Debian

Debian 12 (bookworm)

11230 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.10.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:35:51

A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.

  • EPSS 0.03%
  • Veröffentlicht 03.10.2023 03:15:09
  • Zuletzt bearbeitet 20.03.2025 16:59:45

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which ...

Exploit
  • EPSS 15.85%
  • Veröffentlicht 29.09.2023 06:15:11
  • Zuletzt bearbeitet 23.05.2025 20:49:33

An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted...

Exploit
  • EPSS 0%
  • Veröffentlicht 28.09.2023 14:15:21
  • Zuletzt bearbeitet 21.11.2024 08:23:06

A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash...

  • EPSS 0.06%
  • Veröffentlicht 27.09.2023 15:19:43
  • Zuletzt bearbeitet 11.12.2025 15:37:45

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free....

Exploit
  • EPSS 0.01%
  • Veröffentlicht 25.09.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 08:23:06

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory...

  • EPSS 0.01%
  • Veröffentlicht 25.09.2023 16:15:15
  • Zuletzt bearbeitet 21.11.2024 08:41:12

A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.

  • EPSS 0.01%
  • Veröffentlicht 22.09.2023 14:15:45
  • Zuletzt bearbeitet 04.11.2025 20:16:29

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...

  • EPSS 0.2%
  • Veröffentlicht 20.09.2023 06:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:03

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • EPSS 0.01%
  • Veröffentlicht 18.09.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 05:30:15

An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.