Debian

Debian 14 (forky)

13674 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:45:06
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_size can become stale between the initial size check and when ext4_update_inline_data()/ext4_create_i...

  • EPSS 0.07%
  • Veröffentlicht 16.12.2025 14:45:05
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: fix use-after-free in ipc_msg_send_request ipc_msg_send_request() waits for a generic netlink reply using an ipc_msg_table_entry on the stack. The generic netlink handl...

  • EPSS 0.02%
  • Veröffentlicht 16.12.2025 14:45:04
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: crypto: zstd - fix double-free in per-CPU stream cleanup The crypto/zstd module has a double-free bug that occurs when multiple tfms are allocated and freed. The issue happens bec...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:45:03
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() Fix a race between inline data destruction and block mapping. The function ext4_destroy_inline_data_nolock() c...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:45:01
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and r...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:45:00
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified an issue [1] in multiq3_attach() that induces a task timeout due to open() or COMEDI_DEVCONFIG ioctl ...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:44:59
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: comedi: check device's attached status in compat ioctls Syzbot identified an issue [1] that crashes kernel, seemingly due to unexistent callback dev->get_valid_routes(). By all mea...

  • EPSS 0.06%
  • Veröffentlicht 16.12.2025 14:44:58
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() le...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:44:58
  • Zuletzt bearbeitet 18.04.2026 09:16:12

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser The Information Element (IE) parser rtw_get_ie() trusted the length byte of each IE without validating that the IE...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 14:44:57
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing The Extended Supported Rates (ESR) IE handling in OnBeacon accessed *(p + 1 + ielen) and *(p + 2 + ielen) with...