Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 2 of 665
CVE-2026-23234HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23234 [HIGH] CVE-2026-23234: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by below race condition: loop device umount - worker_thread - loop_process_work - do_req_filebacked - lo_rw_aio - lo_rw_aio_complete - blk_mq_end_request - blk_update_request -
debian
CVE-2026-23340HIGHCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23340 [HIGH] CVE-2026-23340: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:... In the Linux kernel, the following vulnerability has been resolved: net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs When shrinking the number of real tx queues, netif_set_real_num_tx_queues() calls qdisc_reset_all_tx_gt() to flush qdiscs for queues which will no longer be used. qdisc_reset_all_tx_gt() currently serializes qdisc_reset() wi
debian
CVE-2026-23099HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23099 [HIGH] CVE-2026-23099: linux - In the Linux kernel, the following vulnerability has been resolved: bonding: li... In the Linux kernel, the following vulnerability has been resolved: bonding: limit BOND_MODE_8023AD to Ethernet devices BOND_MODE_8023AD makes sense for ARPHRD_ETHER only. syzbot reported: BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline] BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c
debian
CVE-2026-23193HIGHCVSS 8.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23193 [HIGH] CVE-2026-23193: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe... In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path)
debian
CVE-2026-22980HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22980 [HIGH] CVE-2026-22980: linux - In the Linux kernel, the following vulnerability has been resolved: nfsd: provi... In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with server shutdown and result in memory being accessed after it was freed - reclaim_str_hashtbl in particularly. We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is held while client_tracking_op->init() is cal
debian
CVE-2026-23098HIGHCVSS 8.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23098 [HIGH] CVE-2026-23098: linux - In the Linux kernel, the following vulnerability has been resolved: netrom: fix... In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_route_frame() In nr_route_frame(), old_skb is immediately freed without checking if nr_neigh->ax25 pointer is NULL. Therefore, if nr_neigh->ax25 is NULL, the caller function will free old_skb again, causing a double-free bug. Therefore, to prevent this, we need to modify
debian
CVE-2026-23156HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23156 [HIGH] CVE-2026-23156: linux - In the Linux kernel, the following vulnerability has been resolved: efivarfs: f... In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagation in efivar_entry_get() efivar_entry_get() always returns success even if the underlying __efivar_entry_get() fails, masking errors. This may result in uninitialized heap memory being copied to userspace in the efivarfs_file_read() path. Fix it by returning the error from
debian
CVE-2026-23235HIGHCVSS 7.1fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23235 [HIGH] CVE-2026-23235: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix o... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access and incorrect handling of integer values whose size is not 4 bytes. For example: vm:~# echo 65537 > /sys/fs/f2fs/vde/carve_out vm:~# cat /sys/fs/f2fs/vde/carve_out 65537 vm:~
debian
CVE-2026-23089HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23089 [HIGH] CVE-2026-23089: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed memory. Later when snd_card_register() runs, the OSS mixer layer calls their callbacks and hits
debian
CVE-2026-23231HIGHCVSS 7.8fixed in linux 6.18.14-1 (forky)2026
CVE-2026-23231 [HIGH] CVE-2026-23231: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by n
debian
CVE-2026-23001HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23001 [HIGH] CVE-2026-23001: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: fi... In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing.
debian
CVE-2026-23095HIGHCVSS 7.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23095 [HIGH] CVE-2026-23095: linux - In the Linux kernel, the following vulnerability has been resolved: gue: Fix sk... In the Linux kernel, the following vulnerability has been resolved: gue: Fix skb memleak with inner IP protocol 0. syzbot reported skb memleak below. [0] The repro generated a GUE packet with its inner protocol 0. gue_udp_recv() returns -guehdr->proto_ctype for "resubmit" in ip_protocol_deliver_rcu(), but this only works with non-zero protocol number. Let's drop such
debian
CVE-2026-23204HIGHCVSS 7.1fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23204 [HIGH] CVE-2026-23204: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/
debian
CVE-2026-23268HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23268 [HIGH] CVE-2026-23268: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f... In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged local user can do privileged policy management An unprivileged local user can load, replace, and remove profiles by opening the apparmorfs interfaces, via a confused deputy attack, by passing the opened fd to a privileged process, and getting the privileged process to write
debian
CVE-2026-23408HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23408 [HIGH] CVE-2026-23408: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: F... In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix double free of ns_name in aa_replace_profiles() if ns_name is NULL after 1071 error = aa_unpack(udata, &lh, &ns_name); and if ent->ns_name contains an ns_name in 1089 } else if (ent->ns_name) { then ns_name is assigned the ent->ns_name 1095 ns_name = ent->ns_name; however ent->ns_name is
debian
CVE-2026-23227HIGHCVSS 7.8fixed in linux 6.18.12-1 (forky)2026
CVE-2026-23227 [HIGH] CVE-2026-23227: linux - In the Linux kernel, the following vulnerability has been resolved: drm/exynos:... In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free Exynos Virtual Display driver performs memory alloc/free operations without lock protection, which easily causes concurrency problem. For example, use-after-free can occur in race scenario like
debian
CVE-2026-23222HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23222 [HIGH] CVE-2026-23222: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: oma... In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly The existing allocation of scatterlists in omap_crypto_copy_sg_lists() was allocating an array of scatterlist pointers, not scatterlist objects, resulting in a 4x too small allocation. Use sizeof(*new_sg) to get the correct object s
debian
CVE-2026-23102HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23102 [HIGH] CVE-2026-23102: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/fpsim... In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Fix restoration of SVE context When SME is supported, Restoring SVE signal context can go wrong in a few ways, including placing the task into an invalid state where the kernel may read from out-of-bounds memory (and may potentially take a fatal fault) and/or may kill the task wi
debian
CVE-2026-23083HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23083 [HIGH] CVE-2026-23083: linux - In the Linux kernel, the following vulnerability has been resolved: fou: Don't ... In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR_IPPROTO. fou_udp_recv() has the same problem mentioned in the previous patch. If FOU_ATTR_IPPROTO is set to 0, skb is not freed by fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu(). Let's forbid 0 for FOU_ATTR_IPPROTO. Scope: local bookworm: resolved (fixed
debian
CVE-2026-23068HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23068 [HIGH] CVE-2026-23068: linux - In the Linux kernel, the following vulnerability has been resolved: spi: spi-sp... In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_handler() fails, the code jumps to the put_ctlr label and calls spi_controller_put(). However, si
debian
Debian Linux vulnerabilities | cvebase