Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 39 of 496
CVE-2024-36905MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36905 [MEDIUM] CWE-369 CVE-2024-36905: In the Linux kernel, the following vulnerability has been resolved:
tcp: defer shutdown(SEND_SHUTDO
In the Linux kernel, the following vulnerability has been resolved:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
TCP_SYN_RECV state is really special, it is only used by
cross-syn connections, mostly used by fuzzers.
In the following crash [1], syzbot managed to trigger a divide
by zero in tcp_rcv_space_adjust()
A socket makes the
nvd
CVE-2024-36017MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36017 [MEDIUM] CVE-2024-36017: In the Linux kernel, the following vulnerability has been resolved:
rtnetlink: Correct nested IFLA_
In the Linux kernel, the following vulnerability has been resolved:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validati
nvd
CVE-2024-36954MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36954 [MEDIUM] CWE-401 CVE-2024-36954: In the Linux kernel, the following vulnerability has been resolved:
tipc: fix a possible memleak in
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix a possible memleak in tipc_buf_append
__skb_linearize() doesn't free the skb when it fails, so move
'*buf = NULL' after __skb_linearize(), so that the skb can be
freed on the err path.
nvd
CVE-2024-36919MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36919 [MEDIUM] CWE-667 CVE-2024-36919: In the Linux kernel, the following vulnerability has been resolved:
scsi: bnx2fc: Remove spin_lock_
In the Linux kernel, the following vulnerability has been resolved:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
The session resources are used by FW and driver when session is offloaded,
once session is uploaded these resources are not used. The lock is not
required as these fields won't be used any longer. The offload
nvd
CVE-2024-36953MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36953 [MEDIUM] CWE-476 CVE-2024-36953: In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: vgic-v2: Check for
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
vgic_v2_parse_attr() is responsible for finding the vCPU that matches
the user-provided CPUID, which (of course) may not be valid. If the ID
is invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled
grace
nvd
CVE-2024-36929MEDIUMCVSS 5.5v10.02024-05-30
CVE-2024-36929 [MEDIUM] CWE-476 CVE-2024-36929: In the Linux kernel, the following vulnerability has been resolved:
net: core: reject skb_copy(_exp
In the Linux kernel, the following vulnerability has been resolved:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become
invalid. Return NULL if such an skb is passed to skb_copy or
skb_copy_expand, in order to prevent a crash on a potential later
call to skb_gso_segment.
nvd
CVE-2024-36950MEDIUMCVSS 4.4v10.02024-05-30
CVE-2024-36950 [MEDIUM] CVE-2024-36950: In the Linux kernel, the following vulnerability has been resolved:
firewire: ohci: mask bus reset
In the Linux kernel, the following vulnerability has been resolved:
firewire: ohci: mask bus reset interrupts between ISR and bottom half
In the FireWire OHCI interrupt handler, if a bus reset interrupt has
occurred, mask bus reset interrupts until bus_reset_work has serviced and
cleared the interrupt.
Normally, we always leave bus reset interrupts masked
nvd
CVE-2023-52880MEDIUMCVSS 5.5v10.02024-05-24
CVE-2023-52880 [MEDIUM] CVE-2023-52880: In the Linux kernel, the following vulnerability has been resolved:
tty: n_gsm: require CAP_NET_ADM
In the Linux kernel, the following vulnerability has been resolved:
tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
Any unprivileged user can attach N_GSM0710 ldisc, but it requires
CAP_NET_ADMIN to create a GSM network anyway.
