Debian Linux vulnerabilities

9,911 known vulnerabilities affecting debian/debian_linux.

Total CVEs
9,911
CISA KEV
119
actively exploited
Public exploits
429
Exploited in wild
132
Severity breakdown
CRITICAL1128HIGH4110MEDIUM4311LOW362

Vulnerabilities

Page 56 of 496
CVE-2023-52585MEDIUMCVSS 5.5v10.02024-03-06
CVE-2023-52585 [MEDIUM] CWE-476 CVE-2023-52585: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL d In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Return invalid error code -EINVAL for invalid block id. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' co
nvd
CVE-2023-52583MEDIUMCVSS 5.5v10.02024-03-06
CVE-2023-52583 [MEDIUM] CWE-667 CVE-2023-52583: In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remov
nvd
CVE-2024-1936HIGHCVSS 7.5v10.02024-03-04
CVE-2024-1936 [HIGH] CWE-922 CVE-2024-1936: The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitr The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message cont
nvd
CVE-2023-52572HIGHCVSS 7.8v11.02024-03-02
CVE-2023-52572 [HIGH] CWE-416 CVE-2023-52572: In the Linux kernel, the following vulnerability has been resolved: cifs: Fix UAF in cifs_demultipl In the Linux kernel, the following vulnerability has been resolved: cifs: Fix UAF in cifs_demultiplex_thread() There is a UAF when xfstests on cifs: BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160 Read of size 4 at addr ffff88810103fc08 by task cifsd/923 CPU: 1 PID: 923 Comm: cifsd Not tainted 6.1.0-rc4+ #45 ... Call Trace:
nvd
CVE-2022-48627MEDIUMCVSS 5.5v10.02024-03-02
CVE-2022-48627 [MEDIUM] CWE-787 CVE-2022-48627: In the Linux kernel, the following vulnerability has been resolved: vt: fix memory overlapping when In the Linux kernel, the following vulnerability has been resolved: vt: fix memory overlapping when deleting chars in the buffer A memory overlapping copy occurs when deleting a long line. This memory overlapping copy can cause data corruption when scr_memcpyw is optimized to memcpy because memcpy does not ensure its behavior if the destination bu
nvd
CVE-2024-27355HIGHCVSS 7.5v10.02024-03-01
CVE-2024-27355 [HIGH] CWE-400 CVE-2024-27355: An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. Wh An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID).
nvd
CVE-2024-27354HIGHCVSS 7.5v10.02024-03-01
CVE-2024-27354 [HIGH] CVE-2024-27354: An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. An An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. An attacker can construct a malformed certificate containing an extremely large prime to cause a denial of service (CPU consumption for an isPrime primality check). NOTE: this issue was introduced when attempting to fix CVE-2023-27560.
nvd
CVE-2023-52482HIGHCVSS 7.8v10.02024-02-29
CVE-2023-52482 [HIGH] CWE-787 CVE-2023-52482: In the Linux kernel, the following vulnerability has been resolved: x86/srso: Add SRSO mitigation f In the Linux kernel, the following vulnerability has been resolved: x86/srso: Add SRSO mitigation for Hygon processors Add mitigation for the speculative return stack overflow vulnerability which exists on Hygon processors too.
nvd
CVE-2024-26146HIGHCVSS 7.5v10.02024-02-29
CVE-2024-26146 [HIGH] CWE-1333 CVE-2024-26146: Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in R Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is f
nvd
CVE-2024-26141HIGHCVSS 7.5v10.02024-02-29
CVE-2024-26141 [HIGH] CWE-400 CVE-2024-26141: Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to r Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applicat
nvd
CVE-2024-25126HIGHCVSS 7.5v10.02024-02-29
CVE-2024-25126 [HIGH] CWE-1333 CVE-2024-25126: Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
nvd
CVE-2024-27285MEDIUMCVSS 6.1v10.02024-02-28
CVE-2024-27285 [MEDIUM] CWE-79 CVE-2024-27285: YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentat YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
nvd
CVE-2024-22201HIGHCVSS 7.5v10.02024-02-26
CVE-2024-22201 [HIGH] CWE-400 CVE-2024-22201: Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established an Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vul
nvd
CVE-2024-25082MEDIUMCVSS 6.5v10.02024-02-26
CVE-2024-25082 [MEDIUM] CWE-77 CVE-2024-25082: Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.
nvd
CVE-2024-25081MEDIUMCVSS 4.2v10.02024-02-26
CVE-2024-25081 [MEDIUM] CWE-77 CVE-2024-25081: Splinefont in FontForge through 20230101 allows command injection via crafted filenames. Splinefont in FontForge through 20230101 allows command injection via crafted filenames.
nvd
CVE-2024-26598HIGHCVSS 7.8v10.02024-02-23
CVE-2024-26598 [HIGH] CWE-416 CVE-2024-26598: In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid pot In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that invalidates the cache, such as a DISCARD ITS command. The root of the problem is that vgic_its_check_cache()
nvd
CVE-2023-52160MEDIUMCVSS 6.5v10.02024-02-22
CVE-2023-52160 [MEDIUM] CWE-287 CVE-2023-52160: The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a succes The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
nvd
CVE-2024-1552HIGHCVSS 7.5v10.02024-02-20
CVE-2024-1552 [HIGH] CWE-681 CVE-2024-1552: Incorrect code generation could have led to unexpected numeric conversions and potential undefined b Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
nvd
CVE-2024-1546HIGHCVSS 7.5v10.02024-02-20
CVE-2024-1546 [HIGH] CWE-125 CVE-2024-1546: When storing and re-accessing data on a networking channel, the length of buffers may have been conf When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
nvd
CVE-2023-52434HIGHCVSS 8.0v10.02024-02-20
CVE-2023-52434 [HIGH] CWE-119 CVE-2023-52434: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create contexts from server: BUG: unable to handle page fault for address: ffff8881
nvd