Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 26 of 665
CVE-2026-23397UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23397 CVE-2026-23397: linux - In the Linux kernel, the following vulnerability has been resolved: nfnetlink_o... In the Linux kernel, the following vulnerability has been resolved: nfnetlink_osf: validate individual option lengths in fingerprints nfnl_osf_add_callback() validates opt_num bounds and string NUL-termination but does not check individual option length fields. A zero-length option causes nf_osf_match_one() to enter the option matching loop even when foptsize sums to zero, w
debian
CVE-2026-23327UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23327 CVE-2026-23327: linux - In the Linux kernel, the following vulnerability has been resolved: cxl/mbox: v... In the Linux kernel, the following vulnerability has been resolved: cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() cxl_payload_from_user_allowed() casts and dereferences the input payload without first verifying its size. When a raw mailbox command is sent with an undersized payload (ie: 1 byte for CXL_MBOX_OP_CLEAR_LOG, which ex
debian
CVE-2026-23276UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23276 CVE-2026-23276: linux - In the Linux kernel, the following vulnerability has been resolved: net: add xm... In the Linux kernel, the following vulnerability has been resolved: net: add xmit recursion limit to tunnel xmit functions Tunnel xmit functions (iptunnel_xmit, ip6tunnel_xmit) lack their own recursion limit. When a bond device in broadcast mode has GRE tap interfaces as slaves, and those GRE tunnels route back through the bond, multicast/broadcast traffic triggers infinite
debian
CVE-2026-23030UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23030 CVE-2026-23030: linux - In the Linux kernel, the following vulnerability has been resolved: phy: rockch... In the Linux kernel, the following vulnerability has been resolved: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() The for_each_available_child_of_node() calls of_node_put() to release child_np in each success loop. After breaking from the loop with the child_np has been released, the code will jump to the put_child label and will call the of_nod
debian
CVE-2026-23333UNKNOWN2026
CVE-2026-23333 CVE-2026-23333: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: validate open interval overlap Open intervals do not have an end element, in particular an open interval at the end of the set is hard to validate because of it is lacking the end element, and interval validation relies on such end element to perform the checks. This patch adds a n
debian
CVE-2026-23303UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23303 CVE-2026-23303: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client... In the Linux kernel, the following vulnerability has been resolved: smb: client: Don't log plaintext credentials in cifs_set_cifscreds When debug logging is enabled, cifs_set_cifscreds() logs the key payload and exposes the plaintext username and password. Remove the debug log to avoid exposing credentials. Scope: local bookworm: open bullseye: open forky: resolved (fixed in
debian
CVE-2026-31400UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31400 CVE-2026-31400: linux - In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix... In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix cache_request leak in cache_release When a reader's file descriptor is closed while in the middle of reading a cache_request (rp->offset != 0), cache_release() decrements the request's readers count but never checks whether it should free the request. In cache_read(), when readers drops to 0 and
debian
CVE-2026-23033UNKNOWNfixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23033 CVE-2026-23033: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: omap-dma: fix dma_pool resource leak in error paths The dma_pool created by dma_pool_create() is not destroyed when dma_async_device_register() or of_dma_controller_register() fails, causing a resource leak in the probe error paths. Add dma_pool_destroy() in both error paths to properly release th
debian
CVE-2026-31408UNKNOWNfixed in linux 6.19.11-1 (sid)2026
CVE-2026-31408 CVE-2026-31408: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold sco_recv_frame() reads conn->sk under sco_conn_lock() but immediately releases the lock without holding a reference to the socket. A concurrent close() can free the socket between the lock release and the subsequent sk->sk_state
debian
CVE-2026-23404UNKNOWNfixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23404 CVE-2026-23404: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: r... In the Linux kernel, the following vulnerability has been resolved: apparmor: replace recursive profile removal with iterative approach The profile removal code uses recursion when removing nested profiles, which can lead to kernel stack exhaustion and system crashes. Reproducer: $ pf='a'; for ((i=0; i /sys/kernel/security/apparmor/.remove Replace the recursive __aa_profile_
debian
