Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 08.05.2025 06:26:06
  • Zuletzt bearbeitet 10.11.2025 17:32:35

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix kmemleak warning for percpu hashmap Vlad Poenaru reported the following kmemleak issue: unreferenced object 0x606fd7c44ac8 (size 32): backtrace (crc 0): pcpu_...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2025 06:26:06
  • Zuletzt bearbeitet 10.11.2025 17:31:43

In the Linux kernel, the following vulnerability has been resolved: crypto: null - Use spin lock instead of mutex As the null algorithm may be freed in softirq context through af_alg, use spin locks instead of mutexes to protect the default null al...

  • EPSS 0.05%
  • Veröffentlicht 08.05.2025 06:26:03
  • Zuletzt bearbeitet 03.11.2025 20:18:36

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

  • EPSS 0.05%
  • Veröffentlicht 08.05.2025 06:26:01
  • Zuletzt bearbeitet 05.06.2025 14:32:50

In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential NULL pointer dereference in dev_uevent() If userspace reads "uevent" device attribute at the same time as another threads unbinds the device from its dri...

  • EPSS 0.06%
  • Veröffentlicht 07.05.2025 13:17:33
  • Zuletzt bearbeitet 10.11.2025 17:34:55

In the Linux kernel, the following vulnerability has been resolved: net_sched: keep alloc_hash updated after hash allocation In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex") I moved cp->hash calculation before the first tcinde...

  • EPSS 0.06%
  • Veröffentlicht 05.05.2025 14:53:34
  • Zuletzt bearbeitet 10.11.2025 17:35:27

In the Linux kernel, the following vulnerability has been resolved: bpf: consider that tail calls invalidate packet pointers Tail-called programs could execute any of the helpers that invalidate packet pointers. Hence, conservatively assume that ea...

  • EPSS 0.05%
  • Veröffentlicht 05.05.2025 14:53:33
  • Zuletzt bearbeitet 10.11.2025 17:35:41

In the Linux kernel, the following vulnerability has been resolved: bpf: check changes_pkt_data property for extension programs When processing calls to global sub-programs, verifier decides whether to invalidate all packet pointers in current stat...

  • EPSS 0.05%
  • Veröffentlicht 05.05.2025 14:53:32
  • Zuletzt bearbeitet 10.11.2025 17:35:57

In the Linux kernel, the following vulnerability has been resolved: bpf: track changes_pkt_data property for global functions When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consid...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 21:52:09
  • Zuletzt bearbeitet 10.11.2025 17:37:14

In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:13
  • Zuletzt bearbeitet 10.11.2025 17:37:57

In the Linux kernel, the following vulnerability has been resolved: ext4: fix another off-by-one fsmap error on 1k block filesystems Apparently syzbot figured out that issuing this FSMAP call: struct fsmap_head cmd = { .fmh_count = ...; .fmh_key...