Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 16:15:29
  • Zuletzt bearbeitet 22.12.2025 21:53:40

In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_reshape function, newpool is allocated on the stack and assigned to conf->r1bio_pool. This results in conf...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:41:32

In the Linux kernel, the following vulnerability has been resolved: net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices Maximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb and 64 Kb respectively. Adjust max size defi...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:35:57

In the Linux kernel, the following vulnerability has been resolved: perf: Fix sample vs do_exit() Baisheng Gao reported an ARM64 crash, which Mark decoded as being a synchronous external abort -- most likely due to trying to access MMIO in bad ways...

  • EPSS 0.02%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:35:09

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allow...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:28:26

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 12.05.2026 13:16:49

In the Linux kernel, the following vulnerability has been resolved: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request If the request being processed is not a v4 compound request, then examining the cstate can have undefined resu...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:26
  • Zuletzt bearbeitet 23.12.2025 18:42:01

In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: do not ping device which has failed to load firmware Syzkaller reports [1, 2] crashes caused by an attempts to ping the device which has failed to load firmware. Si...

  • EPSS 0.04%
  • Veröffentlicht 25.07.2025 14:15:33
  • Zuletzt bearbeitet 23.12.2025 18:45:31

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check return result of sb_min_blocksize Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug. Syzkaller forks multiple processes which after mounti...

  • EPSS 0.04%
  • Veröffentlicht 25.07.2025 14:15:33
  • Zuletzt bearbeitet 23.12.2025 18:45:10

In the Linux kernel, the following vulnerability has been resolved: NFC: nci: uart: Set tty->disc_data only in success path Setting tty->disc_data before opening the NCI device means we need to clean it up on error paths. This also opens some shor...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 14:15:33
  • Zuletzt bearbeitet 23.12.2025 18:42:58

In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Release rproc->clean_table after rproc_attach() fails When rproc->state = RPROC_DETACHED is attached to remote processor through rproc_attach(), if rproc_handle_r...