Debian

Debian 10 (buster)

543 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 05.07.2024 02:15:09
  • Zuletzt bearbeitet 04.11.2025 18:15:49

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.

  • EPSS 0.03%
  • Veröffentlicht 24.06.2024 14:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:30

In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that ...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spin_unlock_ir...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 12:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:48

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe w...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Update uart_driver_registered on driver removal The removal of the last MAX3100 device triggers the removal of the driver. However, code doesn't update the respect...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Lock port->lock when calling uart_handle_cts_change() uart_handle_cts_change() has to be called with port lock taken, Since we run it in a separate work, the lock ...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: greybus: lights: check return of get_channel_from_mode If channel for the given node is not found we return null from get_channel_from_mode. Make sure we validate the return pointe...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 12.05.2026 12:16:55

In the Linux kernel, the following vulnerability has been resolved: enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many byte...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...