Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 46 of 496
CVE-2024-26981HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26981 [HIGH] CWE-129 CVE-2024-26981: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix OOB in nilfs_set_de In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix OOB in nilfs_set_de_type The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is defined as "S_IFMT >> S_SHIFT", but the nilfs_set_de_type() function, which uses this array, specifies the index to read from the array in the same way as "(mode & S_IFMT) >>
nvd
CVE-2024-27024HIGHCVSS 7.8v10.02024-05-01
CVE-2024-27024 [HIGH] CVE-2024-27024: In the Linux kernel, the following vulnerability has been resolved: net/rds: fix WARNING in rds_con In the Linux kernel, the following vulnerability has been resolved: net/rds: fix WARNING in rds_conn_connect_if_down If connection isn't established yet, get_mr() will fail, trigger connection after get_mr().
nvd
CVE-2024-26965HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26965 [HIGH] CWE-787 CVE-2024-26965: In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-msm8974: fix te In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed b
nvd
CVE-2024-26956HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26956 [HIGH] CVE-2024-26956: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix failure to detect D In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix failure to detect DAT corruption in btree and direct mappings Patch series "nilfs2: fix kernel bug at submit_bh_wbc()". This resolves a kernel BUG reported by syzbot. Since there are two flaws involved, I've made each one a separate patch. The first patch alone resolves the sy
nvd
CVE-2024-27065HIGHCVSS 7.8v10.02024-05-01
CVE-2024-27065 [HIGH] CVE-2024-27065: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not co In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.
nvd
CVE-2024-27052HIGHCVSS 7.4v10.02024-05-01
CVE-2024-27052 [HIGH] CWE-416 CVE-2024-27052: In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
nvd
CVE-2024-26955HIGHCVSS 7.8v10.02024-05-01
CVE-2024-26955 [HIGH] CVE-2024-26955: In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent kernel bug at s In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent kernel bug at submit_bh_wbc() Fix a bug where nilfs_get_block() returns a successful status when searching and inserting the specified block both fail inconsistently. If this inconsistent behavior is not due to a previously fixed bug, then an unexpected race is occurring, so
nvd
CVE-2024-27077MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27077 [MEDIUM] CWE-401 CVE-2024-27077: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: fix a meml In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity The entity->name (i.e. name) is allocated in v4l2_m2m_register_entity but isn't freed in its following error-handling paths. This patch adds such deallocation to prevent memleak of entity->name.
nvd
CVE-2024-26999MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26999 [MEDIUM] CWE-667 CVE-2024-26999: In the Linux kernel, the following vulnerability has been resolved: serial/pmac_zilog: Remove flawe In the Linux kernel, the following vulnerability has been resolved: serial/pmac_zilog: Remove flawed mitigation for rx irq flood The mitigation was intended to stop the irq completely. That may be better than a hard lock-up but it turns out that you get a crash anyway if you're using pmac_zilog as a serial console: ttyPZ0: pmz: rx irq flood ! BUG
nvd
CVE-2024-26931MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26931 [MEDIUM] CWE-476 CVE-2024-26931: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix command flus In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix command flush on cable pull System crash due to command failed to flush back to SCSI layer. BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Ta
nvd
CVE-2024-26997MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26997 [MEDIUM] CWE-476 CVE-2024-26997: In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: host: Fix dereferenc In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: host: Fix dereference issue in DDMA completion flow. Fixed variable dereference issue in DDMA completion flow.
nvd
CVE-2024-27074MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27074 [MEDIUM] CWE-401 CVE-2024-27074: In the Linux kernel, the following vulnerability has been resolved: media: go7007: fix a memleak in In the Linux kernel, the following vulnerability has been resolved: media: go7007: fix a memleak in go7007_load_encoder In go7007_load_encoder, bounce(i.e. go->boot_fw), is allocated without a deallocation thereafter. After the following call chain: saa7134_go7007_init |-> go7007_boot_encoder |-> go7007_load_encoder |-> kfree(go) go is freed and
nvd
CVE-2024-27038MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27038 [MEDIUM] CWE-476 CVE-2024-27038: In the Linux kernel, the following vulnerability has been resolved: clk: Fix clk_core_get NULL dere In the Linux kernel, the following vulnerability has been resolved: clk: Fix clk_core_get NULL dereference It is possible for clk_core_get to dereference a NULL in the following sequence: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() can return NULL which is dereferenced by clk_core_get
nvd
CVE-2024-27001MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27001 [MEDIUM] CVE-2024-27001: In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix incomplete In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix incomplete endpoint checking While vmk80xx does have endpoint checking implemented, some things can fall through the cracks. Depending on the hardware model, URBs can have either bulk or interrupt type, and current version of vmk80xx_find_usb_endpoints() function does
nvd
CVE-2024-26970MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26970 [MEDIUM] CWE-125 CVE-2024-26970: In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq6018: fix ter In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed
nvd
CVE-2024-27044MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27044 [MEDIUM] CWE-476 CVE-2024-27044: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()' The 'stream' pointer is used in dcn10_set_output_transfer_func() before the check if 'stream' is NULL. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn10/dcn10_hwseq.c:
nvd
CVE-2024-26984MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26984 [MEDIUM] CWE-362 CVE-2024-26984: In the Linux kernel, the following vulnerability has been resolved: nouveau: fix instmem race condi In the Linux kernel, the following vulnerability has been resolved: nouveau: fix instmem race condition around ptr stores Running a lot of VK CTS in parallel against nouveau, once every few hours you might see something like this crash. BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 1
nvd
CVE-2024-26994MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26994 [MEDIUM] CVE-2024-26994: In the Linux kernel, the following vulnerability has been resolved: speakup: Avoid crash on very lo In the Linux kernel, the following vulnerability has been resolved: speakup: Avoid crash on very long word In case a console is set up really large and contains a really long word (> 256 characters), we have to stop before the length of the word buffer.
nvd
CVE-2024-27388MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27388 [MEDIUM] CWE-401 CVE-2024-27388: In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gs In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gssx_dec_option_array The creds and oa->data need to be freed in the error-handling paths after their allocation. So this patch add these deallocations in the corresponding paths.
nvd
CVE-2024-27030MEDIUMCVSS 6.3v10.02024-05-01
CVE-2024-27030 [MEDIUM] CWE-362 CVE-2024-27030: In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Use separate hand In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Use separate handlers for interrupts For PF to AF interrupt vector and VF to AF vector same interrupt handler is registered which is causing race condition. When two interrupts are raised to two CPUs at same time then two cores serve same event corrupting the data.
nvd