Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:28
  • Zuletzt bearbeitet 12.11.2025 20:49:15

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix steering rules cleanup vport's mc, uc and multicast rules are not deleted in teardown path when EEH happens. Since the vport's promisc settings(uc, mc and all) in fir...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:27
  • Zuletzt bearbeitet 12.11.2025 20:49:36

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes [WHY] When PTEBufferSizeInRequests is zero, UBSAN reports the following warning because dml_log2 returns an unexp...

  • EPSS 0.09%
  • Veröffentlicht 02.05.2025 15:55:26
  • Zuletzt bearbeitet 12.11.2025 20:49:42

In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix invalid address access in lookup_rec() when index is 0 KASAN reported follow problem: BUG: KASAN: use-after-free in lookup_rec Read of size 8 at addr ffff000199270ff...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:25
  • Zuletzt bearbeitet 12.11.2025 20:50:15

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini The call trace occurs when the amdgpu is removed after the mode1 reset. During mode1 reset, from suspend to resume, there is...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:23
  • Zuletzt bearbeitet 12.11.2025 20:50:40

In the Linux kernel, the following vulnerability has been resolved: mptcp: use the workqueue to destroy unaccepted sockets Christoph reported a UaF at token lookup time after having refactored the passive socket initialization part: BUG: KASAN: ...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:21
  • Zuletzt bearbeitet 12.11.2025 20:51:51

In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:19
  • Zuletzt bearbeitet 12.11.2025 19:47:44

In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification C...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:18
  • Zuletzt bearbeitet 12.11.2025 19:56:49

In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output syzkaller reportes a KASAN issue with stack-out-of-bounds. The call trace is as follows: ...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:16
  • Zuletzt bearbeitet 07.11.2025 02:23:30

In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc95xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed u...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:14
  • Zuletzt bearbeitet 07.11.2025 16:32:03

In the Linux kernel, the following vulnerability has been resolved: igb: revert rtnl_lock() that causes deadlock The commit 6faee3d4ee8b ("igb: Add lock to avoid data race") adds rtnl_lock to eliminate a false data race shown below (FREE from dev...