Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 31.08.2015 20:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 31.08.2015 20:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI...

  • EPSS 0.05%
  • Veröffentlicht 31.08.2015 10:59:16
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that lev...

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

  • EPSS 9.72%
  • Veröffentlicht 31.08.2015 10:59:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect chec...

  • EPSS 21.23%
  • Veröffentlicht 31.08.2015 10:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f...

  • EPSS 0.22%
  • Veröffentlicht 31.08.2015 10:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.

  • EPSS 0.08%
  • Veröffentlicht 31.08.2015 10:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late co...

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, ...

  • EPSS 0.29%
  • Veröffentlicht 31.08.2015 10:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.