The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Jessie

Linux kernel: privilege escalation via construct_get_dest_keyring
An attacker can bypass restrictions via construct_get_dest_keyring() of the Linux kernel, in order to escalate his privileges...
CERTFR-2018-AVI-018, CERTFR-2018-AVI-165, CERTFR-2018-AVI-170, CERTFR-2018-AVI-198, CERTFR-2020-AVI-180, CVE-2017-17807, DLA-1232-1, DSA-4073-1, DSA-4082-1, RHSA-2020:1016-01, RHSA-2020:1070-01, USN-3617-1, USN-3617-2, USN-3617-3, USN-3619-1, USN-3619-2, USN-3620-1, USN-3620-2, USN-3632-1, VIGILANCE-VUL-24872
Linux kernel: buffer overflow via HMAC
An attacker can generate a buffer overflow via HMAC of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-005, CERTFR-2018-AVI-014, CERTFR-2018-AVI-018, CERTFR-2018-AVI-029, CERTFR-2018-AVI-048, CERTFR-2018-AVI-083, CERTFR-2018-AVI-165, CERTFR-2018-AVI-170, CERTFR-2018-AVI-198, CVE-2017-17806, DLA-1232-1, DSA-4073-1, DSA-4082-1, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, RHSA-2018:2948-01, SUSE-SU-2018:0010-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0437-1, SUSE-SU-2018:0525-1, USN-3583-1, USN-3583-2, USN-3617-1, USN-3617-2, USN-3617-3, USN-3619-1, USN-3619-2, USN-3632-1, VIGILANCE-VUL-24871
Linux kernel: use after free via Salsa20
An attacker can force the usage of a freed memory area via Salsa20 of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-005, CERTFR-2018-AVI-014, CERTFR-2018-AVI-018, CERTFR-2018-AVI-029, CERTFR-2018-AVI-048, CERTFR-2018-AVI-083, CERTFR-2018-AVI-165, CERTFR-2018-AVI-170, CERTFR-2018-AVI-198, CERTFR-2019-AVI-390, CVE-2017-17805, DLA-1232-1, DSA-4073-1, DSA-4082-1, JSA10993, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, RHSA-2018:2948-01, RHSA-2018:3083-01, RHSA-2018:3096-01, RHSA-2019:2473-01, SUSE-SU-2018:0010-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0437-1, SUSE-SU-2018:0525-1, USN-3617-1, USN-3617-2, USN-3617-3, USN-3619-1, USN-3619-2, USN-3620-1, USN-3620-2, USN-3632-1, VIGILANCE-VUL-24870
Ruby: code execution via FTP Pipe File
An attacker can use a vulnerability via FTP Pipe File of Ruby, in order to run code...
bulletinjan2019, CVE-2017-17405, DLA-1221-1, DLA-1222-1, DLA-1421-1, DSA-4259-1, HT208937, HT209193, RHSA-2018:0378-01, RHSA-2018:0583-01, RHSA-2018:0584-01, RHSA-2018:0585-01, RHSA-2019:2806-01, SSA:2017-353-01, SUSE-SU-2020:1570-1, USN-3515-1, VIGILANCE-VUL-24840
GIMP: out-of-bounds memory reading via PSP
An attacker can force a read at an invalid address via PSP of GIMP, in order to trigger a denial of service, or to obtain sensitive information...
790853, CVE-2017-17787, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, USN-3539-1, VIGILANCE-VUL-24829
GIMP: buffer overflow via PSP
An attacker can generate a buffer overflow via PSP of GIMP, in order to trigger a denial of service, and possibly to run code...
790849, bulletinapr2018, CVE-2017-17789, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, openSUSE-SU-2020:1420-1, SUSE-SU-2020:2603-1, SUSE-SU-2020:2604-1, USN-3539-1, VIGILANCE-VUL-24828
GIMP: out-of-bounds memory reading via GBR
An attacker can force a read at an invalid address via GBR of GIMP, in order to trigger a denial of service, or to obtain sensitive information...
790784, bulletinapr2018, CVE-2017-17784, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, USN-3539-1, VIGILANCE-VUL-24827
GIMP: out-of-bounds memory reading via XCF
An attacker can force a read at an invalid address via XCF of GIMP, in order to trigger a denial of service, or to obtain sensitive information...
790783, CVE-2017-17788, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, SUSE-SU-2020:0601-1, USN-3539-1, VIGILANCE-VUL-24826
GIMP: out-of-bounds memory reading via TGA
An attacker can force a read at an invalid address via TGA of GIMP, in order to trigger a denial of service, or to obtain sensitive information...
739134, CVE-2017-17786, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, SUSE-SU-2020:0601-1, USN-3539-1, VIGILANCE-VUL-24825
GIMP: buffer overflow via FLI
An attacker can generate a buffer overflow via FLI of GIMP, in order to trigger a denial of service, and possibly to run code...
739133, CVE-2017-17785, DLA-1220-1, DSA-4077-1, FEDORA-2018-67b75f73fa, FEDORA-2018-ccef1ced42, FLIMP, SUSE-SU-2020:0601-1, USN-3539-1, VIGILANCE-VUL-24824
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Jessie: