Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 08.05.2026 14:21:28
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read The q54sj108a2_debugfs_read function suffers from a stack buffer overflow due to incorrect arguments passed to bin2hex(...

  • EPSS 0.06%
  • Veröffentlicht 08.05.2026 14:21:28
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is being accessed after rcu_read_unlock() has been called...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:27
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free wind...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:26
  • Zuletzt bearbeitet 15.05.2026 15:14:24

In the Linux kernel, the following vulnerability has been resolved: ksmbd: Don't log keys in SMB3 signing and encryption key generation When KSMBD_DEBUG_AUTH logging is enabled, generate_smb3signingkey() and generate_smb3encryptionkey() log the ses...

  • EPSS 0.06%
  • Veröffentlicht 08.05.2026 14:21:25
  • Zuletzt bearbeitet 15.05.2026 15:15:48

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free by using call_rcu() for oplock_info ksmbd currently frees oplock_info immediately using kfree(), even though it is accessed under RCU read-side critical s...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:24
  • Zuletzt bearbeitet 15.05.2026 15:16:31

In the Linux kernel, the following vulnerability has been resolved: net: nexthop: fix percpu use-after-free in remove_nh_grp_entry When removing a nexthop from a group, remove_nh_grp_entry() publishes the new group via rcu_assign_pointer() then imm...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:23
  • Zuletzt bearbeitet 15.05.2026 15:16:52

In the Linux kernel, the following vulnerability has been resolved: net: ncsi: fix skb leak in error paths Early return paths in NCSI RX and AEN handlers fail to release the received skb, resulting in a memory leak. Specifically, ncsi_aen_handler(...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:23
  • Zuletzt bearbeitet 15.05.2026 15:17:06

In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Fix error path in PTP IRQ setup If request_threaded_irq() fails during the PTP message IRQ setup, the newly created IRQ mapping is never disposed. Indeed, the ...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:21
  • Zuletzt bearbeitet 15.05.2026 15:18:18

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix use-after-free race in VM acquire Replace non-atomic vm->process_info assignment with cmpxchg() to prevent race when parent/child processes sharing a drm_file both ...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 14:21:20
  • Zuletzt bearbeitet 15.05.2026 15:19:03

In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix potential overflow of shmem scatterlist length When a scatterlists table of a GEM shmem object of size 4 GB or more is populated with pages allocated from a folio, un...