Debian

Debian 14 (forky)

13682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:33
  • Zuletzt bearbeitet 20.01.2026 20:14:12

In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly When an extended state component is not present in fpstate, but in init state, the function copies from init_fpstat...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 12:15:31
  • Zuletzt bearbeitet 14.01.2026 18:16:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning If get_num_sdma_queues or get_num_xgmi_sdma_queues is 0, we end up doing a shift operation where the number of bits shifted equals...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 08:15:36
  • Zuletzt bearbeitet 14.01.2026 18:16:41

In the Linux kernel, the following vulnerability has been resolved: ceph: fix race condition validating r_parent before applying state Add validation to ensure the cached parent directory inode matches the directory info in MDS replies. This preven...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 08:15:36
  • Zuletzt bearbeitet 14.01.2026 18:16:41

In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check for the xfer length to 'rtl9300_i2c_config_xfer' to ensure the data length isn't within the support...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 14.01.2026 18:16:40

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: fix linked list corruption Never leave scheduled wcid entries on the temporary on-stack list

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 14.01.2026 18:16:40

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: add missing check for rx wcid entries Non-station wcid entries must not be passed to the rx functions. In case of the global wcid entry, it could even lead to c...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 16.01.2026 19:51:49

In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval()...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 14.01.2026 18:16:40

In the Linux kernel, the following vulnerability has been resolved: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback In commit 13529647743d9 ("spi: microchip-core-qspi: Support per spi-mem operation frequenc...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 14.01.2026 18:16:40

In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix incorrect map used in eee linkmode incorrectly used ixgbe_lp_map in loops intended to populate the supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map. T...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 08:15:35
  • Zuletzt bearbeitet 20.01.2026 15:45:52

In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees When we don't have a clock specified in the device tree, we have no way to ensure the BAM is on. This is often ...