Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 13.04.2026 13:40:23
  • Zuletzt bearbeitet 07.05.2026 06:16:03

In the Linux kernel, the following vulnerability has been resolved: net: bonding: fix use-after-free in bond_xmit_broadcast() bond_xmit_broadcast() reuses the original skb for the last slave (determined by bond_is_last_slave()) and clones it for ot...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:05
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: drop logically empty buckets in mtype_del mtype_del() counts empty slots below n->pos in k, but it only drops the bucket when both n->pos and k are zero. This mis...

  • EPSS 0.07%
  • Veröffentlicht 13.04.2026 13:21:04
  • Zuletzt bearbeitet 27.04.2026 14:16:37

In the Linux kernel, the following vulnerability has been resolved: net/x25: Fix overflow when accumulating packets Add a check to ensure that `x25_sock.fraglen` does not overflow. The `fraglen` also needs to be resetted when purging `fragment_que...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:03
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid overflows in ip6_datagram_send_ctl() Yiming Qian reported : <quote> I believe I found a locally triggerable kernel bug in the IPv6 sendmsg ancillary-data path that ca...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:03
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size...

  • EPSS 0.08%
  • Veröffentlicht 13.04.2026 13:21:02
  • Zuletzt bearbeitet 27.04.2026 14:16:37

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: use expect->helper Use expect->helper in ctnetlink and /proc to dump the helper name. Using nfct_help() without holding a reference to the master co...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 10:35:05
  • Zuletzt bearbeitet 13.04.2026 15:02:06

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The `check_command_size_in_blocks()` function calculates the data size in bytes by lef...

  • EPSS 0.04%
  • Veröffentlicht 08.04.2026 13:06:17
  • Zuletzt bearbeitet 08.04.2026 21:26:13

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix crash due to unvalidated vcc pointer in sigd_send() Reproducer available at [1]. The ATM send path (sendmsg -> vcc_sendmsg -> sigd_send) reads the vcc pointer from m...

  • EPSS 0.04%
  • Veröffentlicht 06.04.2026 08:16:38
  • Zuletzt bearbeitet 27.04.2026 14:16:36

In the Linux kernel, the following vulnerability has been resolved: media: dvb-net: fix OOB access in ULE extension header tables The ule_mandatory_ext_handlers[] and ule_optional_ext_handlers[] tables in handle_one_ule_extension() are declared wit...

  • EPSS 0.01%
  • Veröffentlicht 06.04.2026 08:16:38
  • Zuletzt bearbeitet 27.04.2026 14:16:36

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: add missing netlink policy validations Hyunwoo Kim reports out-of-bounds access in sctp and ctnetlink. These attributes are used by the kernel without any va...