Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 14.05.2021 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:08:09

In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

  • EPSS 0.15%
  • Veröffentlicht 13.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:53

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

  • EPSS 0.02%
  • Veröffentlicht 12.05.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 05:51:16

Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:03

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when a...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragmen...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 09:16:20

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP...

  • EPSS 2.25%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 09:16:21

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denia...

  • EPSS 0.24%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 09:16:23

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt ...

  • EPSS 1.21%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 09:16:25

An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary ca...

  • EPSS 0.19%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 10:16:18

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragme...