Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 08.05.2026 14:21:43
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: kthread: consolidate kthread exit paths to prevent use-after-free Guillaume reported crashes via corrupted RCU callback function pointers during KUnit testing. The crash was traced...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:42
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix NULL pointer dereference in update_cpu_qos_request() The update_cpu_qos_request() function attempts to initialize the 'freq' variable by dereferencing 'c...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:42
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input valu...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:41
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl Drop reference to syncobj and timeline fence when aborting the ioctl due output array being too small. (cherry pick...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:40
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value ag...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:40
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix memory leak in error path In samsung_dsim_host_attach(), drm_bridge_add() is called to add the bridge. However, if samsung_dsim_register_te_irq() or p...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:39
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Fix user fence leak on alloc failure When dma_fence_chain_alloc() fails, properly release the user fence reference to prevent a memory leak. (cherry picked from commi...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:38
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence, or user fence) before hitting a later f...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:38
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). nfsd_nl_listener_set_doit() uses get_current_cred() without put_cred(). As we can see from other callers, svc_xprt_create_f...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:37
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix chunk map leak in btrfs_map_block() after btrfs_chunk_map_num_copies() Fix a chunk map leak in btrfs_map_block(): if we return early with -EINVAL, we're not freeing the ...