Debian

Debian 10 (buster)

543 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 16.08.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:28:05

check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.

  • EPSS 0.1%
  • Veröffentlicht 16.08.2019 14:15:09
  • Zuletzt bearbeitet 21.11.2024 04:28:05

parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.

  • EPSS 0.05%
  • Veröffentlicht 26.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:22

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk h...

  • EPSS 0.05%
  • Veröffentlicht 26.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:22

In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make...

  • EPSS 0.1%
  • Veröffentlicht 19.07.2019 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:26

In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal ...

  • EPSS 0.02%
  • Veröffentlicht 17.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:25:24

In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.

Warnung Exploit
  • EPSS 81.07%
  • Veröffentlicht 17.07.2019 13:15:10
  • Zuletzt bearbeitet 06.11.2025 16:51:07

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with...

  • EPSS 0.76%
  • Veröffentlicht 05.07.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:38

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 04.07.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:24:30

In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.

  • EPSS 0.56%
  • Veröffentlicht 26.06.2019 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:23:57

A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of ser...