Debian

Debian Linux

9921 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 28.07.2025 11:21:47
  • Zuletzt bearbeitet 07.01.2026 16:25:40

In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */ i...

  • EPSS 0.01%
  • Veröffentlicht 28.07.2025 11:21:47
  • Zuletzt bearbeitet 07.01.2026 16:25:46

In the Linux kernel, the following vulnerability has been resolved: comedi: das16m1: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid...

  • EPSS 0.01%
  • Veröffentlicht 28.07.2025 11:21:46
  • Zuletzt bearbeitet 07.01.2026 16:24:45

In the Linux kernel, the following vulnerability has been resolved: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to hold the array of `struct comedi_insn`, getting ...

  • EPSS 0.01%
  • Veröffentlicht 28.07.2025 11:21:45
  • Zuletzt bearbeitet 07.01.2026 16:24:39

In the Linux kernel, the following vulnerability has been resolved: comedi: Fix use of uninitialized data in insn_rw_emulate_bits() For Comedi `INSN_READ` and `INSN_WRITE` instructions on "digital" subdevices (subdevice types `COMEDI_SUBD_DI`, `COM...

  • EPSS 0.02%
  • Veröffentlicht 28.07.2025 11:21:44
  • Zuletzt bearbeitet 23.12.2025 18:27:16

In the Linux kernel, the following vulnerability has been resolved: comedi: Fix initialization of data for instructions that write to subdevice Some Comedi subdevice instruction handlers are known to access instruction data elements beyond the firs...

  • EPSS 0.01%
  • Veröffentlicht 28.07.2025 11:21:38
  • Zuletzt bearbeitet 23.12.2025 18:28:11

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access i...

  • EPSS 0.02%
  • Veröffentlicht 28.07.2025 11:21:37
  • Zuletzt bearbeitet 22.12.2025 19:28:33

In the Linux kernel, the following vulnerability has been resolved: rpl: Fix use-after-free in rpl_do_srh_inline(). Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers the splat below [0]. rpl_do_srh_inline() fetches ipv6_hdr(skb) an...

  • EPSS 0.02%
  • Veröffentlicht 28.07.2025 11:21:35
  • Zuletzt bearbeitet 22.12.2025 19:29:20

In the Linux kernel, the following vulnerability has been resolved: usb: net: sierra: check for no status endpoint The driver checks for having three endpoints and having bulk in and out endpoints, but not that the third endpoint is interrupt input...

  • EPSS 0.02%
  • Veröffentlicht 28.07.2025 11:21:34
  • Zuletzt bearbeitet 22.12.2025 19:29:46

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() syzbot reported null-ptr-deref in l2cap_sock_resume_cb(). [0] l2cap_sock_resume_cb() has a similar problem that was fixed b...

  • EPSS 0.02%
  • Veröffentlicht 28.07.2025 11:21:33
  • Zuletzt bearbeitet 22.12.2025 19:34:52

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry A crash in conntrack was reported while trying to unlink the conntrack entry from the hash bucket list: ...