Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:14:22
  • Zuletzt bearbeitet 06.05.2026 20:58:09

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_uac1_legacy: validate control request size f_audio_complete() copies req->length bytes into a 4-byte stack variable: u32 data = 0; memcpy(&data, req->buf, req->...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 12:16:24
  • Zuletzt bearbeitet 07.05.2026 12:49:05

In the Linux kernel, the following vulnerability has been resolved: cifs: some missing initializations on replay In several places in the code, we have a label to signify the start of the code where a request can be replayed if necessary. However, ...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:21
  • Zuletzt bearbeitet 06.05.2026 19:38:53

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free via VMA splitting privcmd_vm_ops defines .close (privcmd_close), but neither .may_split nor .open. When userspace does a partial munmap() on a privcmd ...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:20
  • Zuletzt bearbeitet 06.05.2026 20:05:55

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: add missing netlink_ns_capable() check for peer netns rtnl_newlink() lacks a CAP_NET_ADMIN capability check on the peer network namespace when creating paired devices (v...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:20
  • Zuletzt bearbeitet 06.05.2026 19:44:30

In the Linux kernel, the following vulnerability has been resolved: Buffer overflow in drivers/xen/sys-hypervisor.c The build id returned by HYPERVISOR_xen_version(XENVER_build_id) is neither NUL terminated nor a string. The first causes a buffer ...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 17:34:27
  • Zuletzt bearbeitet 06.05.2026 18:33:39

In the Linux kernel, the following vulnerability has been resolved: EDAC/mc: Fix error path ordering in edac_mc_alloc() When the mci->pvt_info allocation in edac_mc_alloc() fails, the error path will call put_device() which will end up calling the ...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 17:32:37
  • Zuletzt bearbeitet 06.05.2026 19:05:57

In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from oma...

  • EPSS 0.02%
  • Veröffentlicht 27.04.2026 17:32:37
  • Zuletzt bearbeitet 06.05.2026 18:36:57

In the Linux kernel, the following vulnerability has been resolved: driver core: enforce device_lock for driver_match_device() Currently, driver_match_device() is called from three sites. One site (__device_attach_driver) holds device_lock(dev), bu...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 17:30:53
  • Zuletzt bearbeitet 06.05.2026 21:04:14

In the Linux kernel, the following vulnerability has been resolved: mm/kasan: fix double free for kasan pXds kasan_free_pxd() assumes the page table is always struct page aligned. But that's not always the case for all architectures. E.g. In cas...

  • EPSS 0.06%
  • Veröffentlicht 25.04.2026 08:47:02
  • Zuletzt bearbeitet 06.05.2026 21:08:10

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of th...