Debian

Debian 10 (buster)

543 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.03.2023 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:38:24

In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2023 21:15:10
  • Zuletzt bearbeitet 05.05.2025 16:15:28

A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion lead...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2023 21:15:10
  • Zuletzt bearbeitet 19.02.2025 22:15:11

A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2023 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:39:04

A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined ...

  • EPSS 0.02%
  • Veröffentlicht 23.03.2023 21:15:19
  • Zuletzt bearbeitet 21.11.2024 07:37:27

A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, ...

  • EPSS 0.02%
  • Veröffentlicht 23.03.2023 21:15:19
  • Zuletzt bearbeitet 25.02.2025 20:15:32

A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.

Warnung
  • EPSS 54.24%
  • Veröffentlicht 22.03.2023 21:15:18
  • Zuletzt bearbeitet 04.11.2025 16:47:21

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This...

  • EPSS 0.02%
  • Veröffentlicht 22.03.2023 14:15:16
  • Zuletzt bearbeitet 13.02.2025 17:15:58

Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called w...

  • EPSS 0.02%
  • Veröffentlicht 06.03.2023 23:15:10
  • Zuletzt bearbeitet 06.03.2025 21:15:12

A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to ...

  • EPSS 0.01%
  • Veröffentlicht 06.03.2023 23:15:10
  • Zuletzt bearbeitet 07.03.2025 16:15:35

A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.