Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 35 of 496
CVE-2024-50349LOWCVSS 2.1v11.02025-01-14
CVE-2024-50349 [LOW] CWE-116 CVE-2024-50349: Git is a fast, scalable, distributed revision control system with an unusually rich command set that Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a p
nvd
CVE-2023-27539MEDIUMCVSS 5.3v10.0v11.02025-01-09
CVE-2023-27539 [MEDIUM] CVE-2023-27539: There is a denial of service vulnerability in the header parsing component of Rack. There is a denial of service vulnerability in the header parsing component of Rack.
nvd
CVE-2024-12426MEDIUMCVSS 6.7v11.02025-01-07
CVE-2024-12426 [MEDIUM] CWE-200 CVE-2024-12426: Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerabi Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability in The Document Foundation LibreOffice. URLs could be constructed which expanded environmental variables or INI file values, so potentially sensitive information could be exfiltrated to a remote server on opening a document containing such link
nvd
CVE-2024-12425LOWCVSS 2.4v11.02025-01-07
CVE-2024-12425 [LOW] CWE-22 CVE-2024-12425: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Document Foundation LibreOffice allows Absolute Path Traversal. An attacker can write to arbitrary locations, albeit suffixed with ".ttf", by supplying a file in a format that supports embedded font files. This issue affects LibreOffice: from 24.8 befo
nvd
CVE-2024-46981CRITICALCVSS 9.8v11.02025-01-06
CVE-2024-46981 [CRITICAL] CWE-416 CVE-2024-46981: Redis is an open source, in-memory database that persists on disk. An authenticated user may use a s Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server execu
nvd
CVE-2024-56705MEDIUMCVSS 5.5v11.02024-12-28
CVE-2024-56705 [MEDIUM] CWE-617 CVE-2024-56705: In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Add check for r In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Add check for rgby_data memory allocation failure In ia_css_3a_statistics_allocate(), there is no check on the allocation result of the rgby_data memory. If rgby_data is not successfully allocated, it may trigger the assert(host_stats->rgby_data) assertion in ia_cs
nvd
CVE-2024-53197HIGHCVSS 7.8KEVv11.02024-12-27
CVE-2024-53197 [HIGH] CWE-787 CVE-2024-53197: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_
nvd
CVE-2024-56644MEDIUMCVSS 5.5v11.02024-12-27
CVE-2024-56644 [MEDIUM] CVE-2024-56644: In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired excep In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table. There are several conditions that must be fulfilled for the leak to occur: * an ICMPv6 packet i
nvd
CVE-2024-53150HIGHCVSS 7.1KEVv11.02024-12-24
CVE-2024-53150 [HIGH] CWE-125 CVE-2024-53150: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bou In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-
nvd
CVE-2024-47606HIGHCVSS 8.6v11.02024-12-12
CVE-2024-47606 [HIGH] CWE-190 CVE-2024-47606: GStreamer is a library for constructing graphs of media-handling components. An integer underflow ha GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit neg
nvd
CVE-2024-46901MEDIUMCVSS 4.3v11.02024-12-09
CVE-2024-46901 [MEDIUM] CWE-20 CVE-2024-46901: Insufficient validation of filenames against control characters in Apache Subversion repositories se Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories
nvd
CVE-2024-53104HIGHCVSS 7.8KEVv11.02024-12-02
CVE-2024-53104 [HIGH] CWE-787 CVE-2024-53104: In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing f In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.
nvd
CVE-2024-53566MEDIUMCVSS 5.5v11.02024-12-02
CVE-2024-53566 [MEDIUM] CWE-22 CVE-2024-53566: An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.
nvd
CVE-2024-44308HIGHCVSS 8.8KEVv11.02024-11-20
CVE-2024-44308 [HIGH] CVE-2024-44308: The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and i The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac sys
nvd
CVE-2024-44309MEDIUMCVSS 6.3KEVv11.02024-11-20
CVE-2024-44309 [MEDIUM] CWE-79 CVE-2024-44309: A cookie management issue was addressed with improved state management. This issue is fixed in Safar A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been a
nvd
CVE-2024-10224HIGHCVSS 7.8v11.02024-11-19
CVE-2024-10224 [HIGH] CWE-78 CVE-2024-10224: Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before vers Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
nvd
CVE-2024-50302MEDIUMCVSS 5.5KEVv11.02024-11-19
CVE-2024-50302 [MEDIUM] CWE-908 CVE-2024-50302: In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
nvd
CVE-2024-52316CRITICALCVSS 9.8v11.02024-11-18
CVE-2024-52316 [CRITICAL] CWE-391 CVE-2024-52316: Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Ja Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to by
nvd
CVE-2024-10978MEDIUMCVSS 4.2v11.02024-11-14
CVE-2024-10978 [MEDIUM] CWE-266 CVE-2024-10978: Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or ch Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results t
nvd
CVE-2024-49369CRITICALCVSS 9.8v11.02024-11-12
CVE-2024-49369 [CRITICAL] CWE-295 CVE-2024-49369: Icinga is a monitoring system which checks the availability of network resources, notifies users of Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client
nvd