Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 24.04.2026 14:44:51
  • Zuletzt bearbeitet 27.04.2026 20:20:48

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:44:49
  • Zuletzt bearbeitet 27.04.2026 20:30:25

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set.

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:44:46
  • Zuletzt bearbeitet 27.04.2026 20:30:55

In the Linux kernel, the following vulnerability has been resolved: rxrpc: proc: size address buffers for %pISpc output The AF_RXRPC procfs helpers format local and remote socket addresses into fixed 50-byte stack buffers with "%pISpc". That is to...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:49
  • Zuletzt bearbeitet 27.04.2026 20:40:46

In the Linux kernel, the following vulnerability has been resolved: x86/CPU: Fix FPDSS on Zen1 Zen1's hardware divider can leave, under certain circumstances, partial results from previous operations. Those results can be leaked by another, attack...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:49
  • Zuletzt bearbeitet 27.04.2026 20:36:33

In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: add missing return after LLCP_CLOSED checks In nfc_llcp_recv_hdlc() and nfc_llcp_recv_disc(), when the socket state is LLCP_CLOSED, the code correctly calls release_sock...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:48
  • Zuletzt bearbeitet 27.04.2026 20:43:43

In the Linux kernel, the following vulnerability has been resolved: i2c: s3c24xx: check the size of the SMBUS message before using it The first byte of an i2c SMBUS message is the size, and it should be verified to ensure that it is in the range of...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:47
  • Zuletzt bearbeitet 27.04.2026 20:49:50

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using uninitialized data. Smatch warns that only 6 bytes are...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:42
  • Zuletzt bearbeitet 27.04.2026 21:14:33

In the Linux kernel, the following vulnerability has been resolved: HID: alps: fix NULL pointer dereference in alps_raw_event() Commit ecfa6f34492c ("HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them") attempted to fix up the HI...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:41
  • Zuletzt bearbeitet 28.04.2026 14:02:38

In the Linux kernel, the following vulnerability has been resolved: HID: core: clamp report_size in s32ton() to avoid undefined shift s32ton() shifts by n-1 where n is the field's report_size, a value that comes directly from a HID device. The HID...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:40
  • Zuletzt bearbeitet 28.04.2026 14:17:26

In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending ...