Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 13:11:11
  • Zuletzt bearbeitet 14.05.2026 19:05:07

In the Linux kernel, the following vulnerability has been resolved: mm/slab: do not access current->mems_allowed_seq if !allow_spin Lockdep complains when get_from_any_partial() is called in an NMI context, because current->mems_allowed_seq is seqc...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 13:11:10
  • Zuletzt bearbeitet 14.05.2026 19:11:57

In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Parse DT for flashes with the rest of the DT parsing The recent refactoring of where runtime PM is enabled done in commit f1eb4e792bb1 ("spi: spi-cadence-quad...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 13:11:09
  • Zuletzt bearbeitet 14.05.2026 19:21:09

In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reservation lock around madvise Acquire and release the GEM object's reservation lock around calls to the object's madvide operation. The tests use drm_gem_s...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 13:11:09
  • Zuletzt bearbeitet 14.05.2026 19:20:43

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() rtw8822b_set_antenna() can be called from userspace when the chip is powered off. In that case a WARNING is triggere...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 13:11:08
  • Zuletzt bearbeitet 14.05.2026 19:21:57

In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reservation lock around purge Acquire and release the GEM object's reservation lock around calls to the object's purge operation. The tests use drm_gem_shmem...

Warnung Medienbericht Exploit
  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 07:21:47
  • Zuletzt bearbeitet 14.05.2026 17:16:22

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:32:25
  • Zuletzt bearbeitet 12.05.2026 21:21:32

In the Linux kernel, the following vulnerability has been resolved: fs/buffer: add alert in try_to_free_buffers() for folios without buffers try_to_free_buffers() can be called on folios with no buffers attached when filemap_release_folio() is invo...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:32:25
  • Zuletzt bearbeitet 12.05.2026 21:22:32

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer issue buffer funcs If SDMA block not enabled, buffer_funcs will not initialize, fix the null pointer issue if buffer_funcs not initialized.

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:32:24
  • Zuletzt bearbeitet 13.05.2026 20:55:15

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/ras: Move ras data alloc before bad page check In the rare event if eeprom has only invalid address entries, allocation is skipped, this causes following NULL pointer is...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:32:23
  • Zuletzt bearbeitet 13.05.2026 21:03:37

In the Linux kernel, the following vulnerability has been resolved: jfs: nlink overflow in jfs_rename If nlink is maximal for a directory (-1) and inside that directory you perform a rename for some child directory (not moving from the parent), the...