Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 09:33:41
  • Zuletzt bearbeitet 12.05.2026 13:16:41

In the Linux kernel, the following vulnerability has been resolved: dm: fix unconditional IO throttle caused by REQ_PREFLUSH When a bio with REQ_PREFLUSH is submitted to dm, __send_empty_flush() generates a flush_bio with REQ_OP_WRITE | REQ_PREFLUS...

  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 09:33:40
  • Zuletzt bearbeitet 18.12.2025 21:31:45

In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory ou...

  • EPSS 0.07%
  • Veröffentlicht 18.06.2025 09:33:38
  • Zuletzt bearbeitet 12.05.2026 13:16:41

In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that...

  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 09:33:33
  • Zuletzt bearbeitet 17.12.2025 18:27:06

In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ===========================================...

  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 09:33:32
  • Zuletzt bearbeitet 12.01.2026 13:11:24

In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, trigge...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 09:33:31
  • Zuletzt bearbeitet 17.12.2025 18:17:05

In the Linux kernel, the following vulnerability has been resolved: virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN syzbot reports a data-race when accessing the event_triggered, here is the simplified stack when the issue o...

  • EPSS 0.09%
  • Veröffentlicht 18.06.2025 09:33:28
  • Zuletzt bearbeitet 17.12.2025 18:15:57

In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder did not set device_caps. Add this, otherwise the video device can't be registered (you get a WARN_ON ...

  • EPSS 0.1%
  • Veröffentlicht 18.06.2025 09:33:27
  • Zuletzt bearbeitet 17.12.2025 18:11:32

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Set dma_mask for ffa devices Set dma_mask for FFA devices, otherwise DMA allocation using the device pointer lead to following warning: WARNING: CPU: 1 PID: 1 a...

  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 09:33:25
  • Zuletzt bearbeitet 18.12.2025 21:32:44

In the Linux kernel, the following vulnerability has been resolved: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs The following splat has been observed on a SAMA5D27 platform using atmel_serial: BUG: sleeping function called from...

  • EPSS 0.12%
  • Veröffentlicht 18.06.2025 09:33:23
  • Zuletzt bearbeitet 18.12.2025 21:36:09

In the Linux kernel, the following vulnerability has been resolved: vxlan: Annotate FDB data races The 'used' and 'updated' fields in the FDB entry structure can be accessed concurrently by multiple threads, leading to reports such as [1]. Can be r...