Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:40
  • Zuletzt bearbeitet 08.05.2026 17:51:44

In the Linux kernel, the following vulnerability has been resolved: srcu: Use irq_work to start GP in tiny SRCU Tiny SRCU's srcu_gp_start_if_needed() directly calls schedule_work(), which acquires the workqueue pool->lock. This causes a lockdep sp...

  • EPSS 0.02%
  • Veröffentlicht 06.05.2026 07:40:39
  • Zuletzt bearbeitet 08.05.2026 17:58:54

In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to index the fixed 16-entry wl->tx_frames[] array. The ID...

  • EPSS 0.06%
  • Veröffentlicht 06.05.2026 07:40:39
  • Zuletzt bearbeitet 08.05.2026 17:54:04

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry New test case fails unexpectedly when avx2 matching functions are used. The test first loads a ranomly ge...

  • EPSS 0.04%
  • Veröffentlicht 06.05.2026 07:40:38
  • Zuletzt bearbeitet 08.05.2026 19:43:23

In the Linux kernel, the following vulnerability has been resolved: fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath When cifs_sanitize_prepath is called with an empty string or a string containing only delimiters (e.g., "/"), the cur...

  • EPSS 0.02%
  • Veröffentlicht 06.05.2026 07:40:37
  • Zuletzt bearbeitet 08.05.2026 20:14:50

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscfg indices in IF events brcmf_fweh_handle_if_event() validates the firmware-provided interface index before it touches drvr->iflist[], but it still use...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:37
  • Zuletzt bearbeitet 08.05.2026 19:45:15

In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-free in roccat_report_event roccat_report_event() iterates over the device->readers list without holding the readers_lock. This allows a concurrent rocca...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:36
  • Zuletzt bearbeitet 14.05.2026 15:16:47

In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, a...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:35
  • Zuletzt bearbeitet 11.05.2026 17:30:05

In the Linux kernel, the following vulnerability has been resolved: xfrm: account XFRMA_IF_ID in aevent size calculation xfrm_get_ae() allocates the reply skb with xfrm_aevent_msgsize(), then build_aevent() appends attributes including XFRMA_IF_ID ...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:35
  • Zuletzt bearbeitet 11.05.2026 17:27:25

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei It looks element length declared in servreg_loc_pfr_req_ei for reason not matching servreg_loc_pfr_req's reason f...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:33
  • Zuletzt bearbeitet 11.05.2026 17:32:55

In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Fix a memory leak in hang state error path When vc4_save_hang_state() encounters an early return condition, it returns without freeing the previously allocated `kernel_sta...