Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 37 of 496
CVE-2024-43839HIGHCVSS 7.8v11.02024-08-17
CVE-2024-43839 [HIGH] CWE-787 CVE-2024-43839: In the Linux kernel, the following vulnerability has been resolved: bna: adjust 'name' buf size of In the Linux kernel, the following vulnerability has been resolved: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures To have enough space to write all possible sprintf() args. Currently 'name' size is 16, but the first '%s' specifier may already need at least 16 characters, since 'bnad->netdev->name' is used there. For '%d' specifiers,
nvd
CVE-2024-42314HIGHCVSS 7.8v11.02024-08-17
CVE-2024-42314 [HIGH] CWE-416 CVE-2024-42314: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after-free when adding pages to compressed bio At add_ra_bio_pages() we are accessing the extent map to calculate 'add_size' after we dropped our reference on the extent map, resulting in a use-after-free. Fix this by computing 'add_size' before dropping ou
nvd
CVE-2024-42472CRITICALCVSS 10.0v11.02024-08-15
CVE-2024-42472 [CRITICAL] CWE-74 CVE-2024-42472: Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the
nvd
CVE-2024-42159HIGHCVSS 7.8v11.02024-07-30
CVE-2024-42159 [HIGH] CWE-754 CVE-2024-42159: In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, values larger then size of this field shouldn't be allowed.
nvd
CVE-2024-42160HIGHCVSS 7.8v11.02024-07-30
CVE-2024-42160 [HIGH] CWE-754 CVE-2024-42160: In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to check validation of fault attrs in parse_options(), let's fix to add check condition in f2fs_build_fault_attr(). - Use f2fs_build_fault_attr() in __sbi_store() to clean up code.
nvd
CVE-2024-42136HIGHCVSS 7.8v11.02024-07-30
CVE-2024-42136 [HIGH] CWE-190 CVE-2024-42136: In the Linux kernel, the following vulnerability has been resolved: cdrom: rearrange last_media_cha In the Linux kernel, the following vulnerability has been resolved: cdrom: rearrange last_media_change check to avoid unintentional overflow When running syzkaller with the newly reintroduced signed integer wrap sanitizer we encounter this splat: [ 366.015950] UBSAN: signed-integer-overflow in ../drivers/cdrom/cdrom.c:2361:33 [ 366.021089] -9223372
nvd
CVE-2024-41073HIGHCVSS 7.8v11.02024-07-29
CVE-2024-41073 [HIGH] CWE-415 CVE-2024-41073: In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retried, and that retry may fail before a new special payload is added, a double free will result. Clear the RQF_SPECIAL_LOAD when the request is cleaned.
nvd
CVE-2024-41096HIGHCVSS 7.8v11.02024-07-29
CVE-2024-41096 [HIGH] CWE-416 CVE-2024-41096: In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Fix UAF in msi_capabil In the Linux kernel, the following vulnerability has been resolved: PCI/MSI: Fix UAF in msi_capability_init KFENCE reports the following UAF: BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488 Use-after-free read at 0x0000000024629571 (in kfence-#12): __pci_enable_msi_range+0x2c0/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c
nvd
CVE-2024-39496HIGHCVSS 7.8v11.02024-07-12
CVE-2024-39496 [HIGH] CWE-416 CVE-2024-39496: In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-fre In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). T
nvd
CVE-2024-41000HIGHCVSS 7.8v11.02024-07-12
CVE-2024-41000 [HIGH] CWE-190 CVE-2024-41000: In the Linux kernel, the following vulnerability has been resolved: block/ioctl: prefer different o In the Linux kernel, the following vulnerability has been resolved: block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer shows this report: [ 62.982337] ------------[ cut here ]------------ [ 62.985692] cgroup: Invalid name [ 62.986211] UBSAN: signed-integer-overflow in ../bloc
nvd
CVE-2024-39494HIGHCVSS 7.8v11.02024-07-12
CVE-2024-39494 [HIGH] CWE-416 CVE-2024-39494: In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a de In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusive on the parent's inode, rename_lock), but none of t
nvd
CVE-2024-6387HIGHCVSS 8.1PoCv12.02024-07-01
CVE-2024-6387 [HIGH] CWE-364 CVE-2024-6387: A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race con A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
nvd
CVE-2024-37371CRITICALCVSS 9.1v11.0v12.02024-06-28
CVE-2024-37371 [CRITICAL] CWE-125 CVE-2024-37371: In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS me In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
nvd
CVE-2024-38588HIGHCVSS 7.8v11.02024-06-19
CVE-2024-38588 [HIGH] CWE-416 CVE-2024-38588: In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix possible use-after- In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix possible use-after-free issue in ftrace_location() KASAN reports a bug: BUG: KASAN: use-after-free in ftrace_location+0x90/0x120 Read of size 8 at addr ffff888141d40010 by task insmod/424 CPU: 8 PID: 424 Comm: insmod Tainted: G W 6.9.0-rc2+ [...] Call Trace: dump_stack
nvd
CVE-2024-37891MEDIUMCVSS 6.5v11.02024-06-17
CVE-2024-37891 [MEDIUM] CWE-669 CVE-2024-37891: urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header eve
nvd
CVE-2024-5696HIGHCVSS 8.6v10.02024-06-11
CVE-2024-5696 [HIGH] CWE-787 CVE-2024-5696: By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory lea By manipulating the text in an ` ` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
nvd
CVE-2024-35235MEDIUMCVSS 6.7v10.02024-06-11
CVE-2024-35235 [MEDIUM] CWE-59 CVE-2024-35235: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the
nvd
CVE-2024-5690MEDIUMCVSS 4.3v10.02024-06-11
CVE-2024-5690 [MEDIUM] CWE-203 CVE-2024-5690: By monitoring the time certain operations take, an attacker could have guessed which external protoc By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
nvd
CVE-2024-36971HIGHCVSS 7.8KEVv10.02024-06-10
CVE-2024-36971 [HIGH] CWE-416 CVE-2024-36971: In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice( In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is imple
nvd
CVE-2024-37383MEDIUMCVSS 6.1KEVPoCv10.02024-06-07
CVE-2024-37383 [MEDIUM] CWE-79 CVE-2024-37383: Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes. Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
nvd
Debian Linux vulnerabilities | cvebase