Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 17.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:30:07

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

  • EPSS 0.05%
  • Veröffentlicht 17.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:30:07

In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).

Exploit
  • EPSS 0.01%
  • Veröffentlicht 04.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:08

An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.

  • EPSS 0.02%
  • Veröffentlicht 03.11.2021 00:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:52

A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).

Exploit
  • EPSS 72.62%
  • Veröffentlicht 02.11.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:28:57

An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO mes...

  • EPSS 1.71%
  • Veröffentlicht 02.11.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 03:27:06

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

  • EPSS 0.02%
  • Veröffentlicht 28.10.2021 04:15:08
  • Zuletzt bearbeitet 21.11.2024 06:28:36

An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the...

  • EPSS 0.02%
  • Veröffentlicht 25.10.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:43:16

In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe...

  • EPSS 0.04%
  • Veröffentlicht 25.10.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:43:16

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for expl...

  • EPSS 0.06%
  • Veröffentlicht 25.10.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:43:16

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: And...