Debian

Debian 13 (trixie)

13174 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 29.02.2024 06:15:45
  • Zuletzt bearbeitet 19.03.2025 15:51:23

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix uaf in smb20_oplock_break_ack drop reference after use opinfo.

  • EPSS 0.13%
  • Veröffentlicht 29.02.2024 01:42:05
  • Zuletzt bearbeitet 15.04.2026 00:35:42

bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 06.12.2024 18:41:12

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fix incorrect locking in state_change sk callback We are not changing anything in the TCP connection state so we should not take a write_lock but rather a read lock. Th...

  • EPSS 0.03%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 09.01.2025 15:21:46

In the Linux kernel, the following vulnerability has been resolved: media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' If an error occurs after a successful 'of_icc_get()' call, it must be undone. Use 'devm_of_icc_get...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 19.03.2025 15:50:56

In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix shift-out-of-bounds in load_balance() Syzbot reported a handful of occurrences where an sd->nr_balance_failed can grow to much higher values than one would expect. ...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 09.12.2024 19:02:52

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix off by one in hdmi_14_process_transaction() The hdcp_i2c_offsets[] array did not have an entry for HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an of...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 10.01.2025 18:26:24

In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using ...

  • EPSS 0.04%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 09.12.2024 19:05:02

In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op When handling op->addr, it is using the buffer "tmpbuf" which has been freed. This will trigger a use-after-free KA...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 09.12.2024 19:06:07

In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Use after free in __vmbus_open() The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without remov...

  • EPSS 0.03%
  • Veröffentlicht 28.02.2024 09:15:40
  • Zuletzt bearbeitet 09.12.2024 19:06:24

In the Linux kernel, the following vulnerability has been resolved: memory: renesas-rpc-if: fix possible NULL pointer dereference of resource The platform_get_resource_byname() can return NULL which would be immediately dereferenced by resource_siz...