Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 06.04.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:09

An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security...

  • EPSS 0.08%
  • Veröffentlicht 02.04.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:58:00

An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configurati...

Exploit
  • EPSS 23.27%
  • Veröffentlicht 02.04.2020 18:15:18
  • Zuletzt bearbeitet 21.11.2024 05:39:32

In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5....

Exploit
  • EPSS 0.07%
  • Veröffentlicht 24.03.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:25

In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.

  • EPSS 0.03%
  • Veröffentlicht 10.03.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:50

In the netlink driver, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions...

Warnung
  • EPSS 23.87%
  • Veröffentlicht 10.03.2020 20:15:21
  • Zuletzt bearbeitet 23.10.2025 14:53:05

In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitat...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 25.02.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:40:32

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to ...

  • EPSS 0.1%
  • Veröffentlicht 25.02.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:40:31

An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.02.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 01:33:17

fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.

  • EPSS 0.05%
  • Veröffentlicht 14.02.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:47

ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.