Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 48 of 496
CVE-2024-26924MEDIUMCVSS 5.9v10.02024-04-25
CVE-2024-26924 [MEDIUM] CWE-476 CVE-2024-26924: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do n In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with large batches of elements with a back-to-back add/remove pattern. Quoting Pablo: add_elem("00000000") timeout 100 ms ... add_elem("0000000X") timeout 100 ms del_elem("0000000X") <---------------- delet
nvd
CVE-2024-28130HIGHCVSS 7.5v10.02024-04-23
CVE-2024-28130 [HIGH] CWE-704 CVE-2024-28130: An incorrect type conversion vulnerability exists in the DVPSSoftcopyVOI_PList::createFromImage func An incorrect type conversion vulnerability exists in the DVPSSoftcopyVOI_PList::createFromImage functionality of OFFIS DCMTK 3.6.8. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
nvd
CVE-2024-26922MEDIUMCVSS 5.5v10.02024-04-23
CVE-2024-26922 [MEDIUM] CVE-2024-26922: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parame In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verify the parameters of amdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.
nvd
CVE-2024-2961HIGHCVSS 7.3PoCv10.02024-04-17
CVE-2024-2961 [HIGH] CWE-787 CVE-2024-2961: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer pas The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
nvd
CVE-2023-52642HIGHCVSS 7.8v10.02024-04-17
CVE-2023-52642 [HIGH] CWE-862 CVE-2023-52642: In the Linux kernel, the following vulnerability has been resolved: media: rc: bpf attach/detach re In the Linux kernel, the following vulnerability has been resolved: media: rc: bpf attach/detach requires write permission Note that bpf attach/detach also requires CAP_NET_ADMIN.
nvd
CVE-2024-26852HIGHCVSS 7.8v10.02024-04-17
CVE-2024-26852 [HIGH] CWE-416 CVE-2024-26852: In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_releas
nvd
CVE-2024-26872HIGHCVSS 7.0v10.02024-04-17
CVE-2024-26872 [HIGH] CWE-416 CVE-2024-26872: In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register even In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error
nvd
CVE-2024-26895HIGHCVSS 7.8v10.02024-04-17
CVE-2024-26895 [HIGH] CWE-416 CVE-2024-26895: In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: prevent use-aft In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces wilc_netdev_cleanup currently triggers a KASAN warning, which can be observed on interface registration error path, or simply by removing the module/unbinding device from driver: echo spi0.1 > /sys/bus/sp
nvd
CVE-2024-26883HIGHCVSS 7.8v10.02024-04-17
CVE-2024-26883 [HIGH] CWE-119 CVE-2024-26883: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow chec In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check on 32-bit arches The stackmap code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing
nvd
CVE-2024-26825MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26825 [MEDIUM] CWE-459 CVE-2024-26825: In the Linux kernel, the following vulnerability has been resolved: nfc: nci: free rx_data_reassemb In the Linux kernel, the following vulnerability has been resolved: nfc: nci: free rx_data_reassembly skb on NCI device cleanup rx_data_reassembly skb is stored during NCI data exchange for processing fragmented packets. It is dropped only when the last fragment is processed or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received. H
nvd
CVE-2023-52644MEDIUMCVSS 6.3v10.02024-04-17
CVE-2023-52644 [MEDIUM] CVE-2023-52644: In the Linux kernel, the following vulnerability has been resolved: wifi: b43: Stop/wake correct qu In the Linux kernel, the following vulnerability has been resolved: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled When QoS is disabled, the queue priority value will not map to the correct ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS is disabled to prevent trying to stop/wake a non-existent queue and f
nvd
CVE-2024-26861MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26861 [MEDIUM] CWE-362 CVE-2024-26861: In the Linux kernel, the following vulnerability has been resolved: wireguard: receive: annotate da In the Linux kernel, the following vulnerability has been resolved: wireguard: receive: annotate data-race around receiving_counter.counter Syzkaller with KCSAN identified a data-race issue when accessing keypair->receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE() annotations to mark the data race as intentional. BUG: KCSAN: data-race in
nvd
CVE-2024-26845MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26845 [MEDIUM] CVE-2024-26845: In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to tmr_list handling An abort that is responded to by iSCSI itself is added to tmr_list but does not go to target core. A LUN_RESET that goes through tmr_list takes a refcounter on the abort and waits for completion. However, the abort will be never complete bec
nvd
CVE-2024-26843MEDIUMCVSS 6.0v10.02024-04-17
CVE-2024-26843 [MEDIUM] CWE-787 CVE-2024-26843: In the Linux kernel, the following vulnerability has been resolved: efi: runtime: Fix potential ove In the Linux kernel, the following vulnerability has been resolved: efi: runtime: Fix potential overflow of soft-reserved region size md_size will have been narrowed if we have >= 4GB worth of pages in a soft-reserved region.
nvd
CVE-2024-26855MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26855 [MEDIUM] CWE-476 CVE-2024-26855: In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL po In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() The function ice_bridge_setlink() may encounter a NULL pointer dereference if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently in nla_for_each_nested(). To address this issue, add a che
nvd
CVE-2024-26839MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26839 [MEDIUM] CWE-401 CVE-2024-26839: In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix a memleak in init_ In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix a memleak in init_credit_return When dma_alloc_coherent fails to allocate dd->cr_base[i].va, init_credit_return should deallocate dd->cr_base and dd->cr_base[i] that allocated before. Or those resources would be never freed and a memleak is triggered.
nvd
CVE-2024-26833MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26833 [MEDIUM] CWE-401 CVE-2024-26833: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix memory lea In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix memory leak in dm_sw_fini() After destroying dmub_srv, the memory associated with it is not freed, causing a memory leak: unreferenced object 0xffff896302b45800 (size 1024): comm "(udev-worker)", pid 222, jiffies 4294894636 hex dump (first 32 bytes): 00 00 00
nvd
CVE-2024-26874MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26874 [MEDIUM] CWE-476 CVE-2024-26874: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Fix a null pointe In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip It's possible that mtk_crtc->event is NULL in mtk_drm_crtc_finish_page_flip(). pending_needs_vblank value is set by mtk_crtc->event, but in mtk_drm_crtc_atomic_flush(), it's is not guarded by the same lock in
nvd
CVE-2024-26835MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26835 [MEDIUM] CVE-2024-26835: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: set dorma In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: set dormant flag on hook register failure We need to set the dormant flag again if we fail to register the hooks. During memory pressure hook registration can fail and we end up with a table marked as active but no registered hooks. On table/base chain deletion, nf
nvd
CVE-2024-26894MEDIUMCVSS 6.0v10.02024-04-17
CVE-2024-26894 [MEDIUM] CWE-770 CVE-2024-26894: In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memor In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex
nvd