Debian

Debian Linux

9944 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.75%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 04.04.2025 14:22:45

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would only add newly created rules from the handle into the tree when they had a refcount of 1. On the ot...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 17.12.2025 03:37:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 23.12.2025 19:17:20

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_sock_setsockopt() is copying data without checking user input length. BUG: KASAN: slab-out-of-bounds i...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:11
  • Zuletzt bearbeitet 04.04.2025 14:45:29

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it still means hlist_for_each_entry_rcu can ret...

  • EPSS 0.01%
  • Veröffentlicht 20.05.2024 10:15:10
  • Zuletzt bearbeitet 17.12.2025 03:38:06

In the Linux kernel, the following vulnerability has been resolved: drm/client: Fully protect modes[] with dev->mode_config.mutex The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mu...

  • EPSS 0.34%
  • Veröffentlicht 20.05.2024 10:15:10
  • Zuletzt bearbeitet 04.04.2025 14:23:00

In the Linux kernel, the following vulnerability has been resolved: kprobes: Fix possible use-after-free issue on kprobe registration When unloading a module, its state is changing MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. ...

  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 12:15:08
  • Zuletzt bearbeitet 04.04.2025 14:23:31

In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn't really look), lets make sure by removing it, doing pr_err and return -EI...

  • EPSS 0.01%
  • Veröffentlicht 19.05.2024 11:15:50
  • Zuletzt bearbeitet 17.12.2025 03:38:40

In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&...

  • EPSS 0.01%
  • Veröffentlicht 19.05.2024 11:15:49
  • Zuletzt bearbeitet 30.12.2024 19:52:55

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an unsuccessful status. In such cases, the elsiocb is ...

  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 11:15:49
  • Zuletzt bearbeitet 05.01.2026 11:16:35

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Fix null ptr deref in btintel_read_version If hci_cmd_sync_complete() is triggered and skb is NULL, then hdev->req_skb is NULL, which will cause this issue.