Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 01.02.2021 04:15:14
  • Zuletzt bearbeitet 21.11.2024 06:21:21

nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 29.01.2021 17:15:12
  • Zuletzt bearbeitet 25.02.2026 18:16:53

An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

  • EPSS 0.32%
  • Veröffentlicht 26.01.2021 18:15:54
  • Zuletzt bearbeitet 21.11.2024 05:27:28

A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other p...

  • EPSS 0.18%
  • Veröffentlicht 19.01.2021 07:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:04

fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirecto...

  • EPSS 0.09%
  • Veröffentlicht 14.01.2021 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:47

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...

  • EPSS 0.31%
  • Veröffentlicht 13.01.2021 04:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:41

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c938...

  • EPSS 0.03%
  • Veröffentlicht 11.01.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:42:32

In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Ve...

  • EPSS 0.07%
  • Veröffentlicht 07.01.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:54

A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.

  • EPSS 0.58%
  • Veröffentlicht 05.01.2021 05:15:10
  • Zuletzt bearbeitet 21.11.2024 05:28:50

mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.

  • EPSS 0.03%
  • Veröffentlicht 15.12.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:20:44

In xfrm6_tunnel_free_spi of net/ipv6/xfrm6_tunnel.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation...