Debian

Debian 13 (trixie)

13181 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 21.05.2024 15:15:17
  • Zuletzt bearbeitet 23.12.2024 16:39:18

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix potential memory leak on unlikely error case If skb_linearize is needed and fails we could leak a msg on the error handling. To fix ensure we kfree the msg block ...

  • EPSS 0.09%
  • Veröffentlicht 21.05.2024 15:15:17
  • Zuletzt bearbeitet 26.12.2024 20:43:42

In the Linux kernel, the following vulnerability has been resolved: xdp, net: Fix use-after-free in bpf_xdp_link_release The problem occurs between dev_get_by_index() and dev_xdp_attach_link(). At this point, dev_xdp_uninstall() is called. Then xdp...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:17
  • Zuletzt bearbeitet 26.12.2024 20:44:16

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix tail_call_reachable rejection for interpreter when jit failed During testing of f263a81451c1 ("bpf: Track subprog poke descriptors correctly and fix use-after-free") under...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:17
  • Zuletzt bearbeitet 26.12.2024 20:44:31

In the Linux kernel, the following vulnerability has been resolved: igb: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If ig...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:17
  • Zuletzt bearbeitet 26.12.2024 20:44:51

In the Linux kernel, the following vulnerability has been resolved: igc: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If ig...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:16
  • Zuletzt bearbeitet 30.04.2025 14:30:29

In the Linux kernel, the following vulnerability has been resolved: kvm: avoid speculation-based attacks from out-of-range memslot accesses KVM's mechanism for accessing guest memory translates a guest physical address (gpa) to a host virtual addre...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:16
  • Zuletzt bearbeitet 24.12.2024 16:31:41

In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free read in drm_getunique() There is a time-of-check-to-time-of-use error in drm_getunique() due to retrieving file_priv->master prior to locking the device's m...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:16
  • Zuletzt bearbeitet 24.12.2024 16:30:22

In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix race of snd_seq_timer_open() The timer instance per queue is exclusive, and snd_seq_timer_open() should have managed the concurrent accesses. It looks as if it's ch...

  • EPSS 0.05%
  • Veröffentlicht 21.05.2024 15:15:16
  • Zuletzt bearbeitet 30.04.2025 14:30:12

In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: Fix out-of-bounds access with more than 4 slaves Commit 571e31fa60b3 ("spi: bcm2835: Cache CS register value for ->prepare_message()") limited the number of slaves to...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:16
  • Zuletzt bearbeitet 26.12.2024 20:49:20

In the Linux kernel, the following vulnerability has been resolved: net:sfc: fix non-freed irq in legacy irq mode SFC driver can be configured via modparam to work using MSI-X, MSI or legacy IRQ interrupts. In the last one, the interrupt was not pr...