Debian

Debian 7 (wheezy)

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 24.08.2017 14:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges ...

  • EPSS 25.7%
  • Veröffentlicht 19.08.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel q...

  • EPSS 0.07%
  • Veröffentlicht 24.07.2017 07:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds ...

  • EPSS 0.07%
  • Veröffentlicht 21.07.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.

  • EPSS 0.54%
  • Veröffentlicht 17.07.2017 13:18:18
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, wher...

  • EPSS 20.81%
  • Veröffentlicht 11.07.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possi...

  • EPSS 0.05%
  • Veröffentlicht 05.07.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized paddin...

  • EPSS 3.09%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the...

  • EPSS 0.33%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass...

  • EPSS 0.33%
  • Veröffentlicht 17.06.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed...