Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:21:07
  • Zuletzt bearbeitet 12.05.2026 13:17:06

In the Linux kernel, the following vulnerability has been resolved: ACPI: pfr_update: Fix the driver update version check The security-version-number check should be used rather than the runtime version check for driver updates. Otherwise, the fir...

  • EPSS 0.01%
  • Veröffentlicht 05.09.2025 17:21:03
  • Zuletzt bearbeitet 12.05.2026 13:17:06

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a race when updating an existing write After nfs_lock_and_join_requests() tests for whether the request is still attached to the mapping, nothing prevents a call to nfs_in...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:21:00
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix SCCB present check Tracing code called by the SCLP interrupt handler contains early exits if the SCCB address associated with an interrupt is NULL. This check is per...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:59
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid a NULL pointer dereference [WHY] Although unlikely drm_atomic_get_new_connector_state() or drm_atomic_get_old_connector_state() can return NULL. [HOW] Check...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:58
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing conne...

  • EPSS 0.01%
  • Veröffentlicht 05.09.2025 17:20:57
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: fs/buffer: fix use-after-free when call bh_read() helper There's issue as follows: BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110 Read of size 8 at addr ffffc90...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:55
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to ...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:54
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: iio: light: as73211: Ensure buffer holes are zeroed Given that the buffer is copied to a kfifo that ultimately user space can read, ensure we zero it.

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:53
  • Zuletzt bearbeitet 12.05.2026 13:17:05

In the Linux kernel, the following vulnerability has been resolved: comedi: Make insn_rw_emulate_bits() do insn->n samples The `insn_rw_emulate_bits()` function is used as a default handler for `INSN_READ` instructions for subdevices that have a ha...

  • EPSS 0.02%
  • Veröffentlicht 05.09.2025 17:20:51
  • Zuletzt bearbeitet 12.05.2026 13:17:04

In the Linux kernel, the following vulnerability has been resolved: comedi: pcl726: Prevent invalid irq number The reproducer passed in an irq number(0x80008000) that was too large, which triggered the oob. Added an interrupt number check to preve...