Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

  • EPSS 0.77%
  • Veröffentlicht 26.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:09

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in ...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.

  • EPSS 0.24%
  • Veröffentlicht 18.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.

  • EPSS 0.02%
  • Veröffentlicht 11.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:29

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass mod...

  • EPSS 1.31%
  • Veröffentlicht 10.07.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 04:05:53

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

  • EPSS 1.04%
  • Veröffentlicht 10.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:14

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authen...