Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 09.01.2015 21:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel...

  • EPSS 0.11%
  • Veröffentlicht 09.01.2015 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that...

  • EPSS 2.95%
  • Veröffentlicht 02.01.2015 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers t...

  • EPSS 0.08%
  • Veröffentlicht 26.12.2014 00:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a cr...

  • EPSS 0.06%
  • Veröffentlicht 26.12.2014 00:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the...

Exploit
  • EPSS 5.23%
  • Veröffentlicht 17.12.2014 11:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access t...

  • EPSS 0.06%
  • Veröffentlicht 17.12.2014 11:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mec...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.12.2014 18:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted ...

  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a mo...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 30.11.2014 01:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the g...