Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:14
  • Zuletzt bearbeitet 26.02.2026 17:19:00

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting unregister_netdevice: waiting for sit0 to become free. Usage count = 2 problem. A debug printk() pa...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:13
  • Zuletzt bearbeitet 02.04.2026 12:16:19

In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issue after soft reset During soft reset, the RSS LUT is freed and not restored unless the interface is up. If an ethtool command that accesses the rss l...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:12
  • Zuletzt bearbeitet 27.04.2026 14:16:28

In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_arg_map() may dereference a NULL pointer if its caller fails after a partial allocation. For exampl...

  • EPSS 0.05%
  • Veröffentlicht 23.01.2026 15:24:12
  • Zuletzt bearbeitet 27.04.2026 14:16:28

In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any error from ceph_auth_handle_reply_done() is propagated via finish_auth() but isn't returned from mon_han...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:11
  • Zuletzt bearbeitet 27.04.2026 14:16:27

In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:10
  • Zuletzt bearbeitet 26.02.2026 18:51:04

In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlock the filesystem via an administrative interface and nfsd isn't running, it crashes the server. Thi...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:07
  • Zuletzt bearbeitet 02.04.2026 12:16:18

In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is not initialized until the interface comes up, causing the following NULL pointer crash when ethtool ...

  • EPSS 0.01%
  • Veröffentlicht 23.01.2026 15:24:07
  • Zuletzt bearbeitet 22.04.2026 13:16:19

In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_add_data_with_key(), one may be traversing the srcu-protected list in gpio_name_to_desc(), meanwhile...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:06
  • Zuletzt bearbeitet 27.04.2026 14:16:27

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idr...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 15:24:04
  • Zuletzt bearbeitet 26.02.2026 18:48:27

In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag") fixed a similar issue in the lan966x dri...