Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 15:16:03
  • Zuletzt bearbeitet 18.04.2026 09:16:30

In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix cache_request leak in cache_release When a reader's file descriptor is closed while in the middle of reading a cache_request (rp->offset != 0), cache_release() decremen...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2026 15:16:00
  • Zuletzt bearbeitet 27.04.2026 14:16:35

In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every opening of the interface and destroyed on every closing. However it may be accessed via get_ts_i...

  • EPSS 0.06%
  • Veröffentlicht 03.04.2026 15:15:58
  • Zuletzt bearbeitet 27.04.2026 14:16:35

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access l2cap_information_rsp() checks that cmd_len covers the fixed l2cap_info_rsp header (type + result, 4 bytes) b...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2026 15:15:57
  • Zuletzt bearbeitet 27.04.2026 14:16:35

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix krb5 mount with username option Customer reported that some of their krb5 mounts were failing against a single server as the client was trying to mount the shares ...

  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 15:15:56
  • Zuletzt bearbeitet 18.04.2026 09:16:29

In the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads.

  • EPSS 0.02%
  • Veröffentlicht 03.04.2026 15:15:55
  • Zuletzt bearbeitet 27.04.2026 14:16:35

In the Linux kernel, the following vulnerability has been resolved: spi: fix use-after-free on controller registration failure Make sure to deregister from driver core also in the unlikely event that per-cpu statistics allocation fails during contr...

  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 15:15:54
  • Zuletzt bearbeitet 07.04.2026 13:20:55

In the Linux kernel, the following vulnerability has been resolved: spi: fix statistics allocation The controller per-cpu statistics is not allocated until after the controller has been registered with driver core, which leaves a window where acces...

  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 15:15:53
  • Zuletzt bearbeitet 18.04.2026 09:16:29

In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2026 15:15:51
  • Zuletzt bearbeitet 07.04.2026 13:20:55

In the Linux kernel, the following vulnerability has been resolved: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN uart_write_room() and uart_write() behave inconsistently when xmit_buf is NULL (which happens for PORT_UNKNOWN ports...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2026 15:15:51
  • Zuletzt bearbeitet 02.05.2026 07:16:18

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.