Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 43 of 496
CVE-2024-27419MEDIUMCVSS 4.7v10.02024-05-17
CVE-2024-27419 [MEDIUM] CWE-362 CVE-2024-27419: In the Linux kernel, the following vulnerability has been resolved: netrom: Fix data-races around s In the Linux kernel, the following vulnerability has been resolved: netrom: Fix data-races around sysctl_net_busy_read We need to protect the reader reading the sysctl value because the value can be changed concurrently.
nvd
CVE-2024-35821MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35821 [MEDIUM] CWE-772 CVE-2024-35821: In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the correct place Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into
nvd
CVE-2023-52670MEDIUMCVSS 5.5v10.02024-05-17
CVE-2023-52670 [MEDIUM] CWE-401 CVE-2023-52670: In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_over In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 b
nvd
CVE-2024-35823MEDIUMCVSS 5.3v10.02024-05-17
CVE-2024-35823 [MEDIUM] CWE-120 CVE-2024-35823: In the Linux kernel, the following vulnerability has been resolved: vt: fix unicode buffer corrupti In the Linux kernel, the following vulnerability has been resolved: vt: fix unicode buffer corruption when deleting characters This is the same issue that was fixed for the VGA text buffer in commit 39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the buffer"). The cure is also the same i.e. replace memcpy() with memmove() due to t
nvd
CVE-2023-52690MEDIUMCVSS 5.5v10.02024-05-17
CVE-2023-52690 [MEDIUM] CWE-476 CVE-2023-52690: In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null poi In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks.
nvd
CVE-2024-35822MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35822 [MEDIUM] CVE-2024-35822: In the Linux kernel, the following vulnerability has been resolved: usb: udc: remove warning when q In the Linux kernel, the following vulnerability has been resolved: usb: udc: remove warning when queue disabled ep It is possible trigger below warning message from mass storage function, WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104 pc : usb_ep_queue+0x7c/0x104 lr : fsg_main_thread+0x494/0x1b3c Root cause is ma
nvd
CVE-2023-52694MEDIUMCVSS 5.5v10.02024-05-17
CVE-2023-52694 [MEDIUM] CVE-2023-52694: In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tpd12s015: Drop bug In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function With tpd12s015_remove() marked with __exit this function is discarded when the driver is compiled as a built-in. The result is that when the driver unbinds there is no cleanup done which results in resource leakage or
nvd
CVE-2024-35807MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35807 [MEDIUM] CVE-2024-35807: In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on- In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize We observed a corruption during on-line resize of a file system that is larger than 16 TiB with 4k block size. With having more then 2^32 blocks resize_inode is turned off by default by mke2fs. The issue can be reproduced on a smaller file system
nvd
CVE-2024-35848MEDIUMCVSS 4.7v10.02024-05-17
CVE-2024-35848 [MEDIUM] CWE-362 CVE-2024-35848: In the Linux kernel, the following vulnerability has been resolved: eeprom: at24: fix memory corrup In the Linux kernel, the following vulnerability has been resolved: eeprom: at24: fix memory corruption race condition If the eeprom is not accessible, an nvmem device will be registered, the read will fail, and the device will be torn down. If another driver accesses the nvmem device after the teardown, it will reference invalid memory. Move the
nvd
CVE-2024-27412MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-27412 [MEDIUM] CVE-2024-27412: In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx-i2c: Do In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx-i2c: Do not free non existing IRQ The bq27xxx i2c-client may not have an IRQ, in which case client->irq will be 0. bq27xxx_battery_i2c_probe() already has an if (client->irq) check wrapping the request_threaded_irq(). But bq27xxx_battery_i2c_remove() unconditionally
nvd
CVE-2024-35835MEDIUMCVSS 5.3v10.02024-05-17
CVE-2024-35835 [MEDIUM] CWE-415 CVE-2024-35835: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a double-free in In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a double-free in arfs_create_groups When `in` allocated by kvzalloc fails, arfs_create_groups will free ft->g and return an error. However, arfs_create_table, the only caller of arfs_create_groups, will hold this error and call to mlx5e_destroy_flow_table, in which
nvd
CVE-2024-27436MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-27436 [MEDIUM] CWE-787 CVE-2024-27436: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Stop parsing c In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Stop parsing channels bits when all channels are found. If a usb audio device sets more bits than the amount of channels it could write outside of the map array.
nvd
CVE-2024-27410MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-27410 [MEDIUM] CVE-2024-27410: In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype ch In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype change with mesh ID change It's currently possible to change the mesh ID when the interface isn't yet in mesh mode, at the same time as changing it into mesh mode. This leads to an overwrite of data in the wdev->u union for the interface type it currently has,
nvd
CVE-2024-35837MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35837 [MEDIUM] CVE-2024-35837: In the Linux kernel, the following vulnerability has been resolved: net: mvpp2: clear BM pool befor In the Linux kernel, the following vulnerability has been resolved: net: mvpp2: clear BM pool before initialization Register value persist after booting the kernel using kexec which results in kernel panic. Thus clear the BM pool registers before initialisation to fix the issue.
nvd
CVE-2024-35830MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35830 [MEDIUM] CVE-2024-35830: In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.
nvd
CVE-2023-52686MEDIUMCVSS 5.5v10.02024-05-17
CVE-2023-52686 [MEDIUM] CWE-476 CVE-2023-52686: In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null poi In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.
nvd
CVE-2024-27414MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-27414 [MEDIUM] CVE-2024-27414: In the Linux kernel, the following vulnerability has been resolved: rtnetlink: fix error logic of I In the Linux kernel, the following vulnerability has been resolved: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back In the commit d73ef2d69c0d ("rtnetlink: let rtnl_bridge_setlink checks IFLA_BRIDGE_MODE length"), an adjustment was made to the old loop logic in the function `rtnl_bridge_setlink` to enable the loop to also check the length of
nvd
CVE-2024-35819MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35819 [MEDIUM] CVE-2024-35819: In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Use raw spinlo In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Use raw spinlock for cgr_lock smp_call_function always runs its callback in hard IRQ context, even on PREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock for cgr_lock to ensure we aren't waiting on a sleeping task. Although this bug has existed for a
nvd
CVE-2024-35825MEDIUMCVSS 5.5v10.02024-05-17
CVE-2024-35825 [MEDIUM] CVE-2024-35825: In the Linux kernel, the following vulnerability has been resolved: usb: gadget: ncm: Fix handling In the Linux kernel, the following vulnerability has been resolved: usb: gadget: ncm: Fix handling of zero block length packets While connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX set to 65536, it has been observed that we receive short packets, which come at interval of 5-10 seconds sometimes and have block length zero but still contain 1-2 vali
nvd
CVE-2023-52693MEDIUMCVSS 5.5v10.02024-05-17
CVE-2023-52693 [MEDIUM] CVE-2023-52693: In the Linux kernel, the following vulnerability has been resolved: ACPI: video: check for error wh In the Linux kernel, the following vulnerability has been resolved: ACPI: video: check for error while searching for backlight device parent If acpi_get_parent() called in acpi_video_dev_register_backlight() fails, for example, because acpi_ut_acquire_mutex() fails inside acpi_get_parent), this can lead to incorrect (uninitialized) acpi_parent handle bein
nvd
Debian Linux vulnerabilities | cvebase