Debian

Debian 12 (bookworm)

11237 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:12:53
  • Zuletzt bearbeitet 03.11.2025 18:44:21

In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Use kernel helpers for hex dumps Previously, when the driver was printing hex dumps, the buffer was cast to an 8 byte long and printed using string formatters. If the buff...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:12:53
  • Zuletzt bearbeitet 06.12.2025 22:15:50

In the Linux kernel, the following vulnerability has been resolved: bonding: check xdp prog when set bond mode Following operations can trigger a warning[1]: ip netns add ns1 ip netns exec ns1 ip link add bond0 type bond mode balance-rr ...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:12:52
  • Zuletzt bearbeitet 24.11.2025 10:15:59

In the Linux kernel, the following vulnerability has been resolved: net: fix NULL pointer dereference in l3mdev_l3_rcv When delete l3s ipvlan: ip link del link eth0 ipvlan1 type ipvlan mode l3s This may cause a null pointer dereference: ...

  • EPSS 0.07%
  • Veröffentlicht 16.04.2025 14:12:47
  • Zuletzt bearbeitet 03.11.2025 20:17:44

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointe...

  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:12:46
  • Zuletzt bearbeitet 03.11.2025 20:17:44

In the Linux kernel, the following vulnerability has been resolved: PCI: brcmstb: Fix error path after a call to regulator_bulk_get() If the regulator_bulk_get() returns an error and no regulators are created, we need to set their number to zero. ...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:12:44
  • Zuletzt bearbeitet 03.11.2025 20:17:44

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: avoid NPD when ASIC does not support DMUB ctx->dmub_srv will de NULL if the ASIC does not support DMUB, which is tested in dm_dmub_sw_init. However, it will be de...

  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:12:42
  • Zuletzt bearbeitet 11.01.2026 17:15:52

In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range() If track_pfn_copy() fails, we already added the dst VMA to the maple tree. As fork() fails, we'll cleanup the...

  • EPSS 0.06%
  • Veröffentlicht 16.04.2025 14:12:41
  • Zuletzt bearbeitet 03.11.2025 20:17:43

In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF pr...

  • EPSS 0.13%
  • Veröffentlicht 16.04.2025 14:12:41
  • Zuletzt bearbeitet 03.11.2025 20:17:43

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Don't expose hw_counters outside of init net namespace Commit 467f432a521a ("RDMA/core: Split port and device counter sysfs attributes") accidentally almost exposed hw c...

  • EPSS 0.1%
  • Veröffentlicht 16.04.2025 14:12:34
  • Zuletzt bearbeitet 03.11.2025 20:17:43

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow When cur_qp isn't NULL, in order to avoid fetching the QP from the radix tree again we check if the next cqe QP is identical to th...