CVE-2026-23426UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23426 CVE-2026-23426: linux - In the Linux kernel, the following vulnerability has been resolved: drm/logicvc... In the Linux kernel, the following vulnerability has been resolved: drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() The logicvc_drm_config_parse() function calls of_get_child_by_name() to find the "layers" node but fails to release the reference, leading to a device node reference leak. Fix this by using the __free(device_node) cleanup attribute to
debian
CVE-2026-23330UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23330 CVE-2026-23330: linux - In the Linux kernel, the following vulnerability has been resolved: nfc: nci: c... In the Linux kernel, the following vulnerability has been resolved: nfc: nci: complete pending data exchange on device close In nci_close_device(), complete any pending data exchange before closing. The data exchange callback (e.g. rawsock_data_exchange_complete) holds a socket reference. NIPA occasionally hits this leak: unreferenced object 0xff1100000f435000 (size 2048): c
debian
CVE-2026-23465UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-23465 CVE-2026-23465: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: log ... In the Linux kernel, the following vulnerability has been resolved: btrfs: log new dentries when logging parent dir of a conflicting inode If we log the parent directory of a conflicting inode, we are not logging the new dentries of the directory, so when we finish we have the parent directory's inode marked as logged but we did not log its new dentries. As a consequence if
debian
CVE-2026-23300UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23300 CVE-2026-23300: linux - In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ... In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop When a standalone IPv6 nexthop object is created with a loopback device (e.g., "ip -6 nexthop add id 100 dev lo"), fib6_nh_init() misclassifies it as a reject route. This is because nexthop objects have no destination prefix (fc_dst=::), c
debian
CVE-2026-23312UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23312 CVE-2026-23312: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: k... In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: validate USB endpoints The kaweth driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the driver will crash later on when it blindly accesses these e
debian
CVE-2026-31399UNKNOWNfixed in linux 6.19.10-1 (forky)2026
CVE-2026-31399 CVE-2026-31399: linux - In the Linux kernel, the following vulnerability has been resolved: nvdimm/bus:... In the Linux kernel, the following vulnerability has been resolved: nvdimm/bus: Fix potential use after free in asynchronous initialization Dingisoul with KASAN reports a use after free if device_add() fails in nd_async_device_register(). Commit b6eae0f61db2 ("libnvdimm: Hold reference on parent while scheduling async init") correctly added a reference on the parent device t
debian
CVE-2026-23374UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23374 CVE-2026-23374: linux - In the Linux kernel, the following vulnerability has been resolved: blktrace: f... In the Linux kernel, the following vulnerability has been resolved: blktrace: fix __this_cpu_read/write in preemptible context tracing_record_cmdline() internally uses __this_cpu_read() and __this_cpu_write() on the per-CPU variable trace_cmdline_save, and trace_save_cmdline() explicitly asserts preemption is disabled via lockdep_assert_preemption_disabled(). These operation
debian
CVE-2026-23307UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23307 CVE-2026-23307: linux - In the Linux kernel, the following vulnerability has been resolved: can: ems_us... In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message When looking at the data in a USB urb, the actual_length is the size of the buffer passed to the driver, not the transfer_buffer_length which is set by the driver as the max size of the buffer. When parsing the messages in ems_u
debian
CVE-2026-23298UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23298 CVE-2026-23298: linux - In the Linux kernel, the following vulnerability has been resolved: can: ucan: ... In the Linux kernel, the following vulnerability has been resolved: can: ucan: Fix infinite loop from zero-length messages If a broken ucan device gets a message with the message length field set to 0, then the driver will loop for forever in ucan_read_bulk_callback(), hanging the system. If the length is 0, just skip the message and go on to the next one. This has been fixe
debian
CVE-2026-23371UNKNOWNfixed in linux 6.19.8-1 (forky)2026
CVE-2026-23371 CVE-2026-23371: linux - In the Linux kernel, the following vulnerability has been resolved: sched/deadl... In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting Running stress-ng --schedpolicy 0 on an RT kernel on a big machine might lead to the following WARNINGs (edited). sched: DL de-boosted task PID 22725: REPLENISH flag missing WARNING: CPU: 93 PID: 0 at kernel/sched/deadline.c:239 dequeue_task
debian