Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.99%
  • Veröffentlicht 13.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:13

procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list...

  • EPSS 0.15%
  • Veröffentlicht 12.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:32

In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS...

  • EPSS 0.06%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:26

In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.

  • EPSS 0.03%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:27

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...

  • EPSS 3.32%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment t...

  • EPSS 0.1%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered b...

  • EPSS 0.08%
  • Veröffentlicht 05.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:55

The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls m...

Exploit
  • EPSS 1.54%
  • Veröffentlicht 28.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:30

The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.

  • EPSS 0.08%
  • Veröffentlicht 28.05.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:30

The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes...

Exploit
  • EPSS 11.2%
  • Veröffentlicht 24.05.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:18

In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a d...