Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 53 of 496
CVE-2024-26777MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26777 [MEDIUM] CVE-2024-26777: In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclo In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixclock, it may cause divide-by-zero error. In sisfb_check_var(), var->pixclock is used as a divisor to caculate dr
nvd
CVE-2024-26747MEDIUMCVSS 4.4v10.02024-04-03
CVE-2024-26747 [MEDIUM] CWE-476 CVE-2024-26747: In the Linux kernel, the following vulnerability has been resolved: usb: roles: fix NULL pointer is In the Linux kernel, the following vulnerability has been resolved: usb: roles: fix NULL pointer issue when put module's reference In current design, usb role class driver will get usb_role_switch parent's module reference after the user get usb_role_switch device and put the reference after the user put the usb_role_switch device. However, the pa
nvd
CVE-2024-26685MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26685 [MEDIUM] CWE-787 CVE-2024-26685: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential bug in en In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential bug in end_buffer_async_write According to a syzbot report, end_buffer_async_write(), which handles the completion of block device writes, may detect abnormal condition of the buffer async_write flag and cause a BUG_ON failure when using nilfs2. Nilfs2 itsel
nvd
CVE-2024-26773MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26773 [MEDIUM] CVE-2024-26773: In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks f In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to avoid allocating blocks from a group with a corrupted block bitmap in the following concurrency and making th
nvd
CVE-2024-26766MEDIUMCVSS 5.5v10.02024-04-03
CVE-2024-26766 [MEDIUM] CWE-193 CVE-2024-26766: In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_des In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probabl
nvd
CVE-2024-26764LOWCVSS 3.3v10.02024-04-03
CVE-2024-26764 [LOW] CVE-2024-26764: In the Linux kernel, the following vulnerability has been resolved: fs/aio: Restrict kiocb_set_canc In the Linux kernel, the following vulnerability has been resolved: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the following kernel warning appears: WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8 Call trace: kiocb_set_cancel_fn+0x9c/0xa8 ffs_ep
nvd
CVE-2024-26665HIGHCVSS 7.1v10.02024-04-02
CVE-2024-26665 [HIGH] CWE-125 CVE-2024-26665: In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds acce In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6 error is built from a non-linear skb we get the following splat, BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: net
nvd
CVE-2024-26673HIGHCVSS 7.1v10.02024-04-02
CVE-2024-26673 [HIGH] CVE-2024-26673: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize lay In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations - Disallow families other than NFPROTO_{IPV4,IPV6,INET}. - Disallow layer 4 protocol with no ports, since destination port is a mandatory attribute for this object.
nvd
CVE-2024-26664HIGHCVSS 7.1v10.02024-04-02
CVE-2024-26664 [HIGH] CWE-787 CVE-2024-26664: In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Fix out-of-bo In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Fix out-of-bounds memory access Fix a bug that pdata->cpu_map[] is set before out-of-bounds check. The problem might be triggered on systems with more than 128 cores per package.
