Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 23 of 665
CVE-2026-23439UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23439 CVE-2026-23439: linux - In the Linux kernel, the following vulnerability has been resolved: udp_tunnel:... In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n When CONFIG_IPV6 is disabled, the udp_sock_create6() function returns 0 (success) without actually creating a socket. Callers such as fou_create() then proceed to dereference the uninitialized socket pointer, resulting in a NULL pointer
debian
CVE-2026-23474UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23474 CVE-2026-23474: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid ... In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 -
debian
CVE-2026-23399UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23399 CVE-2026-23399: linux - In the Linux kernel, the following vulnerability has been resolved: nf_tables: ... In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possible stateful expression memleak in error path If cloning the second stateful expression in the element via GFP_ATOMIC fails, then the first stateful expression remains in place without being released. unreferenced object (percpu) 0x607b97e9cab8 (size 16): comm "softirq", pid 0
debian
CVE-2026-23356UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23356 CVE-2026-23356: linux - In the Linux kernel, the following vulnerability has been resolved: drbd: fix "... In the Linux kernel, the following vulnerability has been resolved: drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() Even though we check that we "should" be able to do lc_get_cumulative() while holding the device->al_lock spinlock, it may still fail, if some other code path decided to do lc_try_lock() with bad timing. If that happened, we logged "LOGIC BUG for enr=...",
debian
CVE-2026-23401UNKNOWNfixed in linux 6.19.11-1 (sid)2026
CVE-2026-23401 CVE-2026-23401: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mm... In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE When installing an emulated MMIO SPTE, do so *after* dropping/zapping the existing SPTE (if it's shadow-present). While commit a54aa15c6bda3 was right about it being impossible to convert a shadow-present SPTE to an MMIO SPTE due to
debian
CVE-2026-23352UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23352 CVE-2026-23352: linux - In the Linux kernel, the following vulnerability has been resolved: x86/efi: de... In the Linux kernel, the following vulnerability has been resolved: x86/efi: defer freeing of boot services memory efi_free_boot_services() frees memory occupied by EFI_BOOT_SERVICES_CODE and EFI_BOOT_SERVICES_DATA using memblock_free_late(). There are two issue with that: memblock_free_late() should be used for memory allocated with memblock_alloc() while the memory reserve
debian
CVE-2026-23463UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23463 CVE-2026-23463: linux - In the Linux kernel, the following vulnerability has been resolved: soc: fsl: q... In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: fix race condition in qman_destroy_fq When QMAN_FQ_FLAG_DYNAMIC_FQID is set, there's a race condition between fq_table[fq->idx] state and freeing/allocating from the pool and WARN_ON(fq_table[fq->idx]) in qman_create_fq() gets triggered. Indeed, we can have: Thread A Thread B qman_destroy_fq
debian
CVE-2026-23058UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23058 CVE-2026-23058: linux - In the Linux kernel, the following vulnerability has been resolved: can: ems_us... In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In ems_usb_open(), the URBs for USB-in transfers are allocated, added to the dev->rx_submitted anchor and submitted. In the c
debian
CVE-2026-23050UNKNOWNfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23050 CVE-2026-23050: linux - In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a... In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a deadlock when returning a delegation during open() Ben Coddington reports seeing a hang in the following stack trace: 0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415 1 [ffffd0b50e177548] schedule at ffffffff9ca05717 2 [ffffd0b50e177558] bit_wait at ffffffff9ca061e1 3 [ffffd0b50e177568] __wait
debian
CVE-2026-23302UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23302 CVE-2026-23302: linux - In the Linux kernel, the following vulnerability has been resolved: net: annota... In the Linux kernel, the following vulnerability has been resolved: net: annotate data-races around sk->sk_{data_ready,write_space} skmsg (and probably other layers) are changing these pointers while other cpus might read them concurrently. Add corresponding READ_ONCE()/WRITE_ONCE() annotations for UDP, TCP and AF_UNIX. Scope: local bookworm: open bullseye: open forky: resol
debian
CVE-2026-23468UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23468 CVE-2026-23468: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Limit BO list entry count to prevent resource exhaustion Userspace can pass an arbitrary number of BO list entries via the bo_number field. Although the previous multiplication overflow check prevents out-of-bounds allocation, a large number of entries could still cause excessive memory allocatio
debian
CVE-2026-23277UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23277 CVE-2026-23277: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit teql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit through slave devices, but does not update skb->dev to the slave device beforehand. When a gretap tunnel is a TEQL slave, the transmit path reaches iptunnel_xmi
debian
CVE-2026-23037UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23037 CVE-2026-23037: linux - In the Linux kernel, the following vulnerability has been resolved: can: etas_e... In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x_open() to return early, skipping the cleanup label 'free_urbs', which leads to the anchored URBs b
debian
CVE-2026-23304UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23304 CVE-2026-23304: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: fix N... In the Linux kernel, the following vulnerability has been resolved: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() l3mdev_master_dev_rcu() can return NULL when the slave device is being un-slaved from a VRF. All other callers deal with this, but we lost the fallback to loopback in ip6_rt_pcpu_alloc() -> ip6_rt_get_dev_rcu() with commit 4832c30d5458 ("net: ipv6: put hos
debian
CVE-2026-31393UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31393 CVE-2026-31393: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access l2cap_information_rsp() checks that cmd_len covers the fixed l2cap_info_rsp header (type + result, 4 bytes) but then reads rsp->data without verifying that the payload is present: - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp->data),
debian
CVE-2026-31403UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31403 CVE-2026-31403: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: Hold ... In the Linux kernel, the following vulnerability has been resolved: NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd The /proc/fs/nfs/exports proc entry is created at module init and persists for the module's lifetime. exports_proc_open() captures the caller's current network namespace and stores its svc_export_cache in seq->private, but takes no referenc
debian
CVE-2026-23405UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23405 CVE-2026-23405: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f... In the Linux kernel, the following vulnerability has been resolved: apparmor: fix: limit the number of levels of policy namespaces Currently the number of policy namespaces is not bounded relying on the user namespace limit. However policy namespaces aren't strictly tied to user namespaces and it is possible to create them and nest them arbitrarily deep which can be used to
debian
CVE-2026-23388UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23388 CVE-2026-23388: linux - In the Linux kernel, the following vulnerability has been resolved: Squashfs: c... In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metada
debian
CVE-2026-23035UNKNOWNfixed in linux 6.18.8-1 (forky)2026
CVE-2026-23035 CVE-2026-23035: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ... In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails. Pass netdev to mlx5e_destroy_netdev() to guarantee it will work on a valid netdev. On mlx5e_remove: Check validity of priv->profile, before attempting to cleanu
debian
CVE-2026-23324UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23324 CVE-2026-23324: linux - In the Linux kernel, the following vulnerability has been resolved: can: usb: e... In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in t
debian
Debian Linux vulnerabilities | cvebase