Debian

Debian 9 (stretch)

363 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.37%
  • Veröffentlicht 27.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:21

A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading...

  • EPSS 0.04%
  • Veröffentlicht 21.08.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:15

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmi...

  • EPSS 0.04%
  • Veröffentlicht 20.08.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:08

arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.

  • EPSS 0.04%
  • Veröffentlicht 20.08.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:05

The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.

  • EPSS 0.09%
  • Veröffentlicht 17.08.2018 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:50:52

An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to req...

  • EPSS 2.26%
  • Veröffentlicht 14.08.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:47

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel an...

  • EPSS 3.88%
  • Veröffentlicht 14.08.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:50

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fau...

  • EPSS 0.05%
  • Veröffentlicht 07.08.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:50

The pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "pages/cpu" printk call.

  • EPSS 10.6%
  • Veröffentlicht 06.08.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:08:43

Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

  • EPSS 0.09%
  • Veröffentlicht 30.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:03

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/pr...