Vulnerabilities of DebianDebian vulnerability: privilege escalation via PERF_EVENTS
A local attacker can use the perf_event_open() system call with an invalid event, in order to escalate his privileges.Debian vulnerability: denial of service via non-preemption
An attacker, who is located in a guest system, can use some complex operations, in order to trigger a denial of service of Xen.Debian vulnerability: bypassing the ECDSA signature with OpenSSL
When strongSwan is configured with the "OpenSSL" plugin to check ECDSA signatures, an attacker can use an empty signature, which is recognized as valid, and leads to the authentication as a legitimate user.Debian vulnerability: denial of service via EXT4_ORPHAN_FS
An attacker can mount an ext4 filesystem with no journal and using an orphan extend, to create an infinite loop in the Linux kernel, in order to trigger a denial of service.Debian vulnerability: denial of service via IRQ
An attacker located in a guest system can use an IRQ with Xen, in order to trigger a denial of service.Display other vulnerabilities of Debian described by Vigil@nce...
Display information about Debian: