Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:49
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: tipc: fix divide-by-zero in tipc_sk_filter_connect() A user can set conn_timeout to any value via setsockopt(TIPC_CONN_TIMEOUT), including values less than 4. When a SYN is reject...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:48
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: kprobes: avoid crash when rmmod/insmod after ftrace killed After we hit ftrace is killed by some errors, the kernel crash if we remove modules in which kprobe probes. BUG: unable ...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:47
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: ceph: add a bunch of missing ceph_path_info initializers ceph_mdsc_build_path() must be called with a zero-initialized ceph_path_info parameter, or else the following ceph_mdsc_fre...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:46
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_auth_reply() that can be triggered by a message of t...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:46
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up b...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:45
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: Use u32 for non-negative values in ceph_monmap_decode() This patch fixes unnecessary implicit conversions that change signedness of blob_len and num_mon in ceph_monmap_dec...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:44
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: nsfs: tighten permission checks for ns iteration ioctls Even privileged services should not necessarily be able to see other privileged service's namespaces so they can't leak info...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:42
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input valu...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:40
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value ag...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:40
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix memory leak in error path In samsung_dsim_host_attach(), drm_bridge_add() is called to add the bridge. However, if samsung_dsim_register_te_irq() or p...