Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 38 of 496
CVE-2024-37384MEDIUMCVSS 6.1v10.02024-06-07
CVE-2024-37384 [MEDIUM] CWE-79 CVE-2024-37384: Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via list columns from user preferen
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via list columns from user preferences.
nvd
CVE-2024-5629HIGHCVSS 8.1v10.02024-06-05
CVE-2024-5629 [HIGH] CWE-125 CVE-2024-5629: An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of mal
An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory.
nvd
CVE-2024-36960HIGHCVSS 7.1v10.02024-06-03
CVE-2024-36960 [HIGH] CWE-125 CVE-2024-36960: In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix invalid reads i
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix invalid reads in fence signaled events
Correctly set the length of the drm_event to the size of the structure
that's actually used.
The length of the drm_event was set to the parent structure instead of
to the drm_vmw_event_fence which is supposed to be read. drm_re
nvd
CVE-2024-5197MEDIUMCVSS 5.9v10.02024-06-03
CVE-2024-5197 [MEDIUM] CWE-190 CVE-2024-5197: There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h
nvd
CVE-2024-36964MEDIUMCVSS 5.5v10.02024-06-03
CVE-2024-36964 [MEDIUM] CVE-2024-36964: In the Linux kernel, the following vulnerability has been resolved:
fs/9p: only translate RWX permi
In the Linux kernel, the following vulnerability has been resolved:
fs/9p: only translate RWX permissions for plain 9P2000
Garbage in plain 9P2000's perm bits is allowed through, which causes it
to be able to set (among others) the suid bit. This was presumably not
the intent since the unix extended bits are handled explicitly and
conditionally on .u.
nvd
CVE-2024-36886HIGHCVSS 7.8v10.02024-05-30
CVE-2024-36886 [HIGH] CWE-416 CVE-2024-36886: In the Linux kernel, the following vulnerability has been resolved:
tipc: fix UAF in error path
Sa
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix UAF in error path
Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:
BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by
nvd
CVE-2024-36904HIGHCVSS 7.8v10.02024-05-30
CVE-2024-36904 [HIGH] CWE-416 CVE-2024-36904: In the Linux kernel, the following vulnerability has been resolved:
tcp: Use refcount_inc_not_zero(
In the Linux kernel, the following vulnerability has been resolved:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.
Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket
nvd
CVE-2024-36934HIGHCVSS 7.8v10.02024-05-30
CVE-2024-36934 [HIGH] CWE-787 CVE-2024-36934: In the Linux kernel, the following vulnerability has been resolved:
bna: ensure the copied buf is N
In the Linux kernel, the following vulnerability has been resolved:
bna: ensure the copied buf is NUL terminated
Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when usi
nvd
CVE-2024-36913HIGHCVSS 8.1v11.02024-05-30
CVE-2024-36913 [HIGH] CWE-1258 CVE-2024-36913: In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Leak pages
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails
In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle t
nvd
CVE-2024-36883HIGHCVSS 7.1v10.02024-05-30
CVE-2024-36883 [HIGH] CWE-125 CVE-2024-36883: In the Linux kernel, the following vulnerability has been resolved:
net: fix out-of-bounds access i
In the Linux kernel, the following vulnerability has been resolved:
net: fix out-of-bounds access in ops_init
net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the
nvd
CVE-2024-36940HIGHCVSS 7.8v10.02024-05-30
CVE-2024-36940 [HIGH] CWE-415 CVE-2024-36940: In the Linux kernel, the following vulnerability has been resolved:
pinctrl: core: delete incorrect
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: core: delete incorrect free in pinctrl_enable()
The "pctldev" struct is allocated in devm_pinctrl_register_and_init().
It's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),
so freeing it in pinctrl_enable() will lead to a double free.
The devm_pinctrl_d
nvd
CVE-2024-36916HIGHCVSS 7.1v10.02024-05-30
CVE-2024-36916 [HIGH] CWE-125 CVE-2024-36916: In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: avoid out of bounds
In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: avoid out of bounds shift
UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg->delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.
[ 186.556576] ------------[ cut here ]------------
UBSAN: shift-o
nvd
CVE-2024-36933MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36933 [MEDIUM] CWE-908 CVE-2024-36933: In the Linux kernel, the following vulnerability has been resolved:
nsh: Restore skb->{protocol,dat
In the Linux kernel, the following vulnerability has been resolved:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
syzbot triggered various splats (see [0] and links) by a crafted GSO
packet of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:
ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP
NSH can
nvd
CVE-2024-36939MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36939 [MEDIUM] CVE-2024-36939: In the Linux kernel, the following vulnerability has been resolved:
nfs: Handle error of rpc_proc_r
In the Linux kernel, the following vulnerability has been resolved:
nfs: Handle error of rpc_proc_register() in nfs_net_init().
syzkaller reported a warning [0] triggered while destroying immature
netns.
rpc_proc_register() was called in init_nfs_fs(), but its error
has been ignored since at least the initial commit 1da177e4c3f4
("Linux-2.6.12-rc2").
Re
nvd
CVE-2024-36941MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36941 [MEDIUM] CWE-476 CVE-2024-36941: In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: don't free NULL
In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: don't free NULL coalescing rule
If the parsing fails, we can dereference a NULL pointer here.
nvd
CVE-2024-36020MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36020 [MEDIUM] CWE-908 CVE-2024-36020: In the Linux kernel, the following vulnerability has been resolved:
i40e: fix vf may be used uninit
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix vf may be used uninitialized in this function warning
To fix the regression introduced by commit 52424f974bc5, which causes
servers hang in very hard to reproduce conditions with resets races.
Using two sources for the information is the root cause.
In this function befo
nvd
CVE-2023-52882MEDIUMCVSS 5.5v10.02024-05-30
CVE-2023-52882 [MEDIUM] CVE-2023-52882: In the Linux kernel, the following vulnerability has been resolved:
clk: sunxi-ng: h6: Reparent CPU
In the Linux kernel, the following vulnerability has been resolved:
clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change
While PLL CPUX clock rate change when CPU is running from it works in
vast majority of cases, now and then it causes instability. This leads
to system crashes and other undefined behaviour. After a lot of testing
(30+ hours) whi
nvd
CVE-2024-36946MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36946 [MEDIUM] CWE-401 CVE-2024-36946: In the Linux kernel, the following vulnerability has been resolved:
phonet: fix rtm_phonet_notify()
In the Linux kernel, the following vulnerability has been resolved:
phonet: fix rtm_phonet_notify() skb allocation
fill_route() stores three components in the skb:
- struct rtmsg
- RTA_DST (u8)
- RTA_OIF (u32)
Therefore, rtm_phonet_notify() should use
NLMSG_ALIGN(sizeof(struct rtmsg)) +
nla_total_size(1) +
nla_total_size(4)
nvd
CVE-2024-36957MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36957 [MEDIUM] CWE-193 CVE-2024-36957: In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: avoid off-by-one
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: avoid off-by-one read from userspace
We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffe
nvd
CVE-2024-36889MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36889 [MEDIUM] CVE-2024-36889: In the Linux kernel, the following vulnerability has been resolved:
mptcp: ensure snd_nxt is proper
In the Linux kernel, the following vulnerability has been resolved:
mptcp: ensure snd_nxt is properly initialized on connect
Christoph reported a splat hinting at a corrupted snd_una:
WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
Modules linked in:
CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted
nvd