Debian

Debian 12 (bookworm)

11239 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 05.05.2026 15:22:29

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly leave nested VMX/SVM if SMM mode is being tog...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:06

In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mu...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 09.10.2024 15:57:03

In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that ...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:06

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning adev->gfx.imu.funcs could be NULL

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:07

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. ...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:14
  • Zuletzt bearbeitet 03.11.2025 23:16:03

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ Make sure the connector is fully initialized before signalling any HPD events via drm_kms_helpe...

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:14
  • Zuletzt bearbeitet 07.10.2024 14:24:56

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:14
  • Zuletzt bearbeitet 05.05.2026 15:22:44

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes.

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:14
  • Zuletzt bearbeitet 05.05.2026 15:23:19

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. ...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:14
  • Zuletzt bearbeitet 03.11.2025 23:16:03

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking befo...