Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 22.06.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:34

An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious us...

  • EPSS 1.26%
  • Veröffentlicht 21.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:51

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

  • EPSS 0.04%
  • Veröffentlicht 21.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:35

An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the...

Exploit
  • EPSS 1.44%
  • Veröffentlicht 20.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:13

A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w...

Exploit
  • EPSS 1.99%
  • Veröffentlicht 13.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:13

procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list...

  • EPSS 0.15%
  • Veröffentlicht 12.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:32

In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS...

  • EPSS 0.06%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:26

In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.

  • EPSS 0.03%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:27

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...

  • EPSS 3.32%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment t...

  • EPSS 0.1%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered b...