nvd
CVE-2024-26659MEDIUMCVSS 5.5v10.02024-04-02
CVE-2024-26659 [MEDIUM] CWE-787 CVE-2024-26659: In the Linux kernel, the following vulnerability has been resolved: xhci: handle isoc Babble and Bu In the Linux kernel, the following vulnerability has been resolved: xhci: handle isoc Babble and Buffer Overrun events properly xHCI 4.9 explicitly forbids assuming that the xHC has released its ownership of a multi-TRB TD when it reports an error on one of the early TRBs. Yet the driver makes such assumption and releases the TD, allowing the rema
nvd
CVE-2023-52635MEDIUMCVSS 5.5v10.02024-04-02
CVE-2023-52635 [MEDIUM] CWE-835 CVE-2023-52635: In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Synchronize devfr In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Synchronize devfreq_monitor_[start/stop] There is a chance if a frequent switch of the governor done in a loop result in timer list corruption where timer cancel being done from two place one from cancel_delayed_work_sync() and followed by expire_timers() can be seen
nvd
CVE-2024-26663MEDIUMCVSS 5.5v10.02024-04-02
CVE-2024-26663 [MEDIUM] CWE-476 CVE-2024-26663: In the Linux kernel, the following vulnerability has been resolved: tipc: Check the bearer type bef In the Linux kernel, the following vulnerability has been resolved: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() syzbot reported the following general protection fault [1]: general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x000000000
nvd
CVE-2024-26675MEDIUMCVSS 5.5v10.02024-04-02
CVE-2024-26675 [MEDIUM] CWE-770 CVE-2024-26675: In the Linux kernel, the following vulnerability has been resolved: ppp_async: limit MRU to 64K sy In the Linux kernel, the following vulnerability has been resolved: ppp_async: limit MRU to 64K syzbot triggered a warning [1] in __alloc_pages(): WARN_ON_ONCE_GFP(order > MAX_PAGE_ORDER, gfp) Willem fixed a similar issue in commit c0a2a1b0d631 ("ppp: limit MRU to 64K") Adopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU) [1]: WARNING:
nvd
CVE-2024-26684MEDIUMCVSS 5.5v10.02024-04-02
CVE-2024-26684 [MEDIUM] CVE-2024-26684: In the Linux kernel, the following vulnerability has been resolved: net: stmmac: xgmac: fix handlin In the Linux kernel, the following vulnerability has been resolved: net: stmmac: xgmac: fix handling of DPP safety error for DMA channels Commit 56e58d6c8a56 ("net: stmmac: Implement Safety Features in XGMAC core") checks and reports safety errors, but leaves the Data Path Parity Errors for each channel in DMA unhandled at all, lead to a storm of interrup
nvd
CVE-2024-26671MEDIUMCVSS 4.7v10.02024-04-02
CVE-2024-26671 [MEDIUM] CWE-362 CVE-2024-26671: In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitma In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered with the following blk_mq_get_driver_tag() in case of getting driver tag failure. Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe the added waiter in
nvd
CVE-2024-26679MEDIUMCVSS 5.5v10.02024-04-02
CVE-2024-26679 [MEDIUM] CWE-667 CVE-2024-26679: In the Linux kernel, the following vulnerability has been resolved: inet: read sk->sk_family once i In the Linux kernel, the following vulnerability has been resolved: inet: read sk->sk_family once in inet_recv_error() inet_recv_error() is called without holding the socket lock. IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM socket option and trigger a KCSAN warning.
nvd
CVE-2024-26654HIGHCVSS 7.0v10.02024-04-01
CVE-2024-26654 [HIGH] CWE-416 CVE-2024-26654: In the Linux kernel, the following vulnerability has been resolved: ALSA: sh: aica: reorder cleanup In the Linux kernel, the following vulnerability has been resolved: ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs The dreamcastcard->timer could schedule the spu_dma_work and the spu_dma_work could also arm the dreamcastcard->timer. When the snd_pcm_substream is closing, the aica_channel will be deallocated. But it could still be der
nvd
CVE-2024-28085LOWCVSS 3.3v10.02024-03-27
CVE-2024-28085 [LOW] CWE-150 CVE-2024-28085: wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequence wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
nvd
CVE-2023-52621HIGHCVSS 7.8v11.02024-03-26
CVE-2023-52621 [HIGH] CWE-617 CVE-2023-52621: In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_ In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These three bpf_map_{lookup,update,delete}_elem() helpers are also available for sleepable bpf program, so add the corresponding lock assertion for sleepable bpf program, otherwise the following warning will be rep
nvd
CVE-2023-52627MEDIUMCVSS 5.5v10.02024-03-26
CVE-2023-52627 [MEDIUM] CWE-476 CVE-2023-52627: In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users to configure device events AD7091R-5 devices are supported by the ad7091r-5 driver together with the ad7091r-base driver. Those drivers declared iio events for notifying user space when ADC readings fall bellow the thresholds of low limit registers or
nvd
Debian Linux vulnerabilities | cvebase