Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 28.10.2017 02:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly hav...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 19.10.2017 22:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) t...

  • EPSS 0.05%
  • Veröffentlicht 17.10.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The x86/fpu (Floating Point Unit) subsystem in the Linux kernel before 4.13.5, when a processor supports the xsave feature but not the xsaves feature, does not correctly handle attempts to set reserved bits in the xstate header via the ptrace() or rt...

  • EPSS 0.82%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.11%
  • Veröffentlicht 16.10.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clie...

  • EPSS 0.06%
  • Veröffentlicht 14.10.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have un...

  • EPSS 0.11%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial...

  • EPSS 0.08%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ...

  • EPSS 0.06%
  • Veröffentlicht 11.10.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS ...

  • EPSS 0.06%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_...