Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 17.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:57

In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bi...

  • EPSS 0.09%
  • Veröffentlicht 08.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:31

A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.

  • EPSS 0.12%
  • Veröffentlicht 08.10.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:19

The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to e...

  • EPSS 0.09%
  • Veröffentlicht 07.10.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:23

arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of ...

  • EPSS 0.06%
  • Veröffentlicht 03.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:18

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi...

Warnung Exploit
  • EPSS 20.57%
  • Veröffentlicht 25.09.2018 21:29:00
  • Zuletzt bearbeitet 27.01.2026 15:55:15

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6...

  • EPSS 7.3%
  • Veröffentlicht 25.09.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer over...

  • EPSS 0.09%
  • Veröffentlicht 21.09.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:01

An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.

Exploit
  • EPSS 8.51%
  • Veröffentlicht 19.09.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:02

An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, ma...

  • EPSS 0.03%
  • Veröffentlicht 11.09.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 03:42:08

A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process co...