Debian

Debian Linux

9439 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 20.05.2024 10:15:13
  • Zuletzt bearbeitet 17.12.2025 03:35:26

In the Linux kernel, the following vulnerability has been resolved: cpu: Re-enable CPU mitigations by default for !X86 architectures Rename x86's to CPU_MITIGATIONS, define it in generic code, and force it on for all architectures exception x86. A...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:12
  • Zuletzt bearbeitet 04.04.2025 14:33:42

In the Linux kernel, the following vulnerability has been resolved: geneve: fix header validation in geneve[6]_xmit_skb syzbot is able to trigger an uninit-value in geneve_xmit() [1] Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfie...

  • EPSS 0.03%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 17.12.2025 03:37:36

In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues: - queues which only process TX packets arriving from the network stack - queues which only process ...

  • EPSS 1.75%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 04.04.2025 14:22:45

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would only add newly created rules from the handle into the tree when they had a refcount of 1. On the ot...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 17.12.2025 03:37:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 04.04.2025 14:45:29

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it still means hlist_for_each_entry_rcu can ret...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:10
  • Zuletzt bearbeitet 17.12.2025 03:38:06

In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mu...

  • EPSS 0.27%
  • Veröffentlicht 20.05.2024 10:15:10
  • Zuletzt bearbeitet 04.04.2025 14:23:00

In the Linux kernel, the following vulnerability has been resolved: kprobes: Fix possible use-after-free issue on kprobe registration When unloading a module, its state is changing MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. ...

  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 12:15:08
  • Zuletzt bearbeitet 04.04.2025 14:23:31

In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't really look), lets make sure by removing it, doing pr_err and return -EI...

  • EPSS 0.01%
  • Veröffentlicht 19.05.2024 11:15:50
  • Zuletzt bearbeitet 17.12.2025 03:38:40

In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&...