Debian

Debian 11 (bullseye)

8666 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:12
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections A report in 2019 by the syzbot fuzzer was found to be connected to two errors in the HID core a...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ ...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 03.11.2025 20:16:56

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer t...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts If a command is queued to the final usable TRB of a ring segment, the enqueue pointer is advanced to the subsequen...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 11.01.2026 17:15:51

In the Linux kernel, the following vulnerability has been resolved: xfrm: state: fix out-of-bounds read during lookup lookup and resize can run in parallel. The xfrm_state_hash_generation seqlock ensures a retry, but the hash functions can observe...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 24.03.2025 17:48:09

In the Linux kernel, the following vulnerability has been resolved: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition In dw_i3c_common_probe, &master->hj_work is bound with dw_i3c_hj_work. And dw_i3c_master_irq_handler can c...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 03.11.2025 20:16:55

In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_le...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 18:00:26

In the Linux kernel, the following vulnerability has been resolved: udp: Deal with race between UDP socket address change and rehash If a UDP socket changes its local address while it's receiving datagrams, as a result of connect(), there is a peri...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:59:01

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when run_delalloc_nocow() failed [BUG] With CONFIG_DEBUG_VM set, test case generic/476 has some chance to crash with the following VM_BUG_ON_FOLIO():...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:58:15

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when cow_file_range() failed [BUG] When testing with COW fixup marked as BUG_ON() (this is involved with the new pin_user_pages*() change, which shou...