Debian

Debian Linux

9921 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 23.09.2025 06:15:48
  • Zuletzt bearbeitet 16.01.2026 19:26:44

In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory When I did memory failure tests, below panic occurs: page dumped because: VM_BUG_ON_PAGE(PagePoisone...

  • EPSS 0.02%
  • Veröffentlicht 23.09.2025 06:15:47
  • Zuletzt bearbeitet 16.01.2026 19:26:01

In the Linux kernel, the following vulnerability has been resolved: kernfs: Fix UAF in polling when open file is released A use-after-free (UAF) vulnerability was identified in the PSI (Pressure Stall Information) monitoring mechanism: BUG: KASAN:...

  • EPSS 0.02%
  • Veröffentlicht 23.09.2025 06:15:47
  • Zuletzt bearbeitet 20.01.2026 20:27:54

In the Linux kernel, the following vulnerability has been resolved: libceph: fix invalid accesses to ceph_connection_v1_info There is a place where generic code in messenger.c is reading and another place where it is writing to con->v1 union member...

  • EPSS 0.02%
  • Veröffentlicht 23.09.2025 06:15:47
  • Zuletzt bearbeitet 20.01.2026 20:29:36

In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: fix use-after-free in state_show() state_show() reads kdamond->damon_ctx without holding damon_sysfs_lock. This allows a use-after-free race: CPU 0 ...

  • EPSS 0.04%
  • Veröffentlicht 23.09.2025 06:15:47
  • Zuletzt bearbeitet 20.01.2026 20:33:01

In the Linux kernel, the following vulnerability has been resolved: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() The function of_phy_find_device may return NULL, so we need to take care before dereferencing phy_dev.

  • EPSS 0.02%
  • Veröffentlicht 23.09.2025 06:15:46
  • Zuletzt bearbeitet 20.01.2026 20:33:41

In the Linux kernel, the following vulnerability has been resolved: can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB can_put_echo_skb() takes ownership of the SKB and it may be freed during or after the call. However, xil...

  • EPSS 0.02%
  • Veröffentlicht 23.09.2025 06:15:46
  • Zuletzt bearbeitet 20.01.2026 20:40:34

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix double free in idxd_setup_wqs() The clean up in idxd_setup_wqs() has had a couple bugs because the error handling is a bit subtle. It's simpler to just re-wri...

  • EPSS 0.03%
  • Veröffentlicht 23.09.2025 06:15:46
  • Zuletzt bearbeitet 20.01.2026 20:41:15

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insu...

  • EPSS 0.03%
  • Veröffentlicht 19.09.2025 15:26:35
  • Zuletzt bearbeitet 23.01.2026 02:33:32

In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. C...

  • EPSS 0.02%
  • Veröffentlicht 19.09.2025 15:26:34
  • Zuletzt bearbeitet 20.01.2026 20:41:32

In the Linux kernel, the following vulnerability has been resolved: tee: fix NULL pointer dereference in tee_shm_put tee_shm_put have NULL pointer dereference: __optee_disable_shm_cache --> shm = reg_pair_to_ptr(...);//shm maybe return NULL ...