Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 17.02.2021 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:59:34

Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.

  • EPSS 0.14%
  • Veröffentlicht 17.02.2021 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:59:35

Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.

  • EPSS 0.15%
  • Veröffentlicht 17.02.2021 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:59:35

Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.

  • EPSS 0.19%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to ...

  • EPSS 0.13%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 4.18 through 5.10.16, as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration, but this wasn't stated accordingly in its support...

  • EPSS 0.07%
  • Veröffentlicht 17.02.2021 02:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of g...

  • EPSS 0.08%
  • Veröffentlicht 17.02.2021 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error enco...

  • EPSS 0.06%
  • Veröffentlicht 10.02.2021 20:15:15
  • Zuletzt bearbeitet 21.11.2024 05:06:48

Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...

  • EPSS 0.94%
  • Veröffentlicht 05.02.2021 14:15:18
  • Zuletzt bearbeitet 21.11.2024 05:56:42

A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the com...

  • EPSS 4.47%
  • Veröffentlicht 02.02.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:14:54

Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.