Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 26.06.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 07:09:40

rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.

  • EPSS 0.05%
  • Veröffentlicht 26.06.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 07:09:40

rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 18.06.2022 16:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:15

drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.

  • EPSS 0.19%
  • Veröffentlicht 15.06.2022 21:15:09
  • Zuletzt bearbeitet 05.05.2025 17:17:41

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.45%
  • Veröffentlicht 15.06.2022 20:15:17
  • Zuletzt bearbeitet 05.05.2025 17:17:37

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.54%
  • Veröffentlicht 15.06.2022 20:15:17
  • Zuletzt bearbeitet 05.05.2025 17:17:37

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.03%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not n...

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersion...

  • EPSS 0.05%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitat...

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...