Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 04.06.2021 02:15:07
  • Zuletzt bearbeitet 21.11.2024 06:21:40

The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow lea...

  • EPSS 0.05%
  • Veröffentlicht 02.06.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 04:55:58

A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat fro...

  • EPSS 0.1%
  • Veröffentlicht 01.06.2021 14:15:10
  • Zuletzt bearbeitet 21.11.2024 06:21:48

A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privil...

  • EPSS 0.08%
  • Veröffentlicht 28.05.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:11

A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentialit...

  • EPSS 0.11%
  • Veröffentlicht 28.05.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:17

There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to per...

  • EPSS 0.03%
  • Veröffentlicht 27.05.2021 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:08:30

kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege esca...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 27.05.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 00:47:07

Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.

  • EPSS 0.01%
  • Veröffentlicht 26.05.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:04

A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is aff...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 26.05.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:51

A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerabil...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 26.05.2021 12:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:24

A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.