Debian

Debian 12 (bookworm)

11237 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 10.07.2025 08:15:02
  • Zuletzt bearbeitet 16.12.2025 17:56:47

In the Linux kernel, the following vulnerability has been resolved: jffs2: check jffs2_prealloc_raw_node_refs() result in few other places Fuzzing hit another invalid pointer dereference due to the lack of checking whether jffs2_prealloc_raw_node_r...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:15:00
  • Zuletzt bearbeitet 19.12.2025 16:55:45

In the Linux kernel, the following vulnerability has been resolved: aoe: clean device rq_list in aoedev_downdev() An aoe device's rq_list contains accepted block requests that are waiting to be transmitted to the aoe target. This queue was added as...

  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 08:14:58
  • Zuletzt bearbeitet 19.12.2025 16:49:58

In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lec...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:14:58
  • Zuletzt bearbeitet 19.12.2025 16:55:13

In the Linux kernel, the following vulnerability has been resolved: mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). As syzbot reported [0], mpls_route_input_rcu() can be called from mpls_getroute(), where is under RTNL. net->mpls.platf...

  • EPSS 0.1%
  • Veröffentlicht 10.07.2025 08:14:57
  • Zuletzt bearbeitet 12.05.2026 13:16:47

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix crash in icl_update_topdown_event() The perf_fuzzer found a hard-lockup crash on a RaptorLake machine: Oops: general protection fault, maybe for address 0xff...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:14:56
  • Zuletzt bearbeitet 19.12.2025 16:44:34

In the Linux kernel, the following vulnerability has been resolved: arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() KASAN reports a stack-out-of-bounds read in regs_get_kernel_stack_nth(). Call Trace: [ 97.283505] BUG: ...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 07:42:25
  • Zuletzt bearbeitet 19.12.2025 16:44:27

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table The function atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() d...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 07:42:21
  • Zuletzt bearbeitet 19.12.2025 16:44:23

In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: fix double-free on mc_dev The blamed commit tried to simplify how the deallocations are done but, in the process, introduced a double-free on the mc_dev variable. In ...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 07:42:20
  • Zuletzt bearbeitet 18.11.2025 12:55:19

In the Linux kernel, the following vulnerability has been resolved: iavf: get rid of the crit lock Get rid of the crit lock. That frees us from the error prone logic of try_locks. Thanks to netdev_lock() by Jakub it is now easy, and in most cases ...

  • EPSS 0.08%
  • Veröffentlicht 10.07.2025 07:42:20
  • Zuletzt bearbeitet 12.05.2026 13:16:47

In the Linux kernel, the following vulnerability has been resolved: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() In fb_find_mode_cvt(), iff mode->refresh somehow happens to be 0x80000000, cvt.f_refresh will become 0 when multiplying ...