Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.

  • EPSS 0.13%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmet...

  • EPSS 0.1%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.

  • EPSS 0.13%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.

  • EPSS 0.13%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable ...

  • EPSS 0.08%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users ...

  • EPSS 0.09%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly hav...

  • EPSS 0.09%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer l...

  • EPSS 0.29%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

pdf/pdf-write.c in Artifex MuPDF before 1.12.0 mishandles certain length changes when a repair operation occurs during a clean operation, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly h...

  • EPSS 0.2%
  • Veröffentlicht 27.12.2017 17:08:19
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as ...