Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:03
  • Zuletzt bearbeitet 27.04.2026 20:14:45

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix NULL-deref on disconnect Make sure to deregister the controller before dropping the reference to the driver data on disconnect to avoid NULL-pointer dereferences o...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 14:45:02
  • Zuletzt bearbeitet 27.04.2026 20:13:49

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:01
  • Zuletzt bearbeitet 27.04.2026 20:13:14

In the Linux kernel, the following vulnerability has been resolved: mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I encountered some very strange crash issues ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:00
  • Zuletzt bearbeitet 27.04.2026 20:18:54

In the Linux kernel, the following vulnerability has been resolved: idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling Switch from using the completion's raw spinlock to a local lock in the idpf_vc_xn struct. The conversion is safe ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:59
  • Zuletzt bearbeitet 27.04.2026 20:19:01

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() page_pool_create() can return an ERR_PTR on failure. The return value is used unconditionally in the...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:58
  • Zuletzt bearbeitet 27.04.2026 20:19:21

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix use-after-free and leak in lan966x_fdma_reload() When lan966x_fdma_reload() fails to allocate new RX buffers, the restore path restarts DMA using old descriptors ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:58
  • Zuletzt bearbeitet 27.04.2026 20:19:07

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: fix page pool leak in error paths lan966x_fdma_rx_alloc() creates a page pool but does not destroy it if the subsequent fdma_alloc_coherent() call fails, leaking the ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:56
  • Zuletzt bearbeitet 27.04.2026 20:20:01

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix call removal to use RCU safe deletion Fix rxrpc call removal from the rxnet->calls list to use list_del_rcu() rather than list_del_init() to prevent stuffing up reading ...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 14:44:52
  • Zuletzt bearbeitet 27.04.2026 20:20:36

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Only put the call ref if one was acquired rxrpc_input_packet_on_conn() can process a to-client packet after the current client call on the channel has already been torn down...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:52
  • Zuletzt bearbeitet 27.04.2026 20:20:27

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and ...