Debian

Debian 11 (bullseye)

8666 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 19:01:47

In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish usin...

  • EPSS 0.12%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 19:09:30

In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is n...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:29:23

In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ==============================================...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:31:54

In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:36:13

In the Linux kernel, the following vulnerability has been resolved: tipc: re-fetch skb cb after tipc_msg_validate As the call trace shows, the original skb was freed in tipc_msg_validate(), and dereferencing the old skb cb would cause an use-after-...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 19:36:33

In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't ...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 15:51:38

In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 13:52:43

In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated agai...

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 15:52:51

In the Linux kernel, the following vulnerability has been resolved: Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() There is a kmemleak when test the raydium_i2c_ts with bpf mock device: unreferenced object 0xffff88812d3675a0 (size...

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 17:07:08

In the Linux kernel, the following vulnerability has been resolved: char: tpm: Protect tpm_pm_suspend with locks Currently tpm transactions are executed unconditionally in tpm_pm_suspend() function, which may lead to races with other tpm accessors ...