Debian

Debian 9 (stretch)

363 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 25.07.2017 04:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a ...

  • EPSS 0.07%
  • Veröffentlicht 24.07.2017 07:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds ...

  • EPSS 0.07%
  • Veröffentlicht 21.07.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.

  • EPSS 20.81%
  • Veröffentlicht 11.07.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possi...

  • EPSS 0.05%
  • Veröffentlicht 05.07.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized paddin...

  • EPSS 0.83%
  • Veröffentlicht 04.07.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.

  • EPSS 0.33%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass...

  • EPSS 1.72%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40...

  • EPSS 2.16%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as t...

  • EPSS 0.33%
  • Veröffentlicht 17.06.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed...