Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 10.11.2014 11:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or p...

  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or caus...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS...

  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.

  • EPSS 0.09%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.1%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 9.12%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

Exploit
  • EPSS 3.38%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork ...

  • EPSS 0.07%
  • Veröffentlicht 13.10.2014 10:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss ...