Debian

Debian 10 (buster)

543 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 05.01.2023 16:15:11
  • Zuletzt bearbeitet 10.04.2025 15:16:01

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

  • EPSS 0.17%
  • Veröffentlicht 07.12.2022 01:15:11
  • Zuletzt bearbeitet 21.11.2024 07:19:56

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption i...

  • EPSS 0.03%
  • Veröffentlicht 07.12.2022 01:15:11
  • Zuletzt bearbeitet 23.04.2025 15:15:51

Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in ...

  • EPSS 0.04%
  • Veröffentlicht 07.12.2022 01:15:11
  • Zuletzt bearbeitet 23.04.2025 15:15:51

Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in ...

  • EPSS 0.41%
  • Veröffentlicht 27.11.2022 04:15:10
  • Zuletzt bearbeitet 29.04.2025 14:15:30

An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.

  • EPSS 0.07%
  • Veröffentlicht 23.11.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:25:32

There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit  https://github.com/torvalds/linux/commit/b1a2c...

  • EPSS 0.42%
  • Veröffentlicht 23.11.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:25:33

There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote atta...

  • EPSS 0.07%
  • Veröffentlicht 26.10.2022 04:15:13
  • Zuletzt bearbeitet 07.05.2025 14:15:37

drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.

  • EPSS 0.08%
  • Veröffentlicht 21.10.2022 20:15:09
  • Zuletzt bearbeitet 21.11.2024 07:19:57

A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the atta...

  • EPSS 0.12%
  • Veröffentlicht 21.10.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:19:56

A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may ...