Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in ...

  • EPSS 0.12%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: thi...

  • EPSS 20.04%
  • Veröffentlicht 18.02.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double...

  • EPSS 0.03%
  • Veröffentlicht 14.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the pr...

  • EPSS 1.75%
  • Veröffentlicht 14.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invali...

Exploit
  • EPSS 18.91%
  • Veröffentlicht 14.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packet...

  • EPSS 0.02%
  • Veröffentlicht 07.02.2017 07:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking dur...

  • EPSS 0.01%
  • Veröffentlicht 07.02.2017 07:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup...

  • EPSS 2.7%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the...

  • EPSS 0.04%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other im...