Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 16.12.2021 04:15:06
  • Zuletzt bearbeitet 21.11.2024 06:31:56

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:51

In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed...

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:53

In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for explo...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:54

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Pro...

  • EPSS 0.03%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:54

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitat...

Warnung
  • EPSS 0.91%
  • Veröffentlicht 15.12.2021 19:15:14
  • Zuletzt bearbeitet 23.10.2025 14:53:12

In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation....

Warnung
  • EPSS 0.91%
  • Veröffentlicht 15.12.2021 19:15:11
  • Zuletzt bearbeitet 23.10.2025 14:53:26

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: Androi...

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:43:15

In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ...

  • EPSS 0.16%
  • Veröffentlicht 08.12.2021 05:15:07
  • Zuletzt bearbeitet 21.11.2024 04:03:22

The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/...

  • EPSS 0.07%
  • Veröffentlicht 17.11.2021 20:15:10
  • Zuletzt bearbeitet 21.11.2024 06:08:17

Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.