_disk() 2. ublk_stop_dev() calls ublk_stop_dev_unlock
debian
CVE-2026-31397LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31397 [LOW] CVE-2026-31397: linux - In the Linux kernel, the following vulnerability has been resolved: mm/huge_mem... In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd() move_pages_huge_pmd() handles UFFDIO_MOVE for both normal THPs and huge zero pages. For the huge zero page path, src_folio is explicitly set to NULL, and is used as a sentinel to skip folio operations like lock and rmap. In the huge zero pa
debian
CVE-2026-23390LOWfixed in linux 6.18.13-1 (forky)2026
CVE-2026-23390 [LOW] CVE-2026-23390: linux - In the Linux kernel, the following vulnerability has been resolved: tracing/dma... In the Linux kernel, the following vulnerability has been resolved: tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow The dma_map_sg tracepoint can trigger a perf buffer overflow when tracing large scatter-gather lists. With devices like virtio-gpu creating large DRM buffers, nents can exceed 1000 entries, resulting in: phys_addrs: 1000 * 8 bytes
debian
CVE-2026-23400LOWfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23400 [LOW] CVE-2026-23400: linux - In the Linux kernel, the following vulnerability has been resolved: rust_binder... In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The remote process dies and sends a BR_DEAD_BINDER message. 2. The local process invokes the BC_CLEAR_DEATH_NOTIFICATION command. 3. The local process then invokes the BC_DEAD_B
debian