Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 21 of 665
CVE-2026-23454UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23454 CVE-2026-23454: linux - In the Linux kernel, the following vulnerability has been resolved: net: mana: ... In the Linux kernel, the following vulnerability has been resolved: net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown A potential race condition exists in mana_hwc_destroy_channel() where hwc->caller_ctx is freed before the HWC's Completion Queue (CQ) and Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt handler to derefer
debian
CVE-2026-23456UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23456 CVE-2026-23456: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the su
debian
CVE-2026-23286UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23286 CVE-2026-23286: linux - In the Linux kernel, the following vulnerability has been resolved: atm: lec: f... In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix null-ptr-deref in lec_arp_clear_vccs syzkaller reported a null-ptr-deref in lec_arp_clear_vccs(). This issue can be easily reproduced using the syzkaller reproducer. In the ATM LANE (LAN Emulation) module, the same atm_vcc can be shared by multiple lec_arp_table entries (e.g., via entry->vcc or
debian
CVE-2026-23310UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23310 CVE-2026-23310: linux - In the Linux kernel, the following vulnerability has been resolved: bpf/bonding... In the Linux kernel, the following vulnerability has been resolved: bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded bond_option_mode_set() already rejects mode changes that would make a loaded XDP program incompatible via bond_xdp_check(). However, bond_option_xmit_hash_policy_set() has no such guard. For 802.3ad and balance-xor modes, bond_xdp_che
debian
CVE-2026-23396UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23396 CVE-2026-23396: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80... In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL deref in mesh_matches_local() mesh_matches_local() unconditionally dereferences ie->mesh_config to compare mesh configuration parameters. When called from mesh_rx_csa_frame(), the parsed action-frame elements may not contain a Mesh Configuration IE, leaving ie->mesh_config NULL and t
debian
CVE-2026-23265UNKNOWNfixed in linux 6.18.13-1 (forky)2026
CVE-2026-23265 CVE-2026-23265: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on node footer in {read,write}_end_io -----------[ cut here ]------------ kernel BUG at fs/f2fs/data.c:358! Call Trace: blk_update_request+0x5eb/0xe70 block/blk-mq.c:987 blk_mq_end_request+0x3e/0x70 block/blk-mq.c:1149 blk_complete_reqs block/blk-mq.c:1224 [inline] blk_done_softi
debian
CVE-2026-23403UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23403 CVE-2026-23403: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f... In the Linux kernel, the following vulnerability has been resolved: apparmor: fix memory leak in verify_header The function sets `*ns = NULL` on every call, leaking the namespace string allocated in previous iterations when multiple profiles are unpacked. This also breaks namespace consistency checking since *ns is always NULL when the comparison is made. Remove the incorrec
debian
CVE-2026-23452UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23452 CVE-2026-23452: linux - In the Linux kernel, the following vulnerability has been resolved: PM: runtime... In the Linux kernel, the following vulnerability has been resolved: PM: runtime: Fix a race condition related to device removal The following code in pm_runtime_work() may dereference the dev->parent pointer after the parent device has been freed: /* Maybe the parent is now able to suspend. */ if (parent && !parent->power.ignore_children) { spin_unlock(&dev->power.lock); spi
debian
CVE-2026-23472UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23472 CVE-2026-23472: linux - In the Linux kernel, the following vulnerability has been resolved: serial: cor... In the Linux kernel, the following vulnerability has been resolved: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN uart_write_room() and uart_write() behave inconsistently when xmit_buf is NULL (which happens for PORT_UNKNOWN ports that were never properly initialized): - uart_write_room() returns kfifo_avail() which can be > 0 - uart_write() checks xmit_buf
debian
CVE-2026-23361UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23361 CVE-2026-23361: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: dwc: e... In the Linux kernel, the following vulnerability has been resolved: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry Endpoint drivers use dw_pcie_ep_raise_msix_irq() to raise an MSI-X interrupt to the host using a writel(), which generates a PCI posted write transaction. There's no completion for posted writes, so the writel() may return before the PCI write co
debian
