Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 55 of 496
CVE-2023-52609MEDIUMCVSS 4.7v10.02024-03-18
CVE-2023-52609 [MEDIUM] CWE-362 CVE-2023-52609: In the Linux kernel, the following vulnerability has been resolved: binder: fix race between mmput( In the Linux kernel, the following vulnerability has been resolved: binder: fix race between mmput() and do_exit() Task A calls binder_update_page_range() to allocate and insert pages on a remote address space from Task B. For this, Task A pins the remote mm via mmget_not_zero() first. This can race with Task B do_exit() and the final mmput() refc
nvd
CVE-2023-52618MEDIUMCVSS 5.3v10.02024-03-18
CVE-2023-52618 [MEDIUM] CVE-2023-52618: In the Linux kernel, the following vulnerability has been resolved: block/rnbd-srv: Check for unlik In the Linux kernel, the following vulnerability has been resolved: block/rnbd-srv: Check for unlikely string overflow Since "dev_search_path" can technically be as large as PATH_MAX, there was a risk of truncation when copying it and a second string into "full_path" since it was also PATH_MAX sized. The W=1 builds were reporting this warning: drivers/bl
nvd
CVE-2024-26640MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-26640 [MEDIUM] CVE-2024-26640: In the Linux kernel, the following vulnerability has been resolved: tcp: add sanity checks to rx ze In the Linux kernel, the following vulnerability has been resolved: tcp: add sanity checks to rx zerocopy TCP rx zerocopy intent is to map pages initially allocated from NIC drivers, not pages owned by a fs. This patch adds to can_map_frag() these additional checks: - Page must not be a compound one. - page->mapping must be NULL. This fixes the panic r
nvd
CVE-2024-2496MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-2496 [MEDIUM] CWE-476 CVE-2024-2496: A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. This flaw could be used to perform a denial of service attack by causing the libvirt daemon to crash.
nvd
CVE-2024-26633MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-26633 [MEDIUM] CVE-2024-26633: In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMEN In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we pulled enough bytes to skb->head. Currently we might access garbage. [1] BUG: KMSAN: uninit-value in ip6_tnl_
nvd
CVE-2024-26636MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-26636 [MEDIUM] CVE-2024-26636: In the Linux kernel, the following vulnerability has been resolved: llc: make llc_ui_sendmsg() more In the Linux kernel, the following vulnerability has been resolved: llc: make llc_ui_sendmsg() more robust against bonding changes syzbot was able to trick llc_ui_sendmsg(), allocating an skb with no headroom, but subsequently trying to push 14 bytes of Ethernet header [1] Like some others, llc_ui_sendmsg() releases the socket lock before calling sock_al
nvd
CVE-2024-26635MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-26635 [MEDIUM] CWE-909 CVE-2024-26635: In the Linux kernel, the following vulnerability has been resolved: llc: Drop support for ETH_P_TR_ In the Linux kernel, the following vulnerability has been resolved: llc: Drop support for ETH_P_TR_802_2. syzbot reported an uninit-value bug below. [0] llc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2 (0x0011), and syzbot abused the latter to trigger the bug. write$tun(r0, &(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[]
nvd
CVE-2023-52616MEDIUMCVSS 5.5v10.02024-03-18
CVE-2023-52616 [MEDIUM] CVE-2023-52616: In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpecte In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init When the mpi_ec_ctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was released. Initially, this issue was ignored because memory for mpi_ec_ctx is allocate
nvd
CVE-2023-52619MEDIUMCVSS 5.5v10.02024-03-18
CVE-2023-52619 [MEDIUM] CVE-2023-52619: In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when sett In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when setting number of cpus to an odd number When the number of cpu cores is adjusted to 7 or other odd numbers, the zone size will become an odd number. The address of the zone will become: addr of zone0 = BASE addr of zone1 = BASE + zone_size addr of zone2 = BASE +
nvd
CVE-2024-26641MEDIUMCVSS 5.5v10.02024-03-18
