Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 51 of 496
CVE-2024-26788MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26788 [MEDIUM] CWE-908 CVE-2024-26788: In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: init irq a In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: init irq after reg initialization Initialize the qDMA irqs after the registers are configured so that interrupts that may have been pending from a primary kernel don't get processed by the irq handler before it is ready to and cause panic with the following tr
nvd
CVE-2024-24795MEDIUMCVSS 6.3v10.02024-04-04
CVE-2024-24795 [MEDIUM] CWE-113 CVE-2024-24795: HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
nvd
CVE-2024-26787MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26787 [MEDIUM] CVE-2024-26787: In the Linux kernel, the following vulnerability has been resolved: mmc: mmci: stm32: fix DMA API o In the Linux kernel, the following vulnerability has been resolved: mmc: mmci: stm32: fix DMA API overlapping mappings warning Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning: DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST, overlapping mappings aren't supported WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568 add_dma_ent
nvd
CVE-2024-28182MEDIUMCVSS 5.3v10.0v11.02024-04-04
CVE-2024-28182 [MEDIUM] CWE-770 CVE-2024-28182: nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by
nvd
CVE-2024-26790MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26790 [MEDIUM] CWE-667 CVE-2024-26790: In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: fix SoC ma In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read There is chip (ls1028a) errata: The SoC may hang on 16 byte unaligned read transactions by QDMA. Unaligned read transactions initiated by QDMA may stall in the NOC (Network On-Chip), causing a deadlock condition. St
nvd
CVE-2024-26808MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26808 [MEDIUM] CVE-2024-26808: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: ha In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise a stale reference to netdevice remains in the hook list.
nvd
CVE-2024-26804MEDIUMCVSS 5.3v10.02024-04-04
CVE-2024-26804 [MEDIUM] CWE-416 CVE-2024-26804: In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetu In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170 Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191 [..] kasan_report+0xda/0x
nvd
CVE-2024-26781MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26781 [MEDIUM] CWE-667 CVE-2024-26781: In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected 6.8.0-rc4-syzkaller-00212-g40b9385dd8e6 #0 Not tainted syz-executor.2/24141 is trying to acquire lock: ffff8880458701
nvd
CVE-2024-26809MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26809 [MEDIUM] CVE-2024-26809: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: rele In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise it is possible to destroy elements twice. This fix requires: 212ed75dc5fb ("netfilter: nf_tables: integrate
nvd
CVE-2024-26795MEDIUMCVSS 5.5v10.02024-04-04
CVE-2024-26795 [MEDIUM] CVE-2024-26795: In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap ou In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce
nvd
CVE-2024-26753HIGHCVSS 7.8v10.02024-04-03
CVE-2024-26753 [HIGH] CWE-787 CVE-2024-26753: In the Linux kernel, the following vulnerability has been resolved: crypto: virtio/akcipher - Fix s In the Linux kernel, the following vulnerability has been resolved: crypto: virtio/akcipher - Fix stack overflow on memcpy sizeof(struct virtio_crypto_akcipher_session_para) is less than sizeof(struct virtio_crypto_op_ctrl_req::u), copying more bytes from stack variable leads stack overflow. Clang reports this issue by commands: make -j CC=clang-14
nvd
CVE-2023-52637HIGHCVSS 7.8v10.02024-04-03
CVE-2023-52637 [HIGH] CWE-416 CVE-2023-52637: In the Linux kernel, the following vulnerability has been resolved: can: j1939: Fix UAF in j1939_sk In the Linux kernel, the following vulnerability has been resolved: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) Lock jsk->sk to prevent UAF when setsockopt(..., SO_J1939_FILTER, ...) modifies jsk->filters while receiving packets. Following trace was seen on affected system: BUG: KASAN: slab-use-after-free in j193
nvd
CVE-2024-26736HIGHCVSS 7.8v10.02024-04-03
CVE-2024-26736 [HIGH] CWE-787 CVE-2024-26736: In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in af In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in afs_update_volume_status() The max length of volume->vid value is 20 characters. So increase idbuf[] size up to 24 to avoid overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE. [DH: Actually, it's 20 + NUL, so increase it to 24 a
nvd
CVE-2024-26704HIGHCVSS 7.8v10.02024-04-03
CVE-2024-26704 [HIGH] CWE-415 CVE-2024-26704: In the Linux kernel, the following vulnerability has been resolved: ext4: fix double-free of blocks In the Linux kernel, the following vulnerability has been resolved: ext4: fix double-free of blocks due to wrong extents moved_len In ext4_move_extents(), moved_len is only updated when all moves are successfully executed, and only discards orig_inode and donor_inode preallocations when moved_len is not zero. When the loop fails to exit after succes
nvd
CVE-2024-26739HIGHCVSS 7.8v11.02024-04-03
CVE-2024-26739 [HIGH] CWE-416 CVE-2024-26739: In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't ov In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is ou
nvd
CVE-2024-26763HIGHCVSS 7.1v10.02024-04-03
CVE-2024-26763 [HIGH] CWE-787 CVE-2024-26763: In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data when using authenticated encryption It was said that authenticated encryption could produce invalid tag when the data that is being encrypted is modified [1]. So, fix this problem by copying the data into the clone bio first and then encrypt them insi
nvd
CVE-2024-26754HIGHCVSS 7.8v10.02024-04-03
CVE-2024-26754 [HIGH] CWE-416 CVE-2024-26754: In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and nul In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() The gtp_net_ops pernet operations structure for the subsystem must be registered before registering the generic netlink family. Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug: general protection f
nvd
CVE-2024-26689HIGHCVSS 7.8v10.02024-04-03
CVE-2024-26689 [HIGH] CWE-416 CVE-2024-26689: In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This implies before the refcount could be increment here, it was freed. In same file, in "handle_ca
nvd
CVE-2024-26733MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26733 [MEDIUM] CWE-787 CVE-2024-26733: In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_re In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and copies neigh->ha to struct arpreq.arp_ha.sa_data. The arp_ha here is struct sockaddr, not struct sock
nvd
CVE-2024-26735MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26735 [MEDIUM] CWE-416 CVE-2024-26735: In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-afte In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.
nvd