Debian Linux vulnerabilities
9,911 known vulnerabilities affecting debian/debian_linux.
Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362
Vulnerabilities
Page 47 of 496
CVE-2024-26966MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26966 [MEDIUM] CWE-129 CVE-2024-26966: In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: mmcc-apq8084: fix te
In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed
nvd
CVE-2024-26950MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26950 [MEDIUM] CWE-476 CVE-2024-26950: In the Linux kernel, the following vulnerability has been resolved:
wireguard: netlink: access devi
In the Linux kernel, the following vulnerability has been resolved:
wireguard: netlink: access device through ctx instead of peer
The previous commit fixed a bug that led to a NULL peer->device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx->wg. This semantically makes more sense
too, since
nvd
CVE-2024-26937MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26937 [MEDIUM] CWE-617 CVE-2024-26937: In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gt: Reset queue_priori
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gt: Reset queue_priority_hint on parking
Originally, with strict in order execution, we could complete execution
only when the queue was empty. Preempt-to-busy allows replacement of an
active request that may complete before the preemption is processed by
HW. If that happ
nvd
CVE-2024-27028MEDIUMCVSS 6.5v10.02024-05-01
CVE-2024-27028 [MEDIUM] CWE-476 CVE-2024-27028: In the Linux kernel, the following vulnerability has been resolved:
spi: spi-mt65xx: Fix NULL point
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
The TX buffer in spi_transfer can be a NULL pointer, so the interrupt
handler may end up writing to the invalid memory and cause crashes.
Add a check to trans->tx_buf before using it.
nvd
CVE-2024-27059MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27059 [MEDIUM] CWE-369 CVE-2024-27059: In the Linux kernel, the following vulnerability has been resolved:
USB: usb-storage: Prevent divid
In the Linux kernel, the following vulnerability has been resolved:
USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
The isd200 sub-driver in usb-storage uses the HEADS and SECTORS values
in the ATA ID information to calculate cylinder and head values when
creating a CDB for READ or WRITE commands. The calculation involves
divisio
nvd
CVE-2024-26935MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26935 [MEDIUM] CVE-2024-26935: In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix unremoved procf
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix unremoved procfs host directory regression
Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name}
directory earlier") fixed a bug related to modules loading/unloading, by
adding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led
to a potenti
nvd
CVE-2024-27073MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27073 [MEDIUM] CWE-401 CVE-2024-27073: In the Linux kernel, the following vulnerability has been resolved:
media: ttpci: fix two memleaks
In the Linux kernel, the following vulnerability has been resolved:
media: ttpci: fix two memleaks in budget_av_attach
When saa7146_register_device and saa7146_vv_init fails, budget_av_attach
should free the resources it allocates, like the error-handling of
ttpci_budget_init does. Besides, there are two fixme comment refers to
such deallocations.
nvd
CVE-2024-26960MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26960 [MEDIUM] CWE-362 CVE-2024-26960: In the Linux kernel, the following vulnerability has been resolved:
mm: swap: fix race between free
In the Linux kernel, the following vulnerability has been resolved:
mm: swap: fix race between free_swap_and_cache() and swapoff()
There was previously a theoretical window where swapoff() could run and
teardown a swap_info_struct while a call to free_swap_and_cache() was
running in another thread. This could cause, amongst other bad
possibilities
nvd
CVE-2024-27004MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27004 [MEDIUM] CWE-667 CVE-2024-27004: In the Linux kernel, the following vulnerability has been resolved:
clk: Get runtime PM before walk
In the Linux kernel, the following vulnerability has been resolved:
clk: Get runtime PM before walking tree during disable_unused
Doug reported [1] the following hung task:
INFO: task swapper/0:1 blocked for more than 122 seconds.
Not tainted 5.15.149-21875-gf795ebc40eb8 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
nvd
CVE-2024-27025MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27025 [MEDIUM] CWE-476 CVE-2024-27025: In the Linux kernel, the following vulnerability has been resolved:
nbd: null check for nla_nest_st
In the Linux kernel, the following vulnerability has been resolved:
nbd: null check for nla_nest_start
nla_nest_start() may fail and return NULL. Insert a check and set errno
based on other call sites within the same source code.
nvd
CVE-2024-27076MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-27076 [MEDIUM] CWE-401 CVE-2024-27076: In the Linux kernel, the following vulnerability has been resolved:
media: imx: csc/scaler: fix v4l
In the Linux kernel, the following vulnerability has been resolved:
media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak
Free the memory allocated in v4l2_ctrl_handler_init on release.
nvd
CVE-2023-52650MEDIUMCVSS 5.5v10.02024-05-01
CVE-2023-52650 [MEDIUM] CWE-476 CVE-2023-52650: In the Linux kernel, the following vulnerability has been resolved:
drm/tegra: dsi: Add missing che
In the Linux kernel, the following vulnerability has been resolved:
drm/tegra: dsi: Add missing check for of_find_device_by_node
Add check for the return value of of_find_device_by_node() and return
the error if it fails in order to avoid NULL pointer dereference.
nvd
CVE-2024-26969MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26969 [MEDIUM] CWE-129 CVE-2024-26969: In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix ter
In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed
nvd
CVE-2024-26973MEDIUMCVSS 5.5v10.02024-05-01
CVE-2024-26973 [MEDIUM] CWE-908 CVE-2024-26973: In the Linux kernel, the following vulnerability has been resolved:
fat: fix uninitialized field in
In the Linux kernel, the following vulnerability has been resolved:
fat: fix uninitialized field in nostale filehandles
When fat_encode_fh_nostale() encodes file handle without a parent it
stores only first 10 bytes of the file handle. However the length of the
file handle must be a multiple of 4 so the file handle is actually 12
bytes long and th
nvd
CVE-2024-3096MEDIUMCVSS 6.5v10.02024-04-29
CVE-2024-3096 [MEDIUM] CWE-20 CVE-2024-3096: In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored w
In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
nvd
CVE-2024-26928HIGHCVSS 7.8v11.02024-04-28
CVE-2024-26928 [HIGH] CWE-416 CVE-2024-26928: In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
nvd
CVE-2022-48655HIGHCVSS 7.8v10.02024-04-28
CVE-2022-48655 [HIGH] CWE-119 CVE-2022-48655: In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scmi: Harden acce
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scmi: Harden accesses to the reset domains
Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.
Add an internal consist
nvd
CVE-2024-26923MEDIUMCVSS 4.7v10.02024-04-25
CVE-2024-26923 [MEDIUM] CWE-362 CVE-2024-26923: In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix garbage collector
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix garbage collector racing against connect()
Garbage collector does not take into account the risk of embryo getting
enqueued during the garbage collection. If such embryo has a peer that
carries SCM_RIGHTS, two consecutive passes of scan_children() may see a
different s
nvd
CVE-2024-26926MEDIUMCVSS 5.5v10.02024-04-25
CVE-2024-26926 [MEDIUM] CVE-2024-26926: In the Linux kernel, the following vulnerability has been resolved:
binder: check offset alignment
In the Linux kernel, the following vulnerability has been resolved:
binder: check offset alignment in binder_get_object()
Commit 6d98eb95b450 ("binder: avoid potential data leakage when copying
txn") introduced changes to how binder objects are copied. In doing so,
it unintentionally removed an offset alignment check done through calls
to binder_alloc_copy
nvd
CVE-2024-26925MEDIUMCVSS 5.5v10.02024-04-25
CVE-2024-26925 [MEDIUM] CWE-667 CVE-2024-26925: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: release m
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
w
nvd