Require initial namespace CAP_NET_ADMIN to do that.
nvd
CVE-2024-4453HIGHCVSS 7.8v10.02024-05-22
CVE-2024-4453 [HIGH] CWE-190 CVE-2024-4453: GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerabi
GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists w
nvd
CVE-2021-47489HIGHCVSS 7.8v11.02024-05-22
CVE-2021-47489 [HIGH] CVE-2021-47489: In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix even more out o
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix even more out of bound writes from debugfs
CVE-2021-42327 was fixed by:
commit f23750b5b3d98653b31d4469592935ef6364ad67
Author: Thelford Williams
Date: Wed Oct 13 16:04:13 2021 -0400
drm/amdgpu: fix out of bounds write
but amdgpu_dm_debugfs.c contains more of the same iss
nvd
CVE-2023-52752HIGHCVSS 7.8v11.02024-05-21
CVE-2023-52752 [HIGH] CWE-416 CVE-2023-52752: In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix use-after-free
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
Skip SMB sessions that are being teared down
(e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show()
to avoid use-after-free in @ses.
This fixes the following GPF when reading from /proc/fs/cifs/DebugD
nvd
CVE-2023-52812HIGHCVSS 7.8v11.02024-05-21
CVE-2023-52812 [HIGH] CWE-129 CVE-2023-52812: In the Linux kernel, the following vulnerability has been resolved:
drm/amd: check num of link leve
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: check num of link levels when update pcie param
In SR-IOV environment, the value of pcie_table->num_of_link_levels will
be 0, and num_of_levels - 1 will cause array index out of bounds
nvd
CVE-2021-47247HIGHCVSS 7.8v11.02024-05-21
CVE-2021-47247 [HIGH] CWE-416 CVE-2021-47247: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix use-after-free o
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock
removal from TC filter update path and properly handle concurrent encap
entry insertion/deletion which can lead to following use-after-free:
nvd
CVE-2023-52757HIGHCVSS 7.8v11.02024-05-21
CVE-2023-52757 [HIGH] CWE-416 CVE-2023-52757: In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential dead
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential deadlock when releasing mids
All release_mid() callers seem to hold a reference of @mid so there is
no need to call kref_put(&mid->refcount, __release_mid) under
@server->mid_lock spinlock. If they don't, then an use-after-free bug
would have occurred anyw
nvd
CVE-2024-35960CRITICALCVSS 9.1Exploitedv10.02024-05-20
CVE-2024-35960 [CRITICAL] CWE-476 CVE-2024-35960: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Properly link new fs
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Properly link new fs rules into the tree
Previously, add_rule_fg would only add newly created rules from the
handle into the tree when they had a refcount of 1. On the other hand,
create_flow_handle tries hard to find and reference already existing
identical rules inste
nvd
CVE-2024-35967HIGHCVSS 7.1v10.02024-05-20
CVE-2024-35967 [HIGH] CWE-125 CVE-2024-35967: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: SCO: Fix not validat
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: SCO: Fix not validating setsockopt user input
syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_f
nvd
CVE-2024-35955HIGHCVSS 8.8v10.02024-05-20
CVE-2024-35955 [HIGH] CWE-416 CVE-2024-35955: In the Linux kernel, the following vulnerability has been resolved:
kprobes: Fix possible use-after
In the Linux kernel, the following vulnerability has been resolved:
kprobes: Fix possible use-after-free issue on kprobe registration
When unloading a module, its state is changing MODULE_STATE_LIVE ->
MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Each change will take
a time. `is_module_text_address()` and `__module_text_address()`
works with MODULE
nvd
CVE-2024-35962MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35962 [MEDIUM] CVE-2024-35962: In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation
In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.
In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_in
nvd
CVE-2024-36006MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-36006 [MEDIUM] CVE-2024-36006: In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_acl_tcam: Fix i
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
Both the function that migrates all the chunks within a region and the
function that migrates all the entries within a chunk call
list_first_entry() on the respective lists without checking that the
lists are not empty. This is incorr
nvd
CVE-2024-35958MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35958 [MEDIUM] CVE-2024-35958: In the Linux kernel, the following vulnerability has been resolved:
net: ena: Fix incorrect descrip
In the Linux kernel, the following vulnerability has been resolved:
net: ena: Fix incorrect descriptor free behavior
ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
or XDP_TX instructions
The ena_free_tx_bufs() cycles through all
nvd