Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 22 of 665
CVE-2026-23471UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23471 CVE-2026-23471: linux - In the Linux kernel, the following vulnerability has been resolved: drm: Fix us...
In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug When trying to do a rather aggressive test of igt's "xe_module_load --r reload" with a full desktop environment and game running I noticed a few OOPSes when dereferencing freed pointers, related to framebuffers and propert
debian
CVE-2026-23284UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23284 CVE-2026-23284: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern...
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() Reset eBPF program pointer to old_prog and do not decrease its ref-count if mtk_open routine in mtk_xdp_setup() fails.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 6.19.8-1)
sid: resolved (f
debian
CVE-2026-23348UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23348 CVE-2026-23348: linux - In the Linux kernel, the following vulnerability has been resolved: cxl: Fix ra...
In the Linux kernel, the following vulnerability has been resolved: cxl: Fix race of nvdimm_bus object when creating nvdimm objects Found issue during running of cxl-translate.sh unit test. Adding a 3s sleep right before the test seems to make the issue reproduce fairly consistently. The cxl_translate module has dependency on cxl_acpi and causes orphaned nvdimm objects to re
debian
CVE-2026-23389UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23389 CVE-2026-23389: linux - In the Linux kernel, the following vulnerability has been resolved: ice: Fix me...
In the Linux kernel, the following vulnerability has been resolved: ice: Fix memory leak in ice_set_ringparam() In ice_set_ringparam, tx_rings and xdp_rings are allocated before rx_rings. If the allocation of rx_rings fails, the code jumps to the done label leaking both tx_rings and xdp_rings. Furthermore, if the setup of an individual Rx ring fails during the loop, the code
debian
CVE-2026-23434UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23434 CVE-2026-23434: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: rawnan...
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: serialize lock/unlock against other NAND operations nand_lock() and nand_unlock() call into chip->ops.lock_area/unlock_area without holding the NAND device lock. On controllers that implement SET_FEATURES via multiple low-level PIO commands, these can race with concurrent UBI/UBIFS background e
debian
CVE-2026-23449UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23449 CVE-2026-23449: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: Fix double-free in teql_master_xmit Whenever a TEQL devices has a lockless Qdisc as root, qdisc_reset should be called using the seq_lock to avoid racing with the datapath. Failure to do so may cause crashes like the following: [ 238.028993][ T318] BUG: KASAN: double-free in skb_release_data
debian
CVE-2026-23266UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23266 CVE-2026-23266: linux - In the Linux kernel, the following vulnerability has been resolved: fbdev: riva...
In the Linux kernel, the following vulnerability has been resolved: fbdev: rivafb: fix divide error in nv3_arb() A userspace program can trigger the RIVA NV3 arbitration code by calling the FBIOPUT_VSCREENINFO ioctl on /dev/fb*. When doing so, the driver recomputes FIFO arbitration parameters in nv3_arb(), using state->mclk_khz (derived from the PRAMDAC MCLK PLL) as a diviso
debian
CVE-2026-31396UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31396 CVE-2026-31396: linux - In the Linux kernel, the following vulnerability has been resolved: net: macb: ...
In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every opening of the interface and destroyed on every closing. However it may be accessed via get_ts_info ethtool call which is possible while the interface is just present in the kernel. BUG: KASAN: use-after-free in ptp_clock_inde
debian
CVE-2026-23319UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23319 CVE-2026-23319: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a ...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim The root cause of this bug is that when 'bpf_link_put' reduces the refcount of 'shim_link->link.link' to zero, the resource is considered released but may still be referenced via 'tr->progs_hlist' in 'cgroup_shim_find'. The actual cleanup of 'tr->progs_
debian
CVE-2026-23257UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23257 CVE-2026-23257: linux - In the Linux kernel, the following vulnerability has been resolved: net: liquid...
