Search for packages
| purl | pkg:deb/debian/linux@3.8.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1qds-n4md-akc2 | several |
CVE-2013-3223
|
| VCID-1z7w-eagw-ayem | kernel: Integer overflow in compress_core |
CVE-2012-6703
|
| VCID-2k4n-8jd2-huhw | several |
CVE-2013-3229
|
| VCID-311a-cwqf-8yg2 | several |
CVE-2013-3225
|
| VCID-5mdb-b792-cfd7 | The create_user_ns function in kernel/user_namespace.c in the Linux kernel before 3.8.6 does not check whether a chroot directory exists that differs from the namespace root directory, which allows local users to bypass intended filesystem restrictions via a crafted clone system call. |
CVE-2013-1956
|
| VCID-5yhh-w1uv-4ua3 | several |
CVE-2013-3231
|
| VCID-6cbn-yk6y-uqcd | several |
CVE-2013-3234
|
| VCID-8exq-yp27-uqd1 | kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. |
CVE-2013-1959
|
| VCID-9h1m-6qez-yfgs | several |
CVE-2013-3301
|
| VCID-9q5s-xgju-xqgp | kernel: buffer overflow in drivers/net/wireless/iwlwifi/iwl-agn-sta.c |
CVE-2012-6712
|
| VCID-cv22-2dpu-bber | several |
CVE-2013-3227
|
| VCID-j6b4-c73a-y7hg | several |
CVE-2013-1929
|
| VCID-kpg2-81uw-83ab | several |
CVE-2013-3076
|
| VCID-mvuj-s6r9-guf1 | several |
CVE-2013-3222
|
| VCID-nx35-24bm-pyek | several |
CVE-2013-3224
|
| VCID-tx5k-gwv9-7fd7 | several |
CVE-2013-1979
|
| VCID-v7g7-5h1j-vqdy | several |
CVE-2013-3228
|
| VCID-wv93-my81-huak | several |
CVE-2013-2094
|
| VCID-yqec-kwg8-m3ef | kernel: Signed overflows in SO_{SND|RCV}BUF in sock_setsockopt() |
CVE-2012-6704
|
| VCID-zw45-mjf6-8ugw | several |
CVE-2013-3235
|