Debian

Debian 13 (trixie)

13183 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:02
  • Zuletzt bearbeitet 03.11.2025 20:17:03

In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a warning observed while loop testing kexec jump: Interrupts enabled after irqrouter_resume+0x0/0x50...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 13:38:23
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. ...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 13:38:22
  • Zuletzt bearbeitet 29.10.2025 21:08:13

In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] =========...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 13:38:22
  • Zuletzt bearbeitet 29.10.2025 21:07:58

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers Other, non DAI copier widgets could have the same stream name (sname) as the ALH copier and in that case the copi...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 13:38:21
  • Zuletzt bearbeitet 24.11.2025 10:15:59

In the Linux kernel, the following vulnerability has been resolved: net: allow small head cache usage with large MAX_SKB_FRAGS values Sabrina reported the following splat: WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_loc...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 13:38:20
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The cause of the issue was that eth_skb_pkt_type() acc...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 14.03.2025 14:25:59
  • Zuletzt bearbeitet 12.05.2026 12:16:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in s...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:22
  • Zuletzt bearbeitet 03.11.2025 20:17:23

In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC Erhard reported the following KASAN hit while booting his PowerMac G4 with a KASAN-enabled kerne...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:21
  • Zuletzt bearbeitet 12.05.2026 13:16:39

In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while running tests that boil down to: - create a pair of net...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2025 09:42:21
  • Zuletzt bearbeitet 12.05.2026 13:16:39

In the Linux kernel, the following vulnerability has been resolved: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Brad Spengler reported the list_del() corruption splat in gtp_net_exit_batch_rtnl(). [0] Commit eb28fd76c0a0 ("gt...