Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.05.2021 22:15:06
  • Zuletzt bearbeitet 21.11.2024 06:06:59

net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.05.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:22:57

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still ...

  • EPSS 0.11%
  • Veröffentlicht 06.05.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:06:30

An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gai...

  • EPSS 0.08%
  • Veröffentlicht 06.05.2021 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:18

kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against ...

  • EPSS 0.11%
  • Veröffentlicht 06.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:27:29

An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leadin...

  • EPSS 0.04%
  • Veröffentlicht 06.05.2021 13:15:12
  • Zuletzt bearbeitet 21.11.2024 06:21:41

A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat f...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 22.04.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:16

A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr...

  • EPSS 0.21%
  • Veröffentlicht 20.04.2021 16:15:10
  • Zuletzt bearbeitet 21.11.2024 06:00:47

An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information f...

  • EPSS 0.14%
  • Veröffentlicht 19.04.2021 22:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:42

An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system cras...

Warnung Medienbericht Exploit
  • EPSS 76.89%
  • Veröffentlicht 17.04.2021 05:15:14
  • Zuletzt bearbeitet 28.10.2025 13:49:50

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a pat...