Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:41
  • Zuletzt bearbeitet 28.04.2026 14:02:38

In the Linux kernel, the following vulnerability has been resolved: HID: core: clamp report_size in s32ton() to avoid undefined shift s32ton() shifts by n-1 where n is the field's report_size, a value that comes directly from a HID device. The HID...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:40
  • Zuletzt bearbeitet 28.04.2026 14:17:26

In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() A malicious USB device claiming to be a CDC Phonet modem can overflow the skb_shared_info->frags[] array by sending ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:39
  • Zuletzt bearbeitet 28.04.2026 14:05:14

In the Linux kernel, the following vulnerability has been resolved: bnge: return after auxiliary_device_uninit() in error path When auxiliary_device_add() fails, the error block calls auxiliary_device_uninit() but does not return. The uninit drops...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:39
  • Zuletzt bearbeitet 28.04.2026 14:14:07

In the Linux kernel, the following vulnerability has been resolved: NFC: digital: Bounds check NFC-A cascade depth in SDD response handler The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each ...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:38
  • Zuletzt bearbeitet 28.04.2026 14:11:42

In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:37
  • Zuletzt bearbeitet 28.04.2026 14:07:04

In the Linux kernel, the following vulnerability has been resolved: fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that sam...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:37
  • Zuletzt bearbeitet 28.04.2026 14:09:16

In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:36
  • Zuletzt bearbeitet 28.04.2026 17:27:20

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When bloc...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:35
  • Zuletzt bearbeitet 28.04.2026 17:21:15

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:34
  • Zuletzt bearbeitet 29.04.2026 18:03:40

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(st...