Debian

Debian 9 (stretch)

363 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 13.05.2026 00:24:29

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly hav...

  • EPSS 0.09%
  • Veröffentlicht 27.12.2017 17:08:20
  • Zuletzt bearbeitet 13.05.2026 00:24:29

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer l...

  • EPSS 82.82%
  • Veröffentlicht 27.12.2017 17:08:17
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.

  • EPSS 0.03%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service ...

  • EPSS 0.01%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HAS...

  • EPSS 0.06%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system ca...

  • EPSS 0.06%
  • Veröffentlicht 18.12.2017 08:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

  • EPSS 0.08%
  • Veröffentlicht 16.12.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • EPSS 0.07%
  • Veröffentlicht 12.12.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allow...

  • EPSS 0.46%
  • Veröffentlicht 11.12.2017 21:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.