Debian

Debian 12 (bookworm)

11230 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 15.05.2023 22:15:11
  • Zuletzt bearbeitet 24.01.2025 18:15:30

In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product:...

  • EPSS 0.08%
  • Veröffentlicht 10.05.2023 14:15:33
  • Zuletzt bearbeitet 21.11.2024 07:55:00

Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

  • EPSS 2.09%
  • Veröffentlicht 09.05.2023 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:02

A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthentic...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2023 21:15:11
  • Zuletzt bearbeitet 23.04.2025 17:16:29

A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.

  • EPSS 0.72%
  • Veröffentlicht 08.05.2023 20:15:20
  • Zuletzt bearbeitet 05.05.2025 16:15:39

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs ...

  • EPSS 0.01%
  • Veröffentlicht 05.05.2023 17:15:09
  • Zuletzt bearbeitet 05.05.2025 16:15:40

An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the syste...

  • EPSS 0.02%
  • Veröffentlicht 01.05.2023 13:15:44
  • Zuletzt bearbeitet 21.11.2024 07:58:12

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups()...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 01.05.2023 13:15:44
  • Zuletzt bearbeitet 13.02.2025 17:16:20

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which lea...

  • EPSS 0.04%
  • Veröffentlicht 28.04.2023 02:15:09
  • Zuletzt bearbeitet 21.11.2024 08:01:51

qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.

  • EPSS 0.14%
  • Veröffentlicht 26.04.2023 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:37:13

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend ...