Debian

Debian Linux

9302 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 30.05.2024 16:15:17
  • Zuletzt bearbeitet 20.05.2025 15:16:04

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: don't free NULL coalescing rule If the parsing fails, we can dereference a NULL pointer here.

  • EPSS 0.06%
  • Veröffentlicht 30.05.2024 16:15:14
  • Zuletzt bearbeitet 14.11.2025 17:15:31

In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails In CoCo VMs it is possible for the untrusted host to cause set_memory_encrypted() or set_memory_decrypted() to fail s...

  • EPSS 3.61%
  • Veröffentlicht 22.05.2024 20:15:09
  • Zuletzt bearbeitet 17.12.2024 16:05:41

GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit th...

  • EPSS 0.02%
  • Veröffentlicht 22.05.2024 09:15:10
  • Zuletzt bearbeitet 18.11.2025 15:08:24

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix even more out of bound writes from debugfs CVE-2021-42327 was fixed by: commit f23750b5b3d98653b31d4469592935ef6364ad67 Author: Thelford Williams <tdwilliamsiv@gma...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:19
  • Zuletzt bearbeitet 25.11.2025 17:26:19

In the Linux kernel, the following vulnerability has been resolved: drm/amd: check num of link levels when update pcie param In SR-IOV environment, the value of pcie_table->num_of_link_levels will be 0, and num_of_levels - 1 will cause array index ...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 25.11.2025 17:26:00

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential deadlock when releasing mids All release_mid() callers seem to hold a reference of @mid so there is no need to call kref_put(&mid->refcount, __release_mi...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:14
  • Zuletzt bearbeitet 25.11.2025 17:25:29

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show(...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 14.11.2025 17:16:18

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path an...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:12
  • Zuletzt bearbeitet 04.04.2025 14:33:42

In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation in geneve[6]_xmit_skb syzbot is able to trigger an uninit-value in geneve_xmit() [1] Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfie...

  • EPSS 1.75%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 04.04.2025 14:22:45

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would only add newly created rules from the handle into the tree when they had a refcount of 1. On the ot...