Debian

Debian Linux

9921 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:44
  • Zuletzt bearbeitet 17.12.2025 19:18:44

In the Linux kernel, the following vulnerability has been resolved: dm cache: prevent BUG_ON by blocking retries on failed device resumes A cache device failing to resume due to mapping errors should not be retried, as the failure leaves a partiall...

  • EPSS 0.03%
  • Veröffentlicht 18.06.2025 09:33:41
  • Zuletzt bearbeitet 18.12.2025 21:31:24

In the Linux kernel, the following vulnerability has been resolved: genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie The IOMMU translation for MSI message addresses has been a 2-step process, separated in time: 1) iom...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:41
  • Zuletzt bearbeitet 17.12.2025 19:18:05

In the Linux kernel, the following vulnerability has been resolved: dm: fix unconditional IO throttle caused by REQ_PREFLUSH When a bio with REQ_PREFLUSH is submitted to dm, __send_empty_flush() generates a flush_bio with REQ_OP_WRITE | REQ_PREFLUS...

  • EPSS 0.03%
  • Veröffentlicht 18.06.2025 09:33:40
  • Zuletzt bearbeitet 18.12.2025 21:31:45

In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory ou...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:38
  • Zuletzt bearbeitet 18.12.2025 21:32:24

In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:33
  • Zuletzt bearbeitet 17.12.2025 18:27:06

In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ===========================================...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:32
  • Zuletzt bearbeitet 12.01.2026 13:11:24

In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, trigge...

  • EPSS 0.02%
  • Veröffentlicht 18.06.2025 09:33:31
  • Zuletzt bearbeitet 17.12.2025 18:17:05

In the Linux kernel, the following vulnerability has been resolved: virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue o...

  • EPSS 0.03%
  • Veröffentlicht 18.06.2025 09:33:28
  • Zuletzt bearbeitet 17.12.2025 18:15:57

In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder did not set device_caps. Add this, otherwise the video device can't be registered (you get a WARN_ON ...

  • EPSS 0.03%
  • Veröffentlicht 18.06.2025 09:33:27
  • Zuletzt bearbeitet 17.12.2025 18:11:32

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Set dma_mask for ffa devices Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning: WARNING: CPU: 1 PID: 1 a...