The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Linux

Wireshark: four denials of service via the protocol dissectors
An attacker can trigger a fault in some dissectors, in order to trigger a denial of service or mask illicit network traffic...
CERTFR-2014-AVI-338, CVE-2014-5161, CVE-2014-5162, CVE-2014-5163, CVE-2014-5164, CVE-2014-5165, DSA-3002-1, FEDORA-2014-9112, MDVSA-2014:159, openSUSE-SU-2014:1038-1, openSUSE-SU-2014:1249-1, VIGILANCE-VUL-15115, wnpa-sec-2014-08, wnpa-sec-2014-09, wnpa-sec-2014-10, wnpa-sec-2014-11
GnuPG: buffer overflow of gpgme
An attacker can generate a buffer overflow in gpgme of GnuPG, in order to trigger a denial of service, and possibly to execute code...
1113267, bulletinoct2015, CVE-2014-3564, DSA-3005-1, FEDORA-2014-16451, FEDORA-2014-16459, MDVSA-2014:160, openSUSE-SU-2014:1039-1, USN-2307-1, VIGILANCE-VUL-15114
Linux kernel: memory corruption via ptrace
An attacker can write into the Linux kernel memory, in order to trigger a denial of service, and possibly to run code with kernel privileges...
CERTFR-2014-AVI-332, CVE-2014-3534, DSA-2992-1, FEDORA-2014-9010, FEDORA-2014-9142, MDVSA-2014:201, RHSA-2014:1023-01, VIGILANCE-VUL-15104
PHP: use after free via SPL Iterators
A local attacker can use a freed memory area in SPL Iterators of PHP, in order to trigger a denial of service, and possibly to execute code...
67538, bulletinjan2015, CVE-2014-4670, DSA-3008-1, DSA-3008-2, MDVSA-2014:149, MDVSA-2015:080, openSUSE-SU-2014:0945-1, openSUSE-SU-2014:1236-1, RHSA-2014:1326-01, RHSA-2014:1327-01, RHSA-2014:1765-01, RHSA-2014:1766-01, SOL15761, SSA:2014-247-01, SUSE-SU-2014:0938-1, SUSE-SU-2016:1638-1, USN-2276-1, VIGILANCE-VUL-15098
NSS: multiple vulnerabilities
An attacker can use several vulnerabilities of NSS...
BID-65332, BID-65335, CVE-2014-1490, CVE-2014-1491, CVE-2014-1544, DSA-2994-1, DSA-3071-1, MDVSA-2014:139, MDVSA-2015:059, MFSA 2014-12, MFSA 2014-63, openSUSE-SU-2014:0939-1, openSUSE-SU-2014:0950-1, RHSA-2014:0915-01, RHSA-2014:0916-01, RHSA-2014:0917-01, RHSA-2014:0979-01, RHSA-2014:1165-01, RHSA-2014:1246-01, SUSE-SU-2014:0960-1, USN-2343-1, VIGILANCE-VUL-15088
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
CERTFR-2014-AVI-331, CVE-2014-1544, CVE-2014-1547, CVE-2014-1548, CVE-2014-1549, CVE-2014-1550, CVE-2014-1551, CVE-2014-1552, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557, CVE-2014-1558, CVE-2014-1559, CVE-2014-1560, CVE-2014-1561, DSA-2986-1, DSA-2996-1, FEDORA-2014-8736, FEDORA-2014-8763, FEDORA-2014-8797, FEDORA-2014-8809, FEDORA-2014-9147, MFSA 2014-56, MFSA 2014-57, MFSA 2014-58, MFSA 2014-59, MFSA 2014-60, MFSA 2014-61, MFSA 2014-62, MFSA 2014-63, MFSA 2014-64, MFSA 2014-65, MFSA 2014-66, openSUSE-SU-2014:0939-1, openSUSE-SU-2014:0950-1, openSUSE-SU-2014:0976-1, openSUSE-SU-2014:1100-1, RHSA-2014:0918-01, RHSA-2014:0919-01, SSA:2014-204-02, SSA:2014-204-03, SSA:2014-252-01, SUSE-SU-2014:0960-1, USN-2295-1, USN-2296-1, VIGILANCE-VUL-15087
CUPS: privilege escalation via RSS
An attacker, member of the lp group, can create a symbolic link, and then read the RSS feed of CUPS, in order to escalate his privileges...
4455, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031, DSA-2990-1, FEDORA-2014-8752, FEDORA-2014-9703, MDVSA-2014:151, MDVSA-2015:108, RHSA-2014:1388-02, USN-2341-1, VIGILANCE-VUL-15081
MIT krb5: denial of service of GSSAPI
An attacker can use several vulnerabilities of MIT krb5...
cpuoct2017, CVE-2014-4341, CVE-2014-4342, DSA-3000-1, FEDORA-2014-8176, FEDORA-2014-8189, K15552, MDVSA-2014:156, MDVSA-2014:165, openSUSE-SU-2014:0977-1, RHSA-2014:1245-01, RHSA-2014:1389-02, RHSA-2015:0439-01, SOL15547, SOL15552, USN-2310-1, VIGILANCE-VUL-15079
KAuth: privilege escalation via UnixProcess
A local attacker can bypass the KAuth authentication, in order to escalate his privileges...
864716, CVE-2014-5033, DSA-3004-1, FEDORA-2014-11348, FEDORA-2014-11448, FEDORA-2014-9602, FEDORA-2014-9641, openSUSE-SU-2014:0981-1, RHSA-2014:1359-01, USN-2304-1, VIGILANCE-VUL-15076
Cacti: Cross Site Scripting of Item Names
An attacker can trigger a Cross Site Scripting in Item Names of Cacti, in order to execute JavaScript code in the context of the web site...
CVE-2014-5025, CVE-2014-5026, DSA-3007-1, openSUSE-SU-2015:0479-1, VIGILANCE-VUL-15075
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Linux: