Debian

Debian 12 (bookworm)

11237 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 11:15:48
  • Zuletzt bearbeitet 24.09.2025 18:47:47

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Limit read size on v1.2 Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was increased from 16 to 256. In order to avoid overflowing reads for old...

  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 11:15:48
  • Zuletzt bearbeitet 12.05.2026 12:16:41

In the Linux kernel, the following vulnerability has been resolved: block: prevent division by zero in blk_rq_stat_sum() The expression dst->nr_samples + src->nr_samples may have zero value on overflow. It is necessary to add a check to avoid divis...

  • EPSS 0.12%
  • Veröffentlicht 19.05.2024 11:15:47
  • Zuletzt bearbeitet 04.04.2025 14:24:16

In the Linux kernel, the following vulnerability has been resolved: sysv: don't call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A "write_lo...

  • EPSS 0.13%
  • Veröffentlicht 19.05.2024 09:15:12
  • Zuletzt bearbeitet 04.04.2025 14:24:30

In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mock_chain() returns NULL, it is passed to dma_fence_enable_sw_signaling() resulting in...

  • EPSS 0.02%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:40

In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_m...

  • EPSS 0.03%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 03.02.2025 16:03:31

In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() fails and returns an error pointer return in the error branch instead of continuing and dereferencing...

  • EPSS 0.03%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:40

In the Linux kernel, the following vulnerability has been resolved: bpf: Protect against int overflow for stack access size This patch re-introduces protection against the size of access to stack memory being negative; the access size can appear ne...

  • EPSS 0.03%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 30.12.2024 19:35:53

In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: call request_irq() after NAPI initialized The mlxbf_gige driver encounters a NULL pointer exception in mlxbf_gige_open() when kdump is enabled. The sequence to reprodu...

  • EPSS 0.03%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 24.09.2025 18:52:20

In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return di...

  • EPSS 0.03%
  • Veröffentlicht 19.05.2024 09:15:11
  • Zuletzt bearbeitet 24.09.2025 18:51:02

In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: Split 64bit accesses to fix alignment issues Some of the registers are aligned on a 32bit boundary, causing alignment faults on 64bit platforms. Unable to handle...