Debian

Debian 12 (bookworm)

11237 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:18
  • Zuletzt bearbeitet 03.11.2025 22:17:19

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Enforce hcall result buffer validity and size plpar_hcall(), plpar_hcall9(), and related functions expect callers to provide valid result buffers of certain minimu...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:16

In the Linux kernel, the following vulnerability has been resolved: ima: Avoid blocking in RCU read-side critical section A panic happens in ima_match_policy: BUG: unable to handle kernel NULL pointer dereference at 0000000000000010 PGD 42f873067 ...

  • EPSS 0.02%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:16

In the Linux kernel, the following vulnerability has been resolved: mm/page_table_check: fix crash on ZONE_DEVICE Not all pages may apply to pgtable check. One example is ZONE_DEVICE pages: they map PFNs directly, and they don't allocate page_ext ...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() Use {READ,WRITE}_ONCE() to access kvm->last_boosted_vcpu to ensure the loads and stores are atomic. In the extremel...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe c...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list Use list_for_each_entry_safe() to allow iterating through the list and deleting the entry in the iteration pro...

  • EPSS 0.02%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors input_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for PREROUTING hook, in P...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 12.05.2026 12:17:00

In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free. WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_s...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 12.05.2026 12:17:00

In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly. syzbot reported: Oops: general protection fa...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:16
  • Zuletzt bearbeitet 03.11.2025 22:17:15

In the Linux kernel, the following vulnerability has been resolved: cachefiles: flush all requests after setting CACHEFILES_DEAD In ondemand mode, when the daemon is processing an open request, if the kernel flags the cache as CACHEFILES_DEAD, the ...