Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 21.11.2024 09:27:46

In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the co...

  • EPSS 0.02%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: bcache: fix variable length array abuse in btree_iter btree_iter is used in two ways: either allocated on the stack with a fixed size MAX_BSETS, or from a mempool with a dynamic si...

  • EPSS 0.03%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 03.11.2025 22:17:04

In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 05.07.2024 02:15:09
  • Zuletzt bearbeitet 04.11.2025 18:15:49

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.

  • EPSS 0.11%
  • Veröffentlicht 27.06.2024 23:15:50
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.

  • EPSS 0.01%
  • Veröffentlicht 25.06.2024 15:15:15
  • Zuletzt bearbeitet 17.09.2025 16:07:38

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() syzbot reports a kernel bug as below: F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4 =============...

  • EPSS 0.01%
  • Veröffentlicht 25.06.2024 15:15:15
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix deadlock in smb2_find_smb_tcon() Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such deadlock.

  • EPSS 0.03%
  • Veröffentlicht 25.06.2024 15:15:15
  • Zuletzt bearbeitet 03.11.2025 22:17:03

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext...

  • EPSS 0.01%
  • Veröffentlicht 25.06.2024 15:15:15
  • Zuletzt bearbeitet 21.11.2024 09:27:44

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should be stop to avoid out-of-bounds read, so directly return -EINVA...

  • EPSS 0.03%
  • Veröffentlicht 25.06.2024 15:15:14
  • Zuletzt bearbeitet 21.11.2024 09:27:25

In the Linux kernel, the following vulnerability has been resolved: net/9p: fix uninit-value in p9_client_rpc() Syzbot with the help of KMSAN reported the following error: BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:1...