Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.25%
  • Veröffentlicht 17.12.2019 06:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:26

In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner...

Exploit
  • EPSS 0.7%
  • Veröffentlicht 17.12.2019 06:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:26

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

Exploit
  • EPSS 1.15%
  • Veröffentlicht 17.12.2019 06:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:26

In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandl...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 15.12.2019 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:35:26

In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 12.12.2019 20:15:17
  • Zuletzt bearbeitet 21.11.2024 04:35:20

The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.

  • EPSS 1.4%
  • Veröffentlicht 12.12.2019 20:15:17
  • Zuletzt bearbeitet 21.11.2024 04:35:20

In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).

  • EPSS 0.31%
  • Veröffentlicht 12.12.2019 20:15:17
  • Zuletzt bearbeitet 21.11.2024 04:35:20

In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).

Exploit
  • EPSS 1.12%
  • Veröffentlicht 12.12.2019 20:15:17
  • Zuletzt bearbeitet 21.11.2024 04:35:21

In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as deb...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 08.12.2019 02:15:09
  • Zuletzt bearbeitet 21.11.2024 04:34:45

In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 08.12.2019 02:15:09
  • Zuletzt bearbeitet 21.11.2024 04:34:45

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get...