CVE-2024-26641 [MEDIUM] CWE-908 CVE-2024-26641: In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: make sure to pull i In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() syzbot found __ip6_tnl_rcv() could access unitiliazed data [1]. Call pskb_inet_may_pull() to fix this, and initialize ipv6h variable after this call as it can change skb->head. [1] BUG: KMSAN: uninit-value in __INET_E
nvd
CVE-2023-52617MEDIUMCVSS 4.4v10.02024-03-18
CVE-2023-52617 [MEDIUM] CWE-459 CVE-2023-52617: In the Linux kernel, the following vulnerability has been resolved: PCI: switchtec: Fix stdev_relea In the Linux kernel, the following vulnerability has been resolved: PCI: switchtec: Fix stdev_release() crash after surprise hot remove A PCI device hot removal may occur while stdev->cdev is held open. The call to stdev_release() then happens during close or exit, at a point way past switchtec_pci_remove(). Otherwise the last ref would vanish wit
nvd
CVE-2024-24549HIGHCVSS 7.5v10.02024-03-13
CVE-2024-24549 [HIGH] CWE-20 CVE-2024-24549: Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomca Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through
nvd
CVE-2024-23672MEDIUMCVSS 6.3v10.02024-03-13
CVE-2024-23672 [MEDIUM] CWE-459 CVE-2024-23672: Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSock Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Olde
nvd
CVE-2024-26614MEDIUMCVSS 5.5v10.02024-03-11
CVE-2024-26614 [MEDIUM] CWE-667 CVE-2024-26614: In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_ In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspin
nvd
CVE-2023-52489MEDIUMCVSS 4.7v10.02024-03-11
CVE-2023-52489 [MEDIUM] CWE-362 CVE-2023-52489: In the Linux kernel, the following vulnerability has been resolved: mm/sparsemem: fix race in acces In the Linux kernel, the following vulnerability has been resolved: mm/sparsemem: fix race in accessing memory_section->usage The below race is observed on a PFN which falls into the device memory region with the system memory configuration where PFN's are such that [ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL]. Since normal zone start and end pfn contain
nvd
CVE-2023-52492MEDIUMCVSS 4.4v10.02024-03-11
CVE-2023-52492 [MEDIUM] CWE-476 CVE-2023-52492: In the Linux kernel, the following vulnerability has been resolved: dmaengine: fix NULL pointer in In the Linux kernel, the following vulnerability has been resolved: dmaengine: fix NULL pointer in channel unregistration function __dma_async_device_channel_register() can fail. In case of failure, chan->local is freed (with free_percpu()), and chan->local is nullified. When dma_async_device_unregister() is called (because of managed API or intent
nvd
CVE-2023-52602HIGHCVSS 7.8v10.02024-03-06
CVE-2023-52602 [HIGH] CWE-400 CVE-2023-52602: In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Rea In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Read in dtSearch Currently while searching for current page in the sorted entry table of the page there is a out of bound access. Added a bound check to fix the error. Dave: Set return code to -EIO
nvd
CVE-2024-26625HIGHCVSS 7.8v10.02024-03-06
CVE-2024-26625 [HIGH] CWE-416 CVE-2024-26625: In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at rele In the Linux kernel, the following vulnerability has been resolved: llc: call sock_orphan() at release time syzbot reported an interesting trace [1] caused by a stale sk->sk_wq pointer in a closed llc socket. In commit ff7b11aa481f ("net: socket: set sock->sk to NULL after calling proto_ops::release()") Eric Biggers hinted that some protocols are m
nvd
CVE-2023-52601HIGHCVSS 7.8v10.02024-03-06
CVE-2023-52601 [HIGH] CWE-129 CVE-2023-52601: In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bou In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in dbAdjTree Currently there is a bound check missing in the dbAdjTree while accessing the dmt_stree. To add the required check added the bool is_ctl which is required to determine the size as suggest in the following commit. https://lore.kernel.or
nvd
CVE-2023-52597MEDIUMCVSS 4.0v10.02024-03-06
CVE-2023-52597 [MEDIUM] CVE-2023-52597: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: fix setting of fpc r In the Linux kernel, the following vulnerability has been resolved: KVM: s390: fix setting of fpc register kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control (fpc) register of a guest cpu. The new value is tested for validity by temporarily loading it into the fpc register. This may lead to corruption of the fpc register of the host p
nvd