Debian

Debian 14 (forky)

13682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:53
  • Zuletzt bearbeitet 23.01.2026 02:05:21

In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind When unbinding pasid - a race condition exists vs outstanding page faults. To prevent this, the pasi...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 12:15:53
  • Zuletzt bearbeitet 06.04.2026 14:45:08

In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info() to fail Previously, ext4_get_group_info() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a mal...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:40:48

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix disconnect vs accept race Despite commit 0ad529d9fd2b ("mptcp: fix possible divide by zero in recvmsg()"), the mptcp protocol is still prone to a race between disconnect...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 23.01.2026 02:06:17

In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:42:40

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not ignore genmask when looking up chain by id When adding a rule to a chain referring to its ID, if that chain had been deleted on the same batch, the rul...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:45:18

In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds checking in decode_message() Copy the bounds checking from encode_message() to decode_message(). This patch addresses the following concerns. Ensure th...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:45:58

In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:46:37

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() rules is allocated in ethtool_get_rxnfc and the size is determined by rule_cnt from user space. So ru...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 16.01.2026 20:47:00

In the Linux kernel, the following vulnerability has been resolved: x86/platform/uv: Use alternate source for socket to node data The UV code attempts to build a set of tables to allow it to do bidirectional socket<=>node lookups. But when nr_cpus...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 12:15:51
  • Zuletzt bearbeitet 23.01.2026 02:07:43

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. ...