Debian

Debian 10 (buster)

543 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 20.03.2025 16:59:51

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a pare...

  • EPSS 0.06%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the n...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new inst...

  • EPSS 0.03%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new in...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 14:15:11
  • Zuletzt bearbeitet 13.02.2025 17:17:16

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage colle...

  • EPSS 0.01%
  • Veröffentlicht 14.08.2023 03:15:09
  • Zuletzt bearbeitet 25.02.2026 18:17:01

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.

  • EPSS 0.58%
  • Veröffentlicht 11.08.2023 03:15:18
  • Zuletzt bearbeitet 21.11.2024 07:50:10

Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Exploit
  • EPSS 0.73%
  • Veröffentlicht 11.08.2023 03:15:14
  • Zuletzt bearbeitet 21.11.2024 07:22:21

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.01%
  • Veröffentlicht 25.07.2023 16:15:11
  • Zuletzt bearbeitet 21.11.2024 08:18:01

A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possibl...

Exploit
  • EPSS 5.88%
  • Veröffentlicht 24.07.2023 20:15:10
  • Zuletzt bearbeitet 13.02.2025 17:16:01

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.