Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 13.05.2026 15:08:26
  • Zuletzt bearbeitet 13.05.2026 16:16:50

In the Linux kernel, the following vulnerability has been resolved: iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() sizeof(num) evaluates to sizeof(size_t) (8 bytes on 64-bit) instead of the intended __be32 element size (4 bytes)...

Medienbericht
  • EPSS 0.01%
  • Veröffentlicht 11.05.2026 08:16:16
  • Zuletzt bearbeitet 14.05.2026 15:16:47

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy ...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:22:33
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT This resolves the follow splat and lock-up when running with PREEMPT_RT enabled on Hyper-V: [ 415.140818] BUG: scheduling...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:22:32
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: fs: init flags_valid before calling vfs_fileattr_get syzbot reported a uninit-value bug in [1]. Similar to the "*get" context where the kernel's internal file_kattr structure is i...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:22:32
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks when resetting request and reply queues The driver encountered a crash during resource cleanup when the reply and request queues were NULL due to free...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:22:31
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: unshare: fix unshare_fs() handling There's an unpleasant corner case in unshare(2), when we have a CLONE_NEWNS in flags and current->fs hadn't been shared at all; in that case copy...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:22:30
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace() The kernel log indicates a crash in ufshcd_add_command_trace, due to a NULL pointer dereference...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:22:30
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: nfs: return EISDIR on nfs3_proc_create if d_alias is a dir If we found an alias through nfs3_do_create/nfs_add_or_obtain /d_splice_alias which happens to be a dir dentry, we don't ...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:22:29
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Decrement re_receiving on the early exit paths In the event that rpcrdma_post_recvs() fails to create a work request (due to memory allocation failure, say) or otherwise ...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:22:28
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix deadlock between devlink lock and esw->wq esw->work_queue executes esw_functions_changed_event_handler -> esw_vfs_changed_event_handler and acquires the devlink lock....