Debian Linux vulnerabilities

13,286 known vulnerabilities affecting debian/linux.

Total CVEs
13,286
CISA KEV
28
actively exploited
Public exploits
137
Exploited in wild
29
Severity breakdown
CRITICAL70HIGH2670MEDIUM6247LOW3072UNKNOWN1227

Vulnerabilities

Page 5 of 665
CVE-2026-23063MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23063 [MEDIUM] CVE-2026-23063: linux - In the Linux kernel, the following vulnerability has been resolved: uacce: ensu... In the Linux kernel, the following vulnerability has been resolved: uacce: ensure safe queue release with state management Directly calling `put_queue` carries risks since it cannot guarantee that resources of `uacce_queue` have been fully released beforehand. So adding a `stop_queue` operation for the UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to
debian
CVE-2026-23107MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23107 [MEDIUM] CVE-2026-23107: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/fpsim... In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA The code to restore a ZA context doesn't attempt to allocate the task's sve_state before setting TIF_SME. Consequently, restoring a ZA context can place a task into an invalid state where TIF_SME is set but the task's sve_state is NULL. I
debian
CVE-2026-23119MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23119 [MEDIUM] CVE-2026-23119: linux - In the Linux kernel, the following vulnerability has been resolved: bonding: pr... In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer to __skb_flow_dissect() After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect") we have to provide a net pointer to __skb_flow_dissect(), either via skb->dev, skb->sk, or a user provided pointer. In the following case, syzbot was able to cook a bare
debian
CVE-2026-23093MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23093 [MEDIUM] CVE-2026-23093: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbd... In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbd: fix dma_unmap_sg() nents The dma_unmap_sg() functions should be called with the same nents as the dma_map_sg(), not the value the map function returned. Scope: local bookworm: resolved (fixed in 6.1.162-1) bullseye: resolved forky: resolved (fixed in 6.18.8-1) sid: resolved (fixed in 6.
debian
CVE-2026-23000MEDIUMCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23000 [MEDIUM] CVE-2026-23000: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ... In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_profile can fail to attach a new profile and can fail to rollback to old profile, in such case, we could end up with a dangling netdev with a fully reset netdev_priv. A retry to change profile, e.g. another attempt to call m
debian
CVE-2026-23080MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23080 [MEDIUM] CVE-2026-23080: linux - In the Linux kernel, the following vulnerability has been resolved: can: mcba_u... In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In mcba_usb_probe() -> mcba_usb_start(), the URBs for USB-in transfers are allocated, added to the priv->rx_submit
debian
CVE-2026-23113MEDIUMCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23113 [MEDIUM] CVE-2026-23113: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring/io... In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop Currently this is checked before running the pending work. Normally this is quite fine, as work items either end up blocking (which will create a new worker for other items), or they complete fairly quickly. But syzbot reports an issue where
debian
CVE-2026-23118MEDIUMCVSS 4.7fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23118 [MEDIUM] CVE-2026-23118: linux - In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix ... In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning and potential load/store tearing Fix the following: BUG: KCSAN: data-race in rxrpc_peer_keepalive_worker / rxrpc_send_data_packet which is reporting an issue with the reads and writes to ->last_tx_at in: conn->peer->last_tx_at = ktime_get_seconds(); and: keepalive_at = p
debian
CVE-2026-23137MEDIUMCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-23137 [MEDIUM] CVE-2026-23137: linux - In the Linux kernel, the following vulnerability has been resolved: of: unittes... In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak in unittest_data_add() In unittest_data_add(), if of_resolve_phandles() fails, the allocated unittest_data is not freed, leading to a memory leak. Fix this by using scope-based cleanup helper __free(kfree) for automatic resource cleanup. This ensures unittest_data is au
debian
CVE-2026-23026MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23026 [MEDIUM] CVE-2026-23026: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue occurs when: 1. gchan->config points to previously allocated memory 2. krealloc() fails and
debian
CVE-2026-23108MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23108 [MEDIUM] CVE-2026-23108: linux - In the Linux kernel, the following vulnerability has been resolved: can: usb_8d... In the Linux kernel, the following vulnerability has been resolved: can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In usb_8dev_open() -> usb_8dev_start(), the URBs for USB-in transfers are allocated, added to the priv->rx_submitt
debian
CVE-2026-23069MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23069 [MEDIUM] CVE-2026-23069: linux - In the Linux kernel, the following vulnerability has been resolved: vsock/virti... In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: fix potential underflow in virtio_transport_get_credit() The credit calculation in virtio_transport_get_credit() uses unsigned arithmetic: ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_fwd_cnt); If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes are in flight
debian
CVE-2026-23213MEDIUMCVSS 5.5fixed in linux 6.18.10-1 (forky)2026
CVE-2026-23213 [MEDIUM] CVE-2026-23213: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm:... In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the ASIC undergoes a reset cycle and becomes temporarily inaccessible via PCIe. Any attempt to access MMIO registers during this window (e.g., from interrupt handlers or other driver threads) can result in uncompleted PCIe
debian
CVE-2026-23061MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23061 [MEDIUM] CVE-2026-23061: linux - In the Linux kernel, the following vulnerability has been resolved: can: kvaser... In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In kvaser_usb_set_{,data_}bittiming() -> kvaser_usb_setup_rx_urbs(), the URBs for USB-in transfers are allocat
debian
CVE-2026-23229MEDIUMCVSS 5.5fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23229 [MEDIUM] CVE-2026-23229: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: vir... In the Linux kernel, the following vulnerability has been resolved: crypto: virtio - Add spinlock protection with virtqueue notification When VM boots with one virtio-crypto PCI device and builtin backend, run openssl benchmark command with multiple processes, such as openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32 openssl processes will hangup an
debian
CVE-2026-22996MEDIUMCVSS 5.5fixed in linux 6.18.8-1 (forky)2026
CVE-2026-22996 [MEDIUM] CVE-2026-22996: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ... In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails, mlx5e_priv in mlx5e_dev devlink private is used to reference the netdev and mdev associated with that struct. Instead, store netdev directly into mlx5e_de
debian
CVE-2026-23237MEDIUMCVSS 5.5fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23237 [MEDIUM] CVE-2026-23237: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8... In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4() is the "show" met
debian
CVE-2026-23120MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23120 [MEDIUM] CVE-2026-23120: linux - In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid... In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l2tp_tunnel_del_work() We should read sk->sk_socket only when dealing with kernel sockets. syzbot reported the following data-race: BUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release write to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu 0: sk_set_sock
debian
CVE-2026-22979MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22979 [MEDIUM] CVE-2026-22979: linux - In the Linux kernel, the following vulnerability has been resolved: net: fix me... In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_segment_list for GRO packets When skb_segment_list() is called during packet forwarding, it handles packets that were aggregated by the GRO engine. Historically, the segmentation logic in skb_segment_list assumes that individual segments are split from a parent SKB and ma
debian
CVE-2026-23125MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23125 [MEDIUM] CVE-2026-23125: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: move ... In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: ================================================================== KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] CP
debian