Debian

Debian 7 (wheezy)

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 9.12%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

Exploit
  • EPSS 3.38%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork ...

  • EPSS 0.07%
  • Veröffentlicht 01.08.2014 11:13:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory lo...

  • EPSS 1.03%
  • Veröffentlicht 19.07.2014 19:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.

Exploit
  • EPSS 1.14%
  • Veröffentlicht 09.07.2014 11:07:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain p...

  • EPSS 14.14%
  • Veröffentlicht 03.07.2014 04:22:16
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.

Warnung Exploit
  • EPSS 68.89%
  • Veröffentlicht 07.06.2014 14:55:27
  • Zuletzt bearbeitet 21.04.2026 17:47:00

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe wai...

  • EPSS 0.09%
  • Veröffentlicht 11.05.2014 21:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that req...