Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 49 of 496
CVE-2024-26857MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26857 [MEDIUM] CWE-908 CVE-2024-26857: In the Linux kernel, the following vulnerability has been resolved: geneve: make sure to pull inner In the Linux kernel, the following vulnerability has been resolved: geneve: make sure to pull inner header in geneve_rx() syzbot triggered a bug in geneve_rx() [1] Issue is similar to the one I fixed in commit 8d975c15c0cd ("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()") We have to save skb->network_header in a temporary variabl
nvd
CVE-2024-26878MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26878 [MEDIUM] CWE-362 CVE-2024-26878: In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL point In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference Below race may cause NULL pointer dereference P1 P2 dquot_free_inode quota_off drop_dquot_ref remove_dquot_ref dquots = i_dquot(inode) dquots = i_dquot(inode) srcu_read_lock dquots[cnt]) != NULL (1) dquots[type] = NULL (2) spin_lock(&
nvd
CVE-2024-26862MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26862 [MEDIUM] CWE-362 CVE-2024-26862: In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races aro In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races around ignore_outgoing ignore_outgoing is read locklessly from dev_queue_xmit_nit() and packet_getsockopt() Add appropriate READ_ONCE()/WRITE_ONCE() annotations. syzbot reported: BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt write
nvd
CVE-2024-26859MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26859 [MEDIUM] CWE-362 CVE-2024-26859: In the Linux kernel, the following vulnerability has been resolved: net/bnx2x: Prevent access to a In the Linux kernel, the following vulnerability has been resolved: net/bnx2x: Prevent access to a freed page in page_pool Fix race condition leading to system crash during EEH error handling During EEH error recovery, the bnx2x driver's transmit timeout logic could cause a race condition when handling reset tasks. The bnx2x_tx_timeout() schedules
nvd
CVE-2024-26889MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26889 [MEDIUM] CWE-120 CVE-2024-26889: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix possib In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix possible buffer overflow struct hci_dev_info has a fixed size name[8] field so in the event that hdev->name is bigger than that strcpy would attempt to write past its size, so this fixes this problem by switching to use strscpy.
nvd
CVE-2024-26820MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26820 [MEDIUM] CVE-2024-26820: In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Register VF in netvs In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER handler cannot perform VF register successfully as the register call is received before netvsc_probe is finished. This is because we register register
nvd
CVE-2024-26897MEDIUMCVSS 4.7v10.02024-04-17
CVE-2024-26897 [MEDIUM] CWE-362 CVE-2024-26897: In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: delay all of ath9k In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete The ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data structures have been fully initialised by the time it runs. However, because of the order in which things are initialised, this is n
nvd
CVE-2024-26846MEDIUMCVSS 4.4v10.02024-04-17
CVE-2024-26846 [MEDIUM] CWE-415 CVE-2024-26846: In the Linux kernel, the following vulnerability has been resolved: nvme-fc: do not wait in vain wh In the Linux kernel, the following vulnerability has been resolved: nvme-fc: do not wait in vain when unloading module The module exit path has race between deleting all controllers and freeing 'left over IDs'. To prevent double free a synchronization between nvme_delete_ctrl and ida_destroy has been added by the initial commit. There is some log
nvd
CVE-2024-26906MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26906 [MEDIUM] CVE-2024-26906: In the Linux kernel, the following vulnerability has been resolved: x86/mm: Disallow vsyscall page In the Linux kernel, the following vulnerability has been resolved: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() When trying to use copy_from_kernel_nofault() to read vsyscall page through a bpf program, the following oops was reported: BUG: unable to handle page fault for address: ffffffffff600000 #PF: supervisor read access in kern
nvd
CVE-2024-26870MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26870 [MEDIUM] CVE-2024-26870: In the Linux kernel, the following vulnerability has been resolved: NFSv4.2: fix nfs4_listxattr ker In the Linux kernel, the following vulnerability has been resolved: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 A call to listxattr() with a buffer size = 0 returns the actual size of the buffer needed for a subsequent call. When size > 0, nfs4_listxattr() does not return an error because either generic_listxattr() or nfs4_listxattr_nfs4_l
nvd
CVE-2024-26877MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26877 [MEDIUM] CVE-2024-26877: In the Linux kernel, the following vulnerability has been resolved: crypto: xilinx - call finalize In the Linux kernel, the following vulnerability has been resolved: crypto: xilinx - call finalize with bh disabled When calling crypto_finalize_request, BH should be disabled to avoid triggering the following calltrace: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118 Modules lin
nvd
CVE-2024-26917MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26917 [MEDIUM] CVE-2024-26917: In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: fcoe: Fix p In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock" This reverts commit 1a1975551943f681772720f639ff42fbaa746212. This commit causes interrupts to be lost for FCoE devices, since it changed sping locks from "bh" to "irqsave". Instead, a work queue should be used, and wi
nvd
CVE-2024-26863MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26863 [MEDIUM] CWE-908 CVE-2024-26863: In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node() KMSAN reported the following uninit-value access issue [1]: BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577
nvd
CVE-2024-26880MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26880 [MEDIUM] CWE-476 CVE-2024-26880: In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on i In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend There is this reported crash when experimenting with the lvm2 testsuite. The list corruption is caused by the fact that the postsuspend and resume methods were not paired correctly; there were two consecutive calls to the origin_posts
nvd
CVE-2024-26851MEDIUMCVSS 5.5v10.02024-04-17
CVE-2024-26851 [MEDIUM] CWE-787 CVE-2024-26851: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: A In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: Add protection for bmp length out of range UBSAN load reports an exception of BRK#5515 SHIFT_ISSUE:Bitwise shifts that are out of bounds for their data type. vmlinux get_bitmap(b=75) + 712 vmlinux decode_seq(bs=0xFFFFFFD008037000, f=0xFFFFFFD0080370
nvd
CVE-2024-3864HIGHCVSS 8.1v10.02024-04-16
CVE-2024-3864 [HIGH] CWE-119 CVE-2024-3864: Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
nvd
CVE-2022-24805HIGHCVSS 8.8v10.0v11.02024-04-16
CVE-2022-24805 [HIGH] CWE-120 CVE-2022-24805: net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials
nvd
CVE-2022-24810HIGHCVSS 8.8v10.02024-04-16
CVE-2022-24810 [HIGH] CWE-476 CVE-2022-24810: net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those
nvd
CVE-2024-3857HIGHCVSS 7.8v10.02024-04-16
CVE-2024-3857 [HIGH] CWE-416 CVE-2024-3857: The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
nvd
CVE-2022-24809MEDIUMCVSS 6.5v10.0v11.02024-04-16
CVE-2022-24809 [MEDIUM] CWE-476 CVE-2022-24809: net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credenti
nvd