In the Linux kernel, the following vulnerability has been resolved: net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup In setup_nic_devices(), the initialization loop jumps to the label setup_nic_dev_free on failure. The current cleanup loop while(i--) skip the failing index i, causing a memory leak. Fix this by changing the loop to iterate from the curren
debian
CVE-2026-23182UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23182 CVE-2026-23182: linux - In the Linux kernel, the following vulnerability has been resolved: spi: tegra:...
In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak in tegra_slink_probe() In tegra_slink_probe(), when platform_get_irq() fails, it directly returns from the function with an error code, which causes a memory leak. Replace it with a goto label to ensure proper cleanup.
Scope: local
bookworm: resolved (fixed in 6.1.164-1)
bullsey
debian
CVE-2026-23460UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23460 CVE-2026-23460: linux - In the Linux kernel, the following vulnerability has been resolved: net/rose: f...
In the Linux kernel, the following vulnerability has been resolved: net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect syzkaller reported a bug [1], and the reproducer is available at [2]. ROSE sockets use four sk->sk_state values: TCP_CLOSE, TCP_LISTEN, TCP_SYN_SENT, and TCP_ESTABLISHED. rose_connect() already rejects calls for TCP_ESTABLISHED (-EISCO
debian
CVE-2026-23379UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23379 CVE-2026-23379: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: fix divide by zero in the offload path Offloading ETS requires computing each class' WRR weight: this is done by averaging over the sums of quanta as 'q_sum' and 'q_psum'. Using unsigned int, the same integer size as the individual DRR quanta, can overflow and even cause division by zero, lik
debian
CVE-2026-31389UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31389 CVE-2026-31389: linux - In the Linux kernel, the following vulnerability has been resolved: spi: fix us...
In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during controller registration to avoid use-after-free (of driver resources) and unclocked register accesses.
Scope: local
bookworm: open
bul
debian
CVE-2026-23365UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23365 CVE-2026-23365: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: k...
In the Linux kernel, the following vulnerability has been resolved: net: usb: kalmia: validate USB endpoints The kalmia driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the driver will crash later on when it blindly accesses these e
debian
CVE-2026-23444UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23444 CVE-2026-23444: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure ieee80211_tx_prepare_skb() has three error paths, but only two of them free the skb. The first error path (ieee80211_tx_prepare() returning TX_DROP) does not free it, while invoke_tx_handlers() failure and the fragmentation check both do.
debian
CVE-2026-23450UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23450 CVE-2026-23450: linux - In the Linux kernel, the following vulnerability has been resolved: net/smc: fi...
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() Syzkaller reported a panic in smc_tcp_syn_recv_sock() [1]. smc_tcp_syn_recv_sock() is called in the TCP receive path (softirq) via icsk_af_ops->syn_recv_sock on the clcsock (TCP listening socket). It reads sk_user_data to get the smc_sock point
debian
CVE-2026-23457UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23457 CVE-2026-23457: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before compu
debian
CVE-2026-23056UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23056 CVE-2026-23056: linux - In the Linux kernel, the following vulnerability has been resolved: uacce: impl...
In the Linux kernel, the following vulnerability has been resolved: uacce: implement mremap in uacce_vm_ops to return -EPERM The current uacce_vm_ops does not support the mremap operation of vm_operations_struct. Implement .mremap to return -EPERM to remind users. The reason we need to explicitly disable mremap is that when the driver does not implement .mremap, it uses the
debian
CVE-2026-31411UNKNOWNfixed in linux 6.18.14-1 (forky)2026
CVE-2026-31411 CVE-2026-31411: linux - In the Linux kernel, the following vulnerability has been resolved: net: atm: f...
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix crash due to unvalidated vcc pointer in sigd_send() Reproducer available at [1]. The ATM send path (sendmsg -> vcc_sendmsg -> sigd_send) reads the vcc pointer from msg->vcc and uses it directly without any validation. This pointer comes from userspace via sendmsg() and can be arbitrarily forged
debian