Debian

Debian Linux

9947 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 13.02.2025 18:15:46

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. ...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 20.03.2025 16:59:51

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:14

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() c...

  • EPSS 0.07%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new in...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage colle...

  • EPSS 0.05%
  • Veröffentlicht 06.09.2023 14:15:10
  • Zuletzt bearbeitet 20.03.2025 17:00:02

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain'...

  • EPSS 0.37%
  • Veröffentlicht 05.09.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 08:35:55

Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

Warnung
  • EPSS 63.59%
  • Veröffentlicht 05.09.2023 22:15:09
  • Zuletzt bearbeitet 24.10.2025 14:07:33

Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)