Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:19

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking fo...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:20

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 20.12.2024 14:30:24

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured b...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 27.03.2025 21:36:57

In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:33

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...

  • EPSS 0.02%
  • Veröffentlicht 04.04.2024 10:15:09
  • Zuletzt bearbeitet 19.03.2025 16:19:56

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise i...

  • EPSS 0.01%
  • Veröffentlicht 04.04.2024 10:15:08
  • Zuletzt bearbeitet 04.04.2025 14:21:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER event is reported, otherwise...

  • EPSS 0.03%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 20.12.2024 15:52:36

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mecha...

  • EPSS 0.35%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 21.03.2025 14:58:15

In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector....

  • EPSS 0.01%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 27.02.2025 14:35:09

In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the ...