Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 24.06.2024 14:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:30

In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that ...

  • EPSS 0.03%
  • Veröffentlicht 24.06.2024 14:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:35

In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: don't allow unaligned truncation on released compress inode f2fs image may be corrupted after below testcase: - mkfs.f2fs -O extra_attr,compression -f /dev/vdb - mo...

  • EPSS 0.02%
  • Veröffentlicht 24.06.2024 14:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:35

In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock It needs to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock to avoid racing with checkp...

  • EPSS 0.04%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule v...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spin_unlock_ir...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 12:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:48

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe w...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Update uart_driver_registered on driver removal The removal of the last MAX3100 device triggers the removal of the driver. However, code doesn't update the respect...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Lock port->lock when calling uart_handle_cts_change() uart_handle_cts_change() has to be called with port lock taken, Since we run it in a separate work, the lock ...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 12.05.2026 12:16:55

In the Linux kernel, the following vulnerability has been resolved: soundwire: cadence: fix invalid PDI offset For some reason, we add an offset to the PDI, presumably to skip the PDI0 and PDI1 which are reserved for BPT. This code is however comp...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: greybus: lights: check return of get_channel_from_mode If channel for the given node is not found we return null from get_channel_from_mode. Make sure we validate the return pointe...