Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:12
  • Zuletzt bearbeitet 10.11.2025 17:38:24

In the Linux kernel, the following vulnerability has been resolved: ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() ila_xlat_nl_cmd_get_mapping() generates an empty skb, triggerring a recent sanity check [1]. Instead, return a...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:11
  • Zuletzt bearbeitet 10.11.2025 17:38:51

In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties devm_kmalloc_array may fails, *fw_vsc_cfg might be null and cause out-of-bounds write in device...

  • EPSS 0.09%
  • Veröffentlicht 02.05.2025 15:56:11
  • Zuletzt bearbeitet 10.11.2025 17:38:38

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:10
  • Zuletzt bearbeitet 10.11.2025 17:39:03

In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:08
  • Zuletzt bearbeitet 10.11.2025 17:39:31

In the Linux kernel, the following vulnerability has been resolved: riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode When CONFIG_FRAME_POINTER is unset, the stack unwinding function walk_stackframe randomly reads the stack and then, w...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:07
  • Zuletzt bearbeitet 10.11.2025 17:39:47

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Avoid order-5 memory allocation for TPA data The driver needs to keep track of all the possible concurrent TPA (GRO/LRO) completions on the aggregation ring. On P5 chips,...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:06
  • Zuletzt bearbeitet 10.11.2025 17:40:00

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() When the buffer length of the recvmsg system call is 0, we got the flollowing soft lockup problem...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:05
  • Zuletzt bearbeitet 10.11.2025 17:40:30

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix a server shutdown leak Fix a race where kthread_stop() may prevent the threadfn from ever getting called. If that happens the svc_rqst will not be cleaned up.

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:01
  • Zuletzt bearbeitet 10.11.2025 17:46:06

In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:00
  • Zuletzt bearbeitet 10.11.2025 17:49:51

In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expan...