Debian

Debian 7 (wheezy)

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 24.02.2017 15:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for ...

  • EPSS 9.46%
  • Veröffentlicht 23.02.2017 17:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.

  • EPSS 0.55%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in ...

  • EPSS 0.12%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: thi...

  • EPSS 20.04%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double...

  • EPSS 1.75%
  • Veröffentlicht 14.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invali...

  • EPSS 0.05%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a craft...

  • EPSS 0.08%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The klsi_105_get_line_state function in drivers/usb/serial/kl5kusb105.c in the Linux kernel before 4.9.5 places uninitialized heap-memory contents into a log entry upon a failure to read the line status, which allows local users to obtain sensitive i...

  • EPSS 0.25%
  • Veröffentlicht 12.01.2017 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a...

  • EPSS 0.34%
  • Veröffentlicht 12.01.2017 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as M...