Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 18.06.2025 11:01:03
  • Zuletzt bearbeitet 14.11.2025 16:04:44

In the Linux kernel, the following vulnerability has been resolved: ice: xsk: prohibit usage of non-balanced queue id Fix the following scenario: 1. ethtool -L $IFACE rx 8 tx 96 2. xdpsock -q 10 -t -z Above refers to a case where user would like t...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:01:01
  • Zuletzt bearbeitet 14.11.2025 16:13:20

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_tproxy: restrict to prerouting hook TPROXY is only allowed from prerouting, but nft_tproxy doesn't check this. This fixes a crash (null dereference) when using tprox...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 11:00:59
  • Zuletzt bearbeitet 14.11.2025 16:41:55

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: fix stuck flows on cleanup due to pending work To clear the flow table on flow table free, the following sequence normally happens in order: 1) gc_step wor...

  • EPSS 0.07%
  • Veröffentlicht 18.06.2025 11:00:57
  • Zuletzt bearbeitet 14.11.2025 18:11:19

In the Linux kernel, the following vulnerability has been resolved: net: lantiq_xrx200: restore buffer if memory allocation failed In a situation where memory allocation fails, an invalid buffer address is stored. When this descriptor is used again...

  • EPSS 0.11%
  • Veröffentlicht 18.06.2025 11:00:57
  • Zuletzt bearbeitet 14.11.2025 18:11:08

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix locking in rxrpc's sendmsg Fix three bugs in the rxrpc's sendmsg implementation: (1) rxrpc_new_client_call() should release the socket lock when returning an erro...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2025 11:00:53
  • Zuletzt bearbeitet 14.11.2025 18:12:08

In the Linux kernel, the following vulnerability has been resolved: loop: Check for overflow while configuring loop The userspace can configure a loop using an ioctl call, wherein a configuration of type loop_config is passed (see lo_ioctl()'s case...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:00:51
  • Zuletzt bearbeitet 14.11.2025 18:12:44

In the Linux kernel, the following vulnerability has been resolved: s390: fix double free of GS and RI CBs on fork() failure The pointers for guarded storage and runtime instrumentation control blocks are stored in the thread_struct of the associat...

  • EPSS 0.07%
  • Veröffentlicht 18.06.2025 11:00:50
  • Zuletzt bearbeitet 14.11.2025 18:12:59

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix error exit of privcmd_ioctl_dm_op() The error exit of privcmd_ioctl_dm_op() is calling unlock_pages() potentially with pages being NULL, leading to a NULL derefere...

  • EPSS 0.06%
  • Veröffentlicht 18.06.2025 11:00:48
  • Zuletzt bearbeitet 14.11.2025 18:13:10

In the Linux kernel, the following vulnerability has been resolved: md: call __md_stop_writes in md_stop From the link [1], we can see raid1d was running even after the path raid_dtr -> md_stop -> __md_stop. Let's stop write first in destructor to...

  • EPSS 0.07%
  • Veröffentlicht 18.06.2025 11:00:47
  • Zuletzt bearbeitet 14.11.2025 18:14:04

In the Linux kernel, the following vulnerability has been resolved: bpf: Don't use tnum_range on array range checking for poke descriptors Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which is based on a customized syzkalle...