Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 45 of 496
CVE-2024-3044MEDIUMCVSS 6.5v10.02024-05-14
CVE-2024-3044 [MEDIUM] CWE-356 CVE-2024-3044: Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an at Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.
nvd
CVE-2024-4769MEDIUMCVSS 5.9v10.02024-05-14
CVE-2024-4769 [MEDIUM] CWE-351 CVE-2024-4769: When importing resources using Web Workers, error messages would distinguish the difference between When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
nvd
CVE-2024-34397MEDIUMCVSS 5.2v10.02024-05-07
CVE-2024-34397 [MEDIUM] CWE-290 CVE-2024-34397: An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDB An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by
nvd
CVE-2024-34069HIGHCVSS 7.5PoCv11.02024-05-06
CVE-2024-34069 [HIGH] CWE-352 CVE-2024-34069: Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkz Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it
nvd
CVE-2024-33602HIGHCVSS 7.4v10.02024-05-06
CVE-2024-33602 [HIGH] CWE-466 CVE-2024-33602: nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (n nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nvd
CVE-2024-33601HIGHCVSS 7.3v10.02024-05-06
CVE-2024-33601 [HIGH] CWE-617 CVE-2024-33601: nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemo nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
nvd
CVE-2024-33599HIGHCVSS 8.1v10.02024-05-06
CVE-2024-33599 [HIGH] CWE-121 CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in t
nvd
CVE-2024-33600MEDIUMCVSS 5.9v10.02024-05-06
CVE-2024-33600 [MEDIUM] CWE-476 CVE-2024-33600: nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nvd
CVE-2024-34509MEDIUMCVSS 5.3v10.02024-05-05
CVE-2024-34509 [MEDIUM] CVE-2024-34509: dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message. dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.
nvd
CVE-2024-34508MEDIUMCVSS 4.3v10.02024-05-05
CVE-2024-34508 [MEDIUM] CWE-476 CVE-2024-34508: dcmnet in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message. dcmnet in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.
nvd
CVE-2024-27053CRITICALCVSS 9.1v10.02024-05-01
CVE-2024-27053 [CRITICAL] CWE-476 CVE-2024-27053: In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix RCU usage i In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix RCU usage in connect path With lockdep enabled, calls to the connect function from cfg802.11 layer lead to the following warning: WARNING: suspicious RCU usage 6.7.0-rc1-wt+ #333 Not tainted drivers/net/wireless/microchip/wilc1000/hif.c:386 suspicious rcu_de
nvd
CVE-2024-26988HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26988 [HIGH] CWE-787 CVE-2024-26988: In the Linux kernel, the following vulnerability has been resolved: init/main.c: Fix potential stat In the Linux kernel, the following vulnerability has been resolved: init/main.c: Fix potential static_command_line memory overflow We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for static_command_line, but the strings copied into static_command_line are extra_command_line and command_line, rather than extra_command_line and boot_
nvd
CVE-2024-26958HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26958 [HIGH] CWE-416 CVE-2024-26958: In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes In production we have been hitting the following warning consistently ------------[ cut here ]------------ refcount_t: underflow; use-after-free. WARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0 Workqueue: nfsiod nfs_di
nvd
CVE-2024-27000HIGHCVSS 7.8v10.02024-05-01
CVE-2024-27000 [HIGH] CVE-2024-27000: In the Linux kernel, the following vulnerability has been resolved: serial: mxs-auart: add spinlock In the Linux kernel, the following vulnerability has been resolved: serial: mxs-auart: add spinlock around changing cts state The uart_handle_cts_change() function in serial_core expects the caller to hold uport->lock. For example, I have seen the below kernel splat, when the Bluetooth driver is loaded on an i.MX28 board. [ 85.119255] ------------[ cut her
nvd
CVE-2024-27008HIGHCVSS 7.8v10.02024-05-01
CVE-2024-27008 [HIGH] CWE-125 CVE-2024-27008: In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds ac In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or) is used as index there. The 'or' argument of fabricate_dcb_output() must
nvd
CVE-2024-26957HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26957 [HIGH] CWE-416 CVE-2024-26957: In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix reference coun In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix reference counting on zcrypt card objects Tests with hot-plugging crytpo cards on KVM guests with debug kernel build revealed an use after free for the load field of the struct zcrypt_card. The reason was an incorrect reference handling of the zcrypt card object whi
nvd
CVE-2024-26951HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26951 [HIGH] CWE-416 CVE-2024-26951: In the Linux kernel, the following vulnerability has been resolved: wireguard: netlink: check for d In the Linux kernel, the following vulnerability has been resolved: wireguard: netlink: check for dangling peer via is_dead instead of empty list If all peers are removed via wg_peer_remove_all(), rather than setting peer_list to empty, the peer is added to a temporary list with a head on the stack of wg_peer_remove_all(). If a netlink dump is resum
nvd
CVE-2024-26974HIGHCVSS 7.0v10.02024-05-01
CVE-2024-26974 [HIGH] CWE-367 CVE-2024-26974: In the Linux kernel, the following vulnerability has been resolved: crypto: qat - resolve race cond In the Linux kernel, the following vulnerability has been resolved: crypto: qat - resolve race condition during AER recovery During the PCI AER system's error recovery process, the kernel driver may encounter a race condition with freeing the reset_data structure's memory. If the device restart will take more than 10 seconds the function scheduling
nvd
CVE-2024-26976HIGHCVSS 7.0v10.02024-05-01
CVE-2024-26976 [HIGH] CWE-400 CVE-2024-26976: In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF wor In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF workqueue when vCPU is being destroyed Always flush the per-vCPU async #PF workqueue when a vCPU is clearing its completion queue, e.g. when a VM and all its vCPUs is being destroyed. KVM must ensure that none of its workqueue callbacks is running when th
nvd
CVE-2024-27075HIGHCVSS 7.8v10.02024-05-01
CVE-2024-27075 [HIGH] CVE-2024-27075: In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid sta In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid stack overflow warnings with clang A previous patch worked around a KASAN issue in stv0367, now a similar problem showed up with clang: drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend
nvd