Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.

  • EPSS 0.08%
  • Veröffentlicht 16.10.2016 21:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use ...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.

  • EPSS 10.56%
  • Veröffentlicht 10.10.2016 11:00:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

  • EPSS 0.02%
  • Veröffentlicht 10.10.2016 10:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluet...

  • EPSS 0.06%
  • Veröffentlicht 10.10.2016 10:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multip...

  • EPSS 0.15%
  • Veröffentlicht 10.10.2016 10:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by trig...

  • EPSS 0.06%
  • Veröffentlicht 30.09.2016 14:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Unspecified vulnerability in the kernel-uek component in Oracle Linux 6 allows local users to affect availability via unknown vectors.