Debian

Debian 12 (bookworm)

11239 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 19.11.2024 02:16:28
  • Zuletzt bearbeitet 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as ...

  • EPSS 0.01%
  • Veröffentlicht 19.11.2024 02:16:28
  • Zuletzt bearbeitet 03.11.2025 23:17:08

In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed af...

  • EPSS 0.06%
  • Veröffentlicht 18.11.2024 10:15:05
  • Zuletzt bearbeitet 06.08.2025 13:34:08

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected install...

  • EPSS 0.09%
  • Veröffentlicht 18.11.2024 10:15:04
  • Zuletzt bearbeitet 06.08.2025 13:03:43

A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. ...

  • EPSS 0.06%
  • Veröffentlicht 18.11.2024 10:15:04
  • Zuletzt bearbeitet 06.08.2025 13:21:06

A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.12%
  • Veröffentlicht 14.11.2024 12:15:17
  • Zuletzt bearbeitet 19.08.2025 17:32:26

A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverag...

  • EPSS 0.02%
  • Veröffentlicht 14.11.2024 11:15:03
  • Zuletzt bearbeitet 18.11.2024 22:08:54

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the s...

  • EPSS 0.04%
  • Veröffentlicht 09.11.2024 11:15:11
  • Zuletzt bearbeitet 03.11.2025 23:17:06

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes. __hci_cmd_sync_sk() returns NULL if a command retur...

  • EPSS 0.02%
  • Veröffentlicht 09.11.2024 11:15:11
  • Zuletzt bearbeitet 03.11.2025 23:17:07

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzbot report without a repro [1] crashing in nf_send_reset6() I think the issue is that dev->hard_heade...

  • EPSS 0.04%
  • Veröffentlicht 09.11.2024 11:15:11
  • Zuletzt bearbeitet 03.11.2025 23:17:07

In the Linux kernel, the following vulnerability has been resolved: netfilter: Fix use-after-free in get_info() ip6table_nat module unload has refcnt warning for UAF. call trace is: WARNING: CPU: 1 PID: 379 at kernel/module/main.c:853 module_put+0...