Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:46
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() This patch fixes an out-of-bounds access in ceph_handle_auth_reply() that can be triggered by a message of t...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:46
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in process_message_header() If the message frame is (maliciously) corrupted in a way that the length of the control segment ends up b...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:45
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: libceph: Use u32 for non-negative values in ceph_monmap_decode() This patch fixes unnecessary implicit conversions that change signedness of blob_len and num_mon in ceph_monmap_dec...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:42
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in signal ioctl Huge input values in amdgpu_userq_signal_ioctl can lead to a OOM and could be exploited. So check these input valu...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 14:21:40
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound check on user inputs in wait ioctl Huge input values in amdgpu_userq_wait_ioctl can lead to a OOM and could be exploited. So check these input value ag...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:33
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() Just like in commit 154828bf9559 ("staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser"), we don't t...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:32
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie The current code checks 'i + 5 < in_len' at the end of the if statement. However, it accesses 'in_ie[i +...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2026 14:21:30
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: net/tcp-md5: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:30
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid double-rtnl_lock ELP metric worker batadv_v_elp_get_throughput() might be called when the RTNL lock is already held. This could be problematic when the work queue...

  • EPSS 0.03%
  • Veröffentlicht 08.05.2026 14:21:29
  • Zuletzt bearbeitet 12.05.2026 14:10:27

In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for aux xfer if the device is asleep If we have runtime suspended, and userspace wants to use /dev/drm_dp_* then just tell it the device is busy instead ...