Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privilege...

  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __clear_user function in arch/arm64/lib/clear_user.S in the Linux kernel before 3.17.4 on the ARM64 platform allows local users to cause a denial of service (system crash) by reading one byte beyond a /dev/zero page boundary.

  • EPSS 0.05%
  • Veröffentlicht 30.11.2014 01:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace e...

Exploit
  • EPSS 18.31%
  • Veröffentlicht 30.11.2014 01:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malf...

Exploit
  • EPSS 1.96%
  • Veröffentlicht 30.11.2014 01:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to ...

  • EPSS 0.05%
  • Veröffentlicht 30.11.2014 01:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.

  • EPSS 1.48%
  • Veröffentlicht 10.11.2014 11:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.11.2014 11:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereferenc...