Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:47
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: l2tp: close all race conditions in l2tp_tunnel_register() The code in l2tp_tunnel_register() is racy in several ways: 1. It modifies the tunnel socket _after_ publishing it. 2. I...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:47
  • Zuletzt bearbeitet 01.04.2025 15:40:10

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: fix possible use-after-free syzbot reported a nasty crash [1] in net_tx_action() which made little sense until we got a repro. This repro installs a taprio ...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:46
  • Zuletzt bearbeitet 30.10.2025 16:20:36

In the Linux kernel, the following vulnerability has been resolved: net: mdio: validate parameter addr in mdiobus_get_phy() The caller may pass any value as addr, what may result in an out-of-bounds access to array mdio_map. One existing case is st...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:43
  • Zuletzt bearbeitet 01.10.2025 18:15:35

In the Linux kernel, the following vulnerability has been resolved: HID: betop: check shape of output reports betopff_init() only checks the total sum of the report counts for each report field to be at least 4, but hid_betopff_play() expects 4 rep...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:40
  • Zuletzt bearbeitet 30.10.2025 16:20:51

In the Linux kernel, the following vulnerability has been resolved: bnxt: Do not read past the end of test names Test names were being concatenated based on a offset beyond the end of the first name, which tripped the buffer overflow detection logi...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:38
  • Zuletzt bearbeitet 30.10.2025 16:24:07

In the Linux kernel, the following vulnerability has been resolved: tracing: Make sure trace_printk() can output as soon as it can be used Currently trace_printk() can be used as soon as early_trace_init() is called from start_kernel(). But if a cr...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:38
  • Zuletzt bearbeitet 01.10.2025 21:15:43

In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential memory leaks in session setup Make sure to free cifs_ses::auth_key.response before allocating it as we might end up leaking memory in reconnect or mounting.

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:37
  • Zuletzt bearbeitet 30.10.2025 16:24:48

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix oops due to uncleared server->smbd_conn in reconnect In smbd_destroy(), clear the server->smbd_conn pointer after freeing the smbd_connection struct that it points to so ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:36
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: trace_events_hist: add check for return value of 'create_hist_field' Function 'create_hist_field' is called recursively at trace_events_hist.c:1954 and can return NULL-value that's...

  • EPSS 0.27%
  • Veröffentlicht 27.03.2025 16:43:35
  • Zuletzt bearbeitet 01.04.2025 15:39:21

In the Linux kernel, the following vulnerability has been resolved: EDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info The memory for llcc_driv_data is allocated by the LLCC driver. But when it is passed as the private driver ...