Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:06
  • Zuletzt bearbeitet 11.05.2026 20:10:53

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions struct configfs_item_operations callbacks are defined like the following: int (*allow...

  • EPSS 0.05%
  • Veröffentlicht 06.05.2026 11:28:05
  • Zuletzt bearbeitet 11.05.2026 20:12:11

In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp_v6_syn_recv_sock() Code in tcp_v6_syn_recv_sock() after the call to tcp_v4_syn_recv_sock() is done too late. After tcp_v4_syn_recv_sock(), the child...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:04
  • Zuletzt bearbeitet 11.05.2026 20:11:30

In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_...

  • EPSS 0.05%
  • Veröffentlicht 06.05.2026 11:28:04
  • Zuletzt bearbeitet 11.05.2026 20:11:44

In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, msg is not nul-terminated msg passed to netconsole from the console subsystem is not guaranteed to be nul-terminated. Before recent commit 7eab73b18630...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:03
  • Zuletzt bearbeitet 11.05.2026 20:21:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate user queue size constraints Add validation to ensure user queue sizes meet hardware requirements: - Size must be a power of two for efficient ring buffer wrapp...

  • EPSS 0.07%
  • Veröffentlicht 06.05.2026 11:28:02
  • Zuletzt bearbeitet 11.05.2026 20:11:10

In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GSO frames udpgro_frglist.sh and udpgro_bench.sh are the flakiest tests currently in NIPA. They fail in the same exact way, TCP GRO test stalls occasion...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:00
  • Zuletzt bearbeitet 11.05.2026 20:51:38

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust PHY FSM transition to TX_EN-to-PLL_ON for TMDS on DCN35 [Why] A backport of the change made for DCN401 that addresses an issue where we turn off the PHY PLL...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:27:59
  • Zuletzt bearbeitet 11.05.2026 20:47:45

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-async: Fix error handling on steps after finding a match Once an async connection is found to be matching with an fwnode, a sub-device may be registered (in case it was...

  • EPSS 0.07%
  • Veröffentlicht 06.05.2026 11:27:59
  • Zuletzt bearbeitet 11.05.2026 20:50:14

In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check remaining length before reading optlen Quoting reporter: In net/netfilter/xt_tcpmss.c (lines 53-68), the TCP option parser reads op[i+1] directly wit...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:27:58
  • Zuletzt bearbeitet 11.05.2026 20:38:38

In the Linux kernel, the following vulnerability has been resolved: ceph: do not propagate page array emplacement errors as batch errors When fscrypt is enabled, move_dirty_folio_in_page_array() may fail because it needs to allocate bounce buffers ...