Debian

Debian 11 (bullseye)

8660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 08.01.2025 17:43:50

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid touching checkpointed data in get_victim() In CP disabling mode, there are two issues when using LFS or SSR | AT_SSR mode to select victim: 1. LFS is set to fin...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 09.12.2024 18:23:57

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix NULL pointer dereference for ->get_features() get_features ops of pci_epc_ops may return NULL, causing NULL pointer dereference in pci_epf_test_alloc_space funct...

  • EPSS 0.01%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 19.03.2025 10:49:05

In the Linux kernel, the following vulnerability has been resolved: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook The commit 1879445dfa7b ("perf/core: Set event's default ::overflow_handler()") set a default ev...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 08.01.2025 17:58:51

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix panic during f2fs_resize_fs() f2fs_resize_fs() hangs in below callstack with testcase: - mkfs 16GB image & mount image - dd 8GB fileA - dd 8GB fileB - sync - rm fileA - s...

  • EPSS 0.03%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 09.12.2024 18:24:16

In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix memory leak on object td Two error return paths are neglecting to free allocated object td, causing a memory leak. Fix this by returning via the error return pat...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 19.03.2025 15:30:02

In the Linux kernel, the following vulnerability has been resolved: net: Only allow init netns to set default tcp cong to a restricted algo tcp_set_default_congestion_control() is netns-safe in that it writes to &net->ipv4.tcp_congestion_control, b...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 08.01.2025 18:02:38

In the Linux kernel, the following vulnerability has been resolved: mm: memcontrol: slab: fix obtain a reference to a freeing memcg Patch series "Use obj_cgroup APIs to charge kmem pages", v5. Since Roman's series "The new cgroup slab memory contr...

  • EPSS 0.04%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 09.12.2024 18:24:59

In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix a use after free in siw_alloc_mr Our code analyzer reported a UAF. In siw_alloc_mr(), it calls siw_mr_add_mem(mr,..). In the implementation of siw_mr_add_mem(), mem ...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 09.12.2024 17:59:07

In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..). If some error happens in emac_tx_fill_tpd(), the skb ...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 09:15:38
  • Zuletzt bearbeitet 08.01.2025 18:08:16

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix wild memory access when clearing fragments while testing re-assembly/re-fragmentation using act_ct, it's possible to observe a crash like the following one: ...