CVE-2026-23292UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23292 CVE-2026-23292: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe... In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix recursive locking in __configfs_open_file() In flush_write_buffer, &p->frag_sem is acquired and then the loaded store function is called, which, here, is target_core_item_dbroot_store(). This function called filp_open(), following which these functions were called (in reverse order), accord
debian
CVE-2026-23419UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23419 CVE-2026-23419: linux - In the Linux kernel, the following vulnerability has been resolved: net/rds: Fi... In the Linux kernel, the following vulnerability has been resolved: net/rds: Fix circular locking dependency in rds_tcp_tune syzbot reported a circular locking dependency in rds_tcp_tune() where sk_net_refcnt_upgrade() is called while holding the socket lock: ====================================================== WARNING: possible circular locking dependency detected =======
debian
CVE-2026-23475UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23475 CVE-2026-23475: linux - In the Linux kernel, the following vulnerability has been resolved: spi: fix st... In the Linux kernel, the following vulnerability has been resolved: spi: fix statistics allocation The controller per-cpu statistics is not allocated until after the controller has been registered with driver core, which leaves a window where accessing the sysfs attributes can trigger a NULL-pointer dereference. Fix this by moving the statistics allocation to controller allo
debian
CVE-2026-23264UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23264 CVE-2026-23264: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "drm... In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts commit 7294863a6f01248d72b61d38478978d638641bee. This commit was erroneously applied again after commit 0ab5d711ec74 ("drm/amd: Refactor `amdgpu_aspm` to be evaluated per device") removed it, leading to very hard to debug crashes, wh
debian
CVE-2026-23420UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23420 CVE-2026-23420: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: wlcor... In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: Fix a locking bug Make sure that wl->mutex is locked before it is unlocked. This has been detected by the Clang thread-safety analyzer. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 6.19.8-1) sid: resolved (fixed in 6.19.8-1) trixie: open
debian
CVE-2026-23394UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23394 CVE-2026-23394: linux - In the Linux kernel, the following vulnerability has been resolved: af_unix: Gi... In the Linux kernel, the following vulnerability has been resolved: af_unix: Give up GC if MSG_PEEK intervened. Igor Ushakov reported that GC purged the receive queue of an alive socket due to a race with MSG_PEEK with a nice repro. This is the exact same issue previously fixed by commit cbcf01128d0a ("af_unix: fix garbage collect vs MSG_PEEK"). After GC was replaced with th
debian
CVE-2026-23049UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23049 CVE-2026-23049: linux - In the Linux kernel, the following vulnerability has been resolved: drm/panel-s... In the Linux kernel, the following vulnerability has been resolved: drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel The connector type for the DataImage SCF0700C48GGU18 panel is missing and devm_drm_panel_bridge_add() requires connector type to be set. This leads to a warning and a backtrace in the kernel log and panel does not work: " WARNING: CPU:
debian
CVE-2026-31405UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31405 CVE-2026-31405: linux - In the Linux kernel, the following vulnerability has been resolved: media: dvb-... In the Linux kernel, the following vulnerability has been resolved: media: dvb-net: fix OOB access in ULE extension header tables The ule_mandatory_ext_handlers[] and ule_optional_ext_handlers[] tables in handle_one_ule_extension() are declared with 255 elements (valid indices 0-254), but the index htype is derived from network-controlled data as (ule_sndu_type & 0x00FF), gi
debian
CVE-2026-23382UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23382 CVE-2026-23382: linux - In the Linux kernel, the following vulnerability has been resolved: HID: Add HI... In the Linux kernel, the following vulnerability has been resolved: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them In commit 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at raw event handle"), we handle the fact that raw event callbacks can happen even for a HID device that has not been "claimed" causing a crash if a broken device were a
debian
CVE-2026-31410UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31410 CVE-2026-31410: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: use ... In the Linux kernel, the following vulnerability has been resolved: ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION Use sb->s_uuid for a proper volume identifier as the primary choice. For filesystems that do not provide a UUID, fall back to stfs.f_fsid obtained from vfs_statfs(). Scope: local bookworm: open bullseye: open forky: resolved (fixed in 6.19.10-1) sid: resolve
debian