Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 24.05.2021 18:15:07
  • Zuletzt bearbeitet 04.11.2025 20:15:58

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public ke...

  • EPSS 0.67%
  • Veröffentlicht 21.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:40

This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ...

  • EPSS 0.17%
  • Veröffentlicht 17.05.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:21:39

A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to con...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 14.05.2021 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:08:09

The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 14.05.2021 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:08:09

In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

  • EPSS 0.15%
  • Veröffentlicht 13.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:53

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

  • EPSS 0.02%
  • Veröffentlicht 12.05.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 05:51:16

Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:03

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when a...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragmen...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 14.04.2026 09:16:20

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP...