Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.29%
  • Veröffentlicht 01.09.2014 01:55:18
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruptio...

  • EPSS 0.04%
  • Veröffentlicht 18.08.2014 11:15:27
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 18.08.2014 11:15:27
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with back...

  • EPSS 0.07%
  • Veröffentlicht 01.08.2014 11:13:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory lo...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 01.08.2014 11:13:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial ...

  • EPSS 12.78%
  • Veröffentlicht 01.08.2014 11:13:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an assoc...

  • EPSS 1.03%
  • Veröffentlicht 19.07.2014 19:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.

Exploit
  • EPSS 1.14%
  • Veröffentlicht 09.07.2014 11:07:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain p...

  • EPSS 14.14%
  • Veröffentlicht 03.07.2014 04:22:16
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.

  • EPSS 8.6%
  • Veröffentlicht 03.07.2014 04:22:15
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a cra...