Debian

Debian 11 (bullseye)

8666 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 05.11.2024 17:15:06
  • Zuletzt bearbeitet 12.05.2026 13:16:17

In the Linux kernel, the following vulnerability has been resolved: RDMA/mad: Improve handling of timed out WRs of mad agent Current timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locki...

  • EPSS 0.01%
  • Veröffentlicht 05.11.2024 17:15:06
  • Zuletzt bearbeitet 03.11.2025 23:16:50

In the Linux kernel, the following vulnerability has been resolved: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error The `nouveau_dmem_copy_one` function ensures that the copy push command is sent to the device firmware but does no...

  • EPSS 0.02%
  • Veröffentlicht 05.11.2024 10:15:24
  • Zuletzt bearbeitet 17.05.2026 16:16:13

In the Linux kernel, the following vulnerability has been resolved: bpf: support non-r10 register spill/fill to/from stack in precision tracking Use instruction (jump) history to record instructions that performed register spill/fill to/from stack,...

  • EPSS 0.01%
  • Veröffentlicht 29.10.2024 01:15:05
  • Zuletzt bearbeitet 03.11.2025 23:16:48

In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race We're seeing crashes from rq_qos_wake_function that look like this: BUG: unable to handle page fault for addre...

  • EPSS 0.1%
  • Veröffentlicht 29.10.2024 01:15:05
  • Zuletzt bearbeitet 03.11.2025 23:16:48

In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Send...

  • EPSS 0.02%
  • Veröffentlicht 29.10.2024 01:15:04
  • Zuletzt bearbeitet 03.11.2025 23:16:46

In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand Robert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call: general protection faul...

  • EPSS 0.02%
  • Veröffentlicht 29.10.2024 01:15:04
  • Zuletzt bearbeitet 03.11.2025 23:16:47

In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() retu...

  • EPSS 0.13%
  • Veröffentlicht 29.10.2024 01:15:04
  • Zuletzt bearbeitet 08.11.2024 16:15:45

In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get. This may cause info-leak, s...

  • EPSS 0.03%
  • Veröffentlicht 28.10.2024 01:15:02
  • Zuletzt bearbeitet 03.11.2025 23:16:46

In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic context problem. Somet...

  • EPSS 0.01%
  • Veröffentlicht 22.10.2024 08:15:02
  • Zuletzt bearbeitet 03.11.2025 22:16:32

In the Linux kernel, the following vulnerability has been resolved: media: pci: cx23885: check cx23885_vdev_init() return cx23885_vdev_init() can return a NULL pointer, but that pointer is used in the next line without a check. Add a NULL pointer ...