Debian

Debian 14 (forky)

13671 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 17.12.2014 11:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mec...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.12.2014 18:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted ...

  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a mo...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 30.11.2014 01:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the g...

  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privilege...

  • EPSS 0.04%
  • Veröffentlicht 30.11.2014 01:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __clear_user function in arch/arm64/lib/clear_user.S in the Linux kernel before 3.17.4 on the ARM64 platform allows local users to cause a denial of service (system crash) by reading one byte beyond a /dev/zero page boundary.

  • EPSS 0.05%
  • Veröffentlicht 30.11.2014 01:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace e...

Exploit
  • EPSS 18.31%
  • Veröffentlicht 30.11.2014 01:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malf...

Exploit
  • EPSS 1.96%
  • Veröffentlicht 30.11.2014 01:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to ...

  • EPSS 0.05%
  • Veröffentlicht 30.11.2014 01:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.