Debian

Debian 11 (bullseye)

8666 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:23
  • Zuletzt bearbeitet 06.10.2025 17:38:15

In the Linux kernel, the following vulnerability has been resolved: net/smc: initialize close_work early to avoid warning We encountered a warning that close_work was canceled before initialization. WARNING: CPU: 7 PID: 111103 at kernel/workqueu...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:23
  • Zuletzt bearbeitet 03.11.2025 21:18:12

In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller reported a use-after-free of UDP kernel socket in cleanup_bearer() without repro. [0][1] When bearer_disab...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:22
  • Zuletzt bearbeitet 03.11.2025 21:18:10

In the Linux kernel, the following vulnerability has been resolved: HID: wacom: fix when get product name maybe null pointer Due to incorrect dev->product reporting by certain devices, null pointer dereferences occur when dev->product is empty, lea...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:22
  • Zuletzt bearbeitet 03.11.2025 21:18:10

In the Linux kernel, the following vulnerability has been resolved: ocfs2: free inode when ocfs2_get_init_inode() fails syzbot is reporting busy inodes after unmount, for commit 9c89fe0af826 ("ocfs2: Handle error from dquot_initialize()") forgot to...

  • EPSS 0.02%
  • Veröffentlicht 27.12.2024 15:15:22
  • Zuletzt bearbeitet 12.05.2026 13:16:22

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Fix slab-use-after-free read in sg_release() Fix a use-after-free bug in sg_release(), detected by syzbot with KASAN: BUG: KASAN: slab-use-after-free in lock_release+0x1...

  • EPSS 0.02%
  • Veröffentlicht 27.12.2024 15:15:22
  • Zuletzt bearbeitet 03.11.2025 21:18:11

In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging tosend bytes, which is either msg->sg.size or a ...

  • EPSS 0.03%
  • Veröffentlicht 27.12.2024 15:15:21
  • Zuletzt bearbeitet 03.11.2025 21:18:08

In the Linux kernel, the following vulnerability has been resolved: bpf: fix OOB devmap writes when deleting elements Jordy reported issue against XSKMAP which also applies to DEVMAP - the index used for accessing map entry, due to being a signed i...

  • EPSS 0.02%
  • Veröffentlicht 27.12.2024 15:15:21
  • Zuletzt bearbeitet 03.11.2025 21:18:08

In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix MST sideband message body length check Fix the MST sideband message body length check, which must be at least 1 byte accounting for the message body CRC (aka messag...

  • EPSS 0.03%
  • Veröffentlicht 27.12.2024 15:15:21
  • Zuletzt bearbeitet 03.11.2025 21:18:09

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() Syzbot reported that when searching for records in a directory where the inode's i_size is corrupted and has...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:21
  • Zuletzt bearbeitet 03.11.2025 21:18:09

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload System crash is observed with stack trace warning of use after free. There are 2 signals to tell dpc_thread to terminate (UNLOADING flag...