Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 22.07.2022 10:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:46

io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference c...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 21.07.2022 04:15:10
  • Zuletzt bearbeitet 21.11.2024 05:29:49

A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.

  • EPSS 0.02%
  • Veröffentlicht 21.07.2022 04:15:09
  • Zuletzt bearbeitet 21.11.2024 05:29:49

A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.

  • EPSS 0.03%
  • Veröffentlicht 18.07.2022 15:15:08
  • Zuletzt bearbeitet 02.04.2025 18:33:53

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.

  • EPSS 0.02%
  • Veröffentlicht 18.07.2022 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:09:17

When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

  • EPSS 0.05%
  • Veröffentlicht 14.07.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:36:58

A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthori...

  • EPSS 0.11%
  • Veröffentlicht 13.07.2022 19:15:09
  • Zuletzt bearbeitet 23.04.2025 18:15:48

The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.07.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 01:33:17

Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /dev/pts/ and /dev/tty*.

  • EPSS 1.41%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:55

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • EPSS 0.07%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:56

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve ...