Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 40 of 496
CVE-2024-35969MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35969 [MEDIUM] CWE-770 CVE-2024-35969: In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition betwee In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it still means hlist_for_each_entry_rcu can return an item that got removed from the list. The memory itself of such item is not freed thanks to RCU
nvd
CVE-2024-35973MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35973 [MEDIUM] CWE-908 CVE-2024-35973: In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation i In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation in geneve[6]_xmit_skb syzbot is able to trigger an uninit-value in geneve_xmit() [1] Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfield()) uses skb_protocol(skb, true), pskb_inet_may_pull() is only using skb->protocol. If anything el
nvd
CVE-2024-35988MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35988 [MEDIUM] CVE-2024-35988: In the Linux kernel, the following vulnerability has been resolved: riscv: Fix TASK_SIZE on 64-bit In the Linux kernel, the following vulnerability has been resolved: riscv: Fix TASK_SIZE on 64-bit NOMMU On NOMMU, userspace memory can come from anywhere in physical RAM. The current definition of TASK_SIZE is wrong if any RAM exists above 4G, causing spurious failures in the userspace access routines.
nvd
CVE-2024-35996MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35996 [MEDIUM] CVE-2024-35996: In the Linux kernel, the following vulnerability has been resolved: cpu: Re-enable CPU mitigations In the Linux kernel, the following vulnerability has been resolved: cpu: Re-enable CPU mitigations by default for !X86 architectures Rename x86's to CPU_MITIGATIONS, define it in generic code, and force it on for all architectures exception x86. A recent commit to turn mitigations off by default if SPECULATION_MITIGATIONS=n kinda sorta missed that "cpu_mit
nvd
CVE-2024-36005MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-36005 [MEDIUM] CVE-2024-36005: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: honor tab In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: honor table dormant flag from netdev release event path Check for table dormant flag otherwise netdev release event path tries to unregister an already unregistered hook. [524854.857999] ------------[ cut here ]------------ [524854.858010] WARNING: CPU: 0 PID: 33865
nvd
CVE-2024-36007MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-36007 [MEDIUM] CVE-2024-36007: In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix w In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix warning during rehash As previously explained, the rehash delayed work migrates filters from one region to another. This is done by iterating over all chunks (all the filters with the same priority) in the region and in each chunk iterating over all the filte
nvd
CVE-2024-35950MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-35950 [MEDIUM] CVE-2024-35950: In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mutex. Thus we need to extend modes[] the same protection or by the time we use it the elements may already be
nvd
CVE-2024-36004MEDIUMCVSS 5.5v10.02024-05-20
CVE-2024-36004 [MEDIUM] CVE-2024-36004: In the Linux kernel, the following vulnerability has been resolved: i40e: Do not use WQ_MEM_RECLAIM In the Linux kernel, the following vulnerability has been resolved: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue Issue reported by customer during SRIOV testing, call trace: When both i40e and the i40iw driver are loaded, a warning in check_flush_dependency is being triggered. This seems to be because of the i40e driver workqueue is allocated with t
nvd
CVE-2024-35867HIGHCVSS 7.8v11.02024-05-19
CVE-2024-35867 [HIGH] CWE-416 CVE-2024-35867: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
nvd
CVE-2024-35866HIGHCVSS 7.8v11.02024-05-19
CVE-2024-35866 [HIGH] CWE-416 CVE-2024-35866: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_dump_full_key() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
nvd
CVE-2024-35905HIGHCVSS 7.8v10.02024-05-19
CVE-2024-35905 [HIGH] CWE-129 CVE-2024-35905: In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overfl In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear negative as a result of overflowing its signed int representation. This should not actually happen, as th
nvd
CVE-2024-35886HIGHCVSS 7.8v10.02024-05-19
CVE-2024-35886 [HIGH] CWE-674 CVE-2024-35886: In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix infinite recursion in In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix infinite recursion in fib6_dump_done(). syzkaller reported infinite recursive calls of fib6_dump_done() during netlink socket destruction. [1] From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then the response was generated. The following recvmmsg() res
nvd
CVE-2024-35896HIGHCVSS 7.1v10.02024-05-19
CVE-2024-35896 [HIGH] CWE-125 CVE-2024-35896: In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input for expected length I got multiple syzbot reports showing old bugs exposed by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc in cgroup/{s,g}etsockopt") setsockopt() @optlen argument should be taken into account before copying data. BUG: KAS
nvd
CVE-2024-35871HIGHCVSS 7.1v10.02024-05-19
CVE-2024-35871 [HIGH] CVE-2024-35871: In the Linux kernel, the following vulnerability has been resolved: riscv: process: Fix kernel gp l In the Linux kernel, the following vulnerability has been resolved: riscv: process: Fix kernel gp leakage childregs represents the registers which are active for the new thread in user context. For a kernel thread, childregs->gp is never used since the kernel gp is not touched by switch_to. For a user mode helper, the gp value can be observed in user space
nvd
CVE-2024-35910MEDIUMCVSS 5.8v10.02024-05-19
CVE-2024-35910 [MEDIUM] CVE-2024-35910: In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed
nvd
CVE-2024-35893MEDIUMCVSS 5.5v10.02024-05-19
CVE-2024-35893 [MEDIUM] CWE-908 CVE-2024-35893: In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: prevent In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: prevent kernel-infoleak syzbot found that tcf_skbmod_dump() was copying four bytes from kernel stack to user space [1]. The issue here is that 'struct tc_skbmod' has a four bytes hole. We need to clear the structure before filling fields. [1] BUG: KMSAN: k
nvd
CVE-2024-35915MEDIUMCVSS 5.5v10.02024-05-19
CVE-2024-35915 [MEDIUM] CWE-908 CVE-2024-35915: In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in n In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet syzbot reported the following uninit-value access issue [1][2]: nci_rx_work() parses and processes received packet. When the payload length is zero, each message type handler reads uninitialized payload and KMSAN detects
nvd
CVE-2024-35944MEDIUMCVSS 5.5v10.02024-05-19
CVE-2024-35944 [MEDIUM] CVE-2024-35944: In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time war In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&dg_info->msg" at drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24) WARNING: CPU: 0 PID: 1555 at drivers/mi
nvd
CVE-2024-35895MEDIUMCVSS 5.5v10.02024-05-19
CVE-2024-35895 [MEDIUM] CWE-667 CVE-2024-35895: In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Prevent lock inve In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Prevent lock inversion deadlock in map delete elem syzkaller started using corpuses where a BPF tracing program deletes elements from a sockmap/sockhash map. Because BPF tracing programs can be invoked from any interrupt context, locks taken during a map_delete_elem
nvd
CVE-2024-35922MEDIUMCVSS 5.5v10.02024-05-19
CVE-2024-35922 [MEDIUM] CWE-369 CVE-2024-35922: In the Linux kernel, the following vulnerability has been resolved: fbmon: prevent division by zero In the Linux kernel, the following vulnerability has been resolved: fbmon: prevent division by zero in fb_videomode_from_videomode() The expression htotal * vtotal can have a zero value on overflow. It is necessary to prevent division by zero like in fb_var_to_videomode(). Found by Linux Verification Center (linuxtesting.org) with Svace.
nvd