Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 11:02:34
  • Zuletzt bearbeitet 19.11.2025 14:18:29

In the Linux kernel, the following vulnerability has been resolved: video: fbdev: s3fb: Check the size of screen before memset_io() In the function s3fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:02:33
  • Zuletzt bearbeitet 18.11.2025 02:45:38

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: Cleanup CPU timers before freeing them during exec Commit 55e8c8eb2c7b ("posix-cpu-timers: Store a reference to a pid not a task") started looking up tasks by PID...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:02:33
  • Zuletzt bearbeitet 19.11.2025 14:26:00

In the Linux kernel, the following vulnerability has been resolved: x86/kprobes: Update kcb status flag after singlestepping Fix kprobes to update kcb (kprobes control block) status flag to KPROBE_HIT_SSDONE even if the kp->post_handler is not set....

  • EPSS 0.04%
  • Veröffentlicht 18.06.2025 11:02:32
  • Zuletzt bearbeitet 18.11.2025 02:45:05

In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads t...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:02:31
  • Zuletzt bearbeitet 18.11.2025 02:50:03

In the Linux kernel, the following vulnerability has been resolved: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback Fault inject on pool metadata device reports: BUG: KASAN: use-after-free in dm_pool_register_metadata_thres...

  • EPSS 0.04%
  • Veröffentlicht 18.06.2025 11:02:31
  • Zuletzt bearbeitet 18.11.2025 02:44:34

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) KASAN reports: [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/b...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:02:28
  • Zuletzt bearbeitet 18.11.2025 02:21:38

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL un...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 11:02:27
  • Zuletzt bearbeitet 18.11.2025 02:26:30

In the Linux kernel, the following vulnerability has been resolved: block: don't allow the same type rq_qos add more than once In our test of iocost, we encountered some list add/del corruptions of inner_walk list in ioc_timer_fn. The reason can b...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:02:26
  • Zuletzt bearbeitet 18.11.2025 02:32:24

In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_resume There is a KASAN warning in raid_resume when running the lvm test lvconvert-raid.sh. The reason for the warning is that mddev-...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 11:02:25
  • Zuletzt bearbeitet 18.11.2025 02:33:04

In the Linux kernel, the following vulnerability has been resolved: dm raid: fix address sanitizer warning in raid_status There is this warning when using a kernel with the address sanitizer and running this testsuite: https://gitlab.com/cki-projec...