Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 82.86%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from...

Warnung
  • EPSS 56.99%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 21.04.2026 18:00:48

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4f...

  • EPSS 0.06%
  • Veröffentlicht 04.10.2017 01:29:03
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0.

  • EPSS 0.08%
  • Veröffentlicht 26.09.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.

  • EPSS 0.04%
  • Veröffentlicht 26.09.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allow...

  • EPSS 0.02%
  • Veröffentlicht 21.09.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be i...

  • EPSS 0.18%
  • Veröffentlicht 21.09.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In all Qualcomm products with Android releases from CAF using the Linux kernel, during DMA allocation, due to wrong data type of size, allocation size gets truncated which makes allocation succeed when it should fail.

  • EPSS 0.05%
  • Veröffentlicht 20.09.2017 08:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The access_pmu_evcntr function in arch/arm64/kvm/sys_regs.c in the Linux kernel before 4.8.11 allows privileged KVM guest OS users to cause a denial of service (assertion failure and host OS crash) by accessing the Performance Monitors Cycle Count Re...

  • EPSS 0.07%
  • Veröffentlicht 19.09.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secur...

  • EPSS 0.07%
  • Veröffentlicht 15.09.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified othe...