Debian Linux vulnerabilities
13,286 known vulnerabilities affecting debian/linux.
Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227
Vulnerabilities
Page 3 of 665
CVE-2026-23243HIGHCVSS 7.8fixed in linux 6.18.14-1 (forky)2026
CVE-2026-23243 [HIGH] CVE-2026-23243: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/umad: ...
In the Linux kernel, the following vulnerability has been resolved: RDMA/umad: Reject negative data_len in ib_umad_write ib_umad_write computes data_len from user-controlled count and the MAD header sizes. With a mismatched user MAD header size and RMPP header length, data_len can become negative and reach ib_create_send_mad(). This can make the padding calculation ex
debian
CVE-2026-23411HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23411 [HIGH] CVE-2026-23411: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f...
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix race between freeing data and fs accessing it AppArmor was putting the reference to i_private data on its end after removing the original entry from the file system. However the inode can aand does live beyond that point and it is possible that some of the fs call back functions will be
debian
CVE-2026-23270HIGHCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23270 [HIGH] CVE-2026-23270: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks As Paolo said earlier [1]: "Since the blamed commit below, classify can return TC_ACT_CONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a
debian
CVE-2026-23178HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23178 [HIGH] CVE-2026-23178: linux - In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hi...
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data into `ihid->rawbuf`. The former can come from the userspace in the hidraw driver and is only bounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set
debian
CVE-2026-23392HIGHCVSS 7.8fixed in linux 6.19.10-1 (forky)2026
CVE-2026-23392 [HIGH] CVE-2026-23392: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flowtable after rcu grace period on error Call synchronize_rcu() after unregistering the hooks from error path, since a hook that already refers to this flowtable can be already registered, exposing this flowtable to packet path and nfnetlink_hook control plane. This erro
debian
CVE-2026-23239HIGHCVSS 7.8fixed in linux 6.19.6-1 (forky)2026
CVE-2026-23239 [HIGH] CVE-2026-23239: linux - In the Linux kernel, the following vulnerability has been resolved: espintcp: F...
In the Linux kernel, the following vulnerability has been resolved: espintcp: Fix race condition in espintcp_close() This issue was discovered during a code audit. After cancel_work_sync() is called from espintcp_close(), espintcp_tx_work() can still be scheduled from paths such as the Delayed ACK handler or ksoftirqd. As a result, the espintcp_tx_work() worker may de
debian
CVE-2026-23372HIGHCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23372 [HIGH] CVE-2026-23372: linux - In the Linux kernel, the following vulnerability has been resolved: nfc: rawsoc...
In the Linux kernel, the following vulnerability has been resolved: nfc: rawsock: cancel tx_work before socket teardown In rawsock_release(), cancel any pending tx_work and purge the write queue before orphaning the socket. rawsock_tx_work runs on the system workqueue and calls nfc_data_exchange which dereferences the NCI device. Without synchronization, tx_work can r
debian
CVE-2026-23351HIGHCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23351 [HIGH] CVE-2026-23351: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: split gc into unlink and reclaim phase Yiming Qian reports Use-after-free in the pipapo set type: Under a large number of expired elements, commit-time GC can run for a very long time in a non-preemptible context, triggering soft lockup warnings and RCU stall reports (local
debian
CVE-2026-23272HIGHCVSS 7.8fixed in linux 6.19.8-1 (forky)2026
CVE-2026-23272 [HIGH] CVE-2026-23272: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally bump set->nelems before insertion In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be walking over it already. To address this issue, add the element transaction even if set is f
debian
CVE-2026-23407HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23407 [HIGH] CVE-2026-23407: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f...
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix missing bounds check on DEFAULT table in verify_dfa() The verify_dfa() function only checks DEFAULT_TABLE bounds when the state is not differentially encoded. When the verification loop traverses the differential encoding chain, it reads k = DEFAULT_TABLE[j] and uses k as an array index
debian
CVE-2026-23010HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23010 [HIGH] CVE-2026-23010: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix u...
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot reported use-after-free of inet6_ifaddr in inet6_addr_del(). [0] The cited commit accidentally moved ipv6_del_addr() for mngtmpaddr before reading its ifp->flags for temporary addresses in inet6_addr_del(). Let's move ipv6_del_addr() down to fix the
debian
CVE-2026-23103HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23103 [HIGH] CVE-2026-23103: linux - In the Linux kernel, the following vulnerability has been resolved: ipvlan: Mak...
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per ipvlan dev. Initial code seems to be written in the assumption, that any address change must occur under RTNL. But it is not so for the case of IPv6. So 1) Introduce per-port addrs_lock. 2) It was needed to fix places whe
debian
CVE-2026-23105HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23105 [HIGH] CVE-2026-23105: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag This is more of a preventive patch to make the code more consistent and to prevent possible exploits that employ child qlen manipulations on qfq. use cl_is_active instead of relying on the child qdisc's qlen to det
debian
CVE-2026-23226HIGHCVSS 8.8fixed in linux 6.18.12-1 (forky)2026
CVE-2026-23226 [HIGH] CVE-2026-23226: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: add ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase a
debian
CVE-2026-23073HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23073 [HIGH] CVE-2026-23073: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: ...
In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory corruption due to not set vif driver data size The struct ieee80211_vif contains trailing space for vif driver data, when struct ieee80211_vif is allocated, the total memory size that is allocated is sizeof(struct ieee80211_vif) + size of vif driver data. The size of vif driver d
debian
CVE-2026-23273HIGHCVSS 7.8fixed in linux 6.18.14-1 (forky)2026
CVE-2026-23273 [HIGH] CVE-2026-23273: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: ob...
In the Linux kernel, the following vulnerability has been resolved: macvlan: observe an RCU grace period in macvlan_common_newlink() error path valis reported that a race condition still happens after my prior patch. macvlan_common_newlink() might have made @dev visible before detecting an error, and its caller will directly call free_netdev(dev). We must respect an R
debian
CVE-2026-23076HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23076 [HIGH] CVE-2026-23076: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi...
In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix potential OOB access in audio mixer handling In the audio mixer handling code of ctxfi driver, the conf field is used as a kind of loop index, and it's referred in the index callbacks (amixer_index() and sum_index()). As spotted recently by fuzzers, the current code causes OOB access
debian
CVE-2026-23406HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23406 [HIGH] CVE-2026-23406: linux - In the Linux kernel, the following vulnerability has been resolved: apparmor: f...
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix side-effect bug in match_char() macro usage The match_char() macro evaluates its character parameter multiple times when traversing differential encoding chains. When invoked with *str++, the string pointer advances on each iteration of the inner do-while loop, causing the DFA to check d
debian
CVE-2026-23169HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23169 [HIGH] CVE-2026-23169: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix ...
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() syzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id() and/or mptcp_pm_nl_is_backup() Root cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit() which is not RCU ready. list_splice_init_rcu() can not be called here while holding p
debian
CVE-2026-23171HIGHCVSS 7.8fixed in linux 6.18.9-1 (forky)2026
CVE-2026-23171 [HIGH] CVE-2026-23171: linux - In the Linux kernel, the following vulnerability has been resolved: bonding: fi...
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free due to enslave fail after slave array update Fix a use-after-free which happens due to enslave failure after the new slave has been added to the array. Since the new slave can be used for Tx immediately, we can use it after it has been freed by the enslave error cleanup pat
debian