Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 27.02.2025 03:20:09

In the Linux kernel, the following vulnerability has been resolved: xen-netback: take a reference to the RX task thread Do this in order to prevent the task from being freed if the thread returns (which can be triggered by the frontend) before the ...

  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 13.03.2025 19:36:08

In the Linux kernel, the following vulnerability has been resolved: x86/kvm: Teardown PV features on boot CPU as well Various PV features (Async PF, PV EOI, steal time) work through memory shared with hypervisor and when we restore from hibernation...

  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 13.03.2025 19:36:00

In the Linux kernel, the following vulnerability has been resolved: btrfs: abort in rename_exchange if we fail to insert the second ref Error injection stress uncovered a problem where we'd leave a dangling inode ref if we failed during a rename_ex...

  • EPSS 0.01%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 04.04.2025 14:39:41

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption by fallocate When fallocate punches holes out of inode size, if original isize is in the middle of last cluster, then the part from isize to the end of t...

  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 07.01.2025 17:31:32

In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_mb_init_backend on error path. Fix a memory leak discovered by syzbot when a file system is corrupted with an illegally large s_log_groups_per_flex.

  • EPSS 0.01%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 27.02.2025 03:20:09

In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed We got follow bug_on when run fsstress with injecting IO fault: [130747.323114] kernel BUG at fs/ext4/extent...

  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 21:15:06
  • Zuletzt bearbeitet 27.02.2025 03:20:09

In the Linux kernel, the following vulnerability has been resolved: pid: take a reference when initializing `cad_pid` During boot, kernel_init_freeable() initializes `cad_pid` to the init task's struct pid. Later on, we may change `cad_pid` via a ...

  • EPSS 0.9%
  • Veröffentlicht 15.03.2024 18:15:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...

  • EPSS 0.04%
  • Veröffentlicht 14.03.2024 17:15:50
  • Zuletzt bearbeitet 12.05.2026 11:16:12

Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.01%
  • Veröffentlicht 13.03.2024 14:15:07
  • Zuletzt bearbeitet 25.02.2025 18:52:37

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Check mailbox/SMT channel for consistency On reception of a completion interrupt the shared memory area is accessed to retrieve the message header at first and ...