Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 24 of 665
CVE-2026-31407UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31407 CVE-2026-31407: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: add missing netlink policy validations Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink. These attributes are used by the kernel without any validation. Extend the netlink policies accordingly. Quoting the reporter: nlattr_to_sctp() assigns the user-supplied CTA_PROTOINFO_
debian
CVE-2026-31392UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31392 CVE-2026-31392: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix krb5 mount with username option Customer reported that some of their krb5 mounts were failing against a single server as the client was trying to mount the shares with wrong credentials. It turned out the client was reusing SMB session from first mount to try mounting the other shares, even
debian
CVE-2026-23293UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23293 CVE-2026-23293: linux - In the Linux kernel, the following vulnerability has been resolved: net: vxlan:...
In the Linux kernel, the following vulnerability has been resolved: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never initialized because inet6_init() exits before ndisc_init() is called which initializes it. If an IPv6 packet is injected into the interface, route_shortcircuit() is called and a
debian
CVE-2026-23038UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23038 CVE-2026-23038: linux - In the Linux kernel, the following vulnerability has been resolved: pnfs/flexfi...
In the Linux kernel, the following vulnerability has been resolved: pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails, the function jumps to the out_scratch label without freeing the already allocated dsaddrs list, leading to a memory leak. Fix this by jumping to the out_err_drain_dsaddr
debian
CVE-2026-23262UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23262 CVE-2026-23262: linux - In the Linux kernel, the following vulnerability has been resolved: gve: Fix st...
In the Linux kernel, the following vulnerability has been resolved: gve: Fix stats report corruption on queue count change The driver and the NIC share a region in memory for stats reporting. The NIC calculates its offset into this region based on the total size of the stats region and the size of the NIC's stats. When the number of queues is changed, the driver's stats regi
debian
CVE-2026-23255UNKNOWNfixed in linux 6.18.10-1 (forky)2026
CVE-2026-23255 CVE-2026-23255: linux - In the Linux kernel, the following vulnerability has been resolved: net: add pr...
In the Linux kernel, the following vulnerability has been resolved: net: add proper RCU protection to /proc/net/ptype Yin Fengwei reported an RCU stall in ptype_seq_show() and provided a patch. Real issue is that ptype_seq_next() and ptype_seq_show() violate RCU rules. ptype_seq_show() runs under rcu_read_lock(), and reads pt->dev to get device name without any barrier. At t
debian
CVE-2026-23442UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23442 CVE-2026-23442: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: add N...
In the Linux kernel, the following vulnerability has been resolved: ipv6: add NULL checks for idev in SRv6 paths __in6_dev_get() can return NULL when the device has no IPv6 configuration (e.g. MTU < IPV6_MIN_MTU or after NETDEV_UNREGISTER). Add NULL checks for idev returned by __in6_dev_get() in both seg6_hmac_validate_skb() and ipv6_srh_rcv() to prevent potential NULL point
debian
CVE-2026-23414UNKNOWNfixed in linux 6.19.11-1 (sid)2026
CVE-2026-23414 CVE-2026-23414: linux - In the Linux kernel, the following vulnerability has been resolved: tls: Purge ...
In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encrypted input skbs while the AEAD engine references their scatterlist data. Once tls_decrypt_async_wait() returns, every AEAD operation has completed and the engine no longer references those skbs, so they can be freed unconditiona
debian
CVE-2026-31391UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31391 CVE-2026-31391: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: atm...
In the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 6.19.10-1)
sid: resolved (fixed in 6.19.10-1)
trixie: open
debian
CVE-2026-23398UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23398 CVE-2026-23398: linux - In the Linux kernel, the following vulnerability has been resolved: icmp: fix N...
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_dereference(inet_protos[proto]) without checking for NULL. The inet_protos[] array is sparse -- only about 15 of 256 protocol numbers have registered handlers. When ip_no_pmtu_disc
debian
CVE-2026-23054UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23054 CVE-2026-23054: linux - In the Linux kernel, the following vulnerability has been resolved: net: hv_net...
In the Linux kernel, the following vulnerability has been resolved: net: hv_netvsc: reject RSS hash key programming without RX indirection table RSS configuration requires a valid RX indirection table. When the device reports a single receive queue, rndis_filter_device_add() does not allocate an indirection table, accepting RSS hash key updates in this state leads to a hang.
debian
CVE-2026-23381UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23381 CVE-2026-23381: linux - In the Linux kernel, the following vulnerability has been resolved: net: bridge...
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never initialized because inet6_init() exits before ndisc_init() is called which initializes it. Then, if neigh_suppress is enabled and an ICMPv6 Neighbor Discovery packet reaches th
debian
CVE-2026-23370UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23370 CVE-2026-23370: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaking credentials.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (
debian
CVE-2026-23448UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23448 CVE-2026-23448: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: c...
In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE entries fit within the skb. The first check correctly accounts for ndpoffset: if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) > skb_in->len) but the second check omits it: if
debian
CVE-2026-23176UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23176 CVE-2026-23176: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully. toshiba_haps_remove() does not free the object pointed to by toshiba_haps before clearing that pointer, so it becomes
debian
CVE-2026-23258UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23258 CVE-2026-23258: linux - In the Linux kernel, the following vulnerability has been resolved: net: liquid...
In the Linux kernel, the following vulnerability has been resolved: net: liquidio: Initialize netdev pointer before queue setup In setup_nic_devices(), the netdev is allocated using alloc_etherdev_mq(). However, the pointer to this structure is stored in oct->props[i].netdev only after the calls to netif_set_real_num_rx_queues() and netif_set_real_num_tx_queues(). If either
debian
CVE-2026-23447UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23447 CVE-2026-23447: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: c...
In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch also exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated against the total skb length without accounting for ndpoffset, allowing out-of-bounds reads when the NDP32 i
debian
CVE-2026-23279UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23279 CVE-2026-23279: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() In mesh_rx_csa_frame(), elems->mesh_chansw_params_ie is dereferenced at lines 1638 and 1642 without a prior NULL check: ifmsh->chsw_ttl = elems->mesh_chansw_params_ie->mesh_ttl; ... pre_value = le16_to_cpu(elems->mesh_chansw_params_ie->mesh_
debian
CVE-2026-23446UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23446 CVE-2026-23446: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: a...
In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: Do not perform PM inside suspend callback syzbot reports "task hung in rpm_resume" This is caused by aqc111_suspend calling the PM variant of its write_cmd routine. The simplified call trace looks like this: rpm_suspend() usb_suspend_both() - here udev->dev.power.runtime_status == RPM_SUSPE
debian
CVE-2026-23291UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23291 CVE-2026-23291: linux - In the Linux kernel, the following vulnerability has been resolved: nfc: pn533:...
In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: properly drop the usb interface reference on disconnect When the device is disconnected from the driver, there is a "dangling" reference count on the usb interface that was grabbed in the probe callback. Fix this up by properly dropping the reference after we are done with it.
Scope: local
bookwo
debian