Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.28%
  • Veröffentlicht 22.12.2021 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:28

A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.

  • EPSS 0.12%
  • Veröffentlicht 16.12.2021 05:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:57

The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2021 04:15:06
  • Zuletzt bearbeitet 21.11.2024 06:31:56

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:51

In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed...

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:53

In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for explo...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:54

In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Pro...

  • EPSS 0.03%
  • Veröffentlicht 15.12.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:19:54

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitat...

Warnung
  • EPSS 0.91%
  • Veröffentlicht 15.12.2021 19:15:14
  • Zuletzt bearbeitet 23.10.2025 14:53:12

In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation....

Warnung
  • EPSS 0.91%
  • Veröffentlicht 15.12.2021 19:15:11
  • Zuletzt bearbeitet 23.10.2025 14:53:26

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: Androi...

  • EPSS 0.05%
  • Veröffentlicht 15.12.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:43:15

In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ...