Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:34
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix a memory leak with reused mmap_offset drm_vma_node_allow() and drm_vma_node_revoke() should be called in balanced pairs. We call drm_vma_node_allow() once per-file ev...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:33
  • Zuletzt bearbeitet 30.10.2025 16:40:17

In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:32
  • Zuletzt bearbeitet 01.04.2025 15:39:31

In the Linux kernel, the following vulnerability has been resolved: net: fix UaF in netns ops registration error path If net_assign_generic() fails, the current error path in ops_init() tries to clear the gen pointer slot. Anyway, in such error pat...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:31
  • Zuletzt bearbeitet 30.10.2025 16:40:23

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:30
  • Zuletzt bearbeitet 30.10.2025 16:40:28

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->m...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:28
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL Baoquan reported that after triggering a crash the subsequent crash-kernel fails to boot about half of the time. It triggers a ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:27
  • Zuletzt bearbeitet 29.10.2025 17:00:21

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself,...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:26
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: net: fix NULL pointer in skb_segment_list Commit 3a1296a38d0c ("net: Support GRO/GSO fraglist chaining.") introduced UDP listifyed GRO. The segmentation relies on frag_list being u...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:25
  • Zuletzt bearbeitet 01.10.2025 18:15:35

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() snd_hda_get_connections() can return a negative error code. It may lead to accessing 'conn' array at a ne...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:25
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region This patch is fix for Linux kernel v2.6.33 or later. For request subaction to IEC 61883-1 FCP ...