Debian

Debian 13 (trixie)

13174 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:23
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called hidinput_connect() will eventually be called to set up the device with the input layer since the ...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:23
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for ...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:22
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these val...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:21
  • Zuletzt bearbeitet 14.01.2026 19:16:43

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: fix signedness in this_len calculation When importing and using buffers, buf->len is considered unsigned. However, buf->len is converted to signed int when committin...

  • EPSS 0.03%
  • Veröffentlicht 16.09.2025 13:00:19
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: fs/smb: Fix inconsistent refcnt update A possible inconsistent update of refcount was identified in `smb2_compound_op`. Such inconsistent update could lead to possible resource lea...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:17
  • Zuletzt bearbeitet 11.04.2026 13:16:35

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths Since the buffers are mapped from userspace, it is prudent to use READ_ONCE() to read the value into a lo...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 13:00:17
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6 (present on master as well): BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0 Call trace: ka...

  • EPSS 0.01%
  • Veröffentlicht 16.09.2025 13:00:16
  • Zuletzt bearbeitet 14.01.2026 19:16:42

In the Linux kernel, the following vulnerability has been resolved: RISC-V: KVM: fix stack overrun when loading vlenb The userspace load can put up to 2048 bits into an xlen bit stack buffer. We want only xlen bits, so check the size beforehand.

  • EPSS 0.01%
  • Veröffentlicht 16.09.2025 13:00:14
  • Zuletzt bearbeitet 12.05.2026 13:17:12

In the Linux kernel, the following vulnerability has been resolved: sctp: initialize more fields in sctp_v6_from_sk() syzbot found that sin6_scope_id was not properly initialized, leading to undefined behavior. Clear sin6_scope_id and sin6_flowinf...

  • EPSS 0.01%
  • Veröffentlicht 16.09.2025 13:00:14
  • Zuletzt bearbeitet 12.05.2026 13:17:13

In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump When calling ftrace_dump_one() concurrently with reading trace_pipe, a WARN_ON_ONCE() in trace_printk_seq() can...