Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 31.01.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:41:59

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.1...

  • EPSS 0.09%
  • Veröffentlicht 29.01.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:38:50

fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may...

  • EPSS 4.5%
  • Veröffentlicht 17.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:27:02

Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.

Exploit
  • EPSS 2.93%
  • Veröffentlicht 16.01.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an h...

  • EPSS 0.51%
  • Veröffentlicht 16.01.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will c...

  • EPSS 0.68%
  • Veröffentlicht 16.01.2020 16:15:16
  • Zuletzt bearbeitet 21.11.2024 04:32:58

The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and beca...

  • EPSS 0.08%
  • Veröffentlicht 14.01.2020 21:15:16
  • Zuletzt bearbeitet 21.11.2024 05:36:34

In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is relate...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.01.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:34:35

An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A us...

  • EPSS 0.12%
  • Veröffentlicht 08.01.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:52:44

In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privilege...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 31.12.2019 02:15:10
  • Zuletzt bearbeitet 21.11.2024 04:35:41

In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_pa...