Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:49
  • Zuletzt bearbeitet 28.04.2026 15:05:10

In the Linux kernel, the following vulnerability has been resolved: net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer smc_rx_splice() allocates one smc_spd_priv per pipe_buffer and stores the pointer in pipe_buffer.p...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:49
  • Zuletzt bearbeitet 28.04.2026 15:04:04

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Avoid releasing netdev before teardown completes The patch cited in the Fixes tag below changed the teardown code for OVS ports to no longer unconditionally take ...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:49
  • Zuletzt bearbeitet 28.04.2026 15:02:57

In the Linux kernel, the following vulnerability has been resolved: nfc: nci: fix circular locking dependency in nci_close_device nci_close_device() flushes rx_wq and tx_wq while holding req_lock. This causes a circular locking dependency because n...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 14:41:39

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop l2cap_config_req() processes CONFIG_REQ for channels in BT_CONNECTED state to support L2CAP reconfiguration (e.g. ...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 14.05.2026 15:16:45

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() l2cap_conn_del() calls cancel_delayed_work_sync() for both info_timer and id_addr_timer while holding conn->lock. However, the wo...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 13:57:57

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock btintel_hw_error() issues two __hci_cmd_sync() calls (HCI_OP_RESET and Intel exception-info retrieval) witho...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 14:47:01

In the Linux kernel, the following vulnerability has been resolved: team: fix header_ops type confusion with non-Ethernet ports Similar to commit 950803f72547 ("bonding: fix type confusion in bond_setup_by_slave()") team has the same class of heade...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 15:07:47

In the Linux kernel, the following vulnerability has been resolved: udp: Fix wildcard bind conflict check when using hash2 When binding a udp_sock to a local address and port, UDP uses two hashes (udptable->hash and udptable->hash2) for collision d...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 12:46:35

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:45:56

In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix use of completion ctx after free On admin queue completion handling, if the admin command completed with error we print data from the completion context. The issue is...