Debian

Debian 8 (jessie)

428 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.46%
  • Veröffentlicht 14.08.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:51:45

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 13.08.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 03:20:16

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbi...

  • EPSS 0.05%
  • Veröffentlicht 26.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:22

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk h...

  • EPSS 0.05%
  • Veröffentlicht 26.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:22

In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make...

  • EPSS 0.02%
  • Veröffentlicht 17.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:25:24

In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.

Warnung Exploit
  • EPSS 81.07%
  • Veröffentlicht 17.07.2019 13:15:10
  • Zuletzt bearbeitet 06.11.2025 16:51:07

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with...

  • EPSS 0.76%
  • Veröffentlicht 05.07.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:38

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to ...

  • EPSS 1.05%
  • Veröffentlicht 05.07.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:38

The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the...

  • EPSS 0.08%
  • Veröffentlicht 19.06.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:40:05

In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...

  • EPSS 69.92%
  • Veröffentlicht 19.06.2019 00:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:09

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This ha...