Debian

Debian 11 (bullseye)

8657 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 27.05.2015 10:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereferenc...

  • EPSS 0.03%
  • Veröffentlicht 27.05.2015 10:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem ope...

  • EPSS 0.06%
  • Veröffentlicht 21.04.2015 10:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl en...

  • EPSS 0.07%
  • Veröffentlicht 21.04.2015 10:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a s...

  • EPSS 6.84%
  • Veröffentlicht 05.04.2015 21:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (...

Exploit
  • EPSS 1.97%
  • Veröffentlicht 16.03.2015 10:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predictin...

  • EPSS 0.03%
  • Veröffentlicht 16.03.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of ...

  • EPSS 17.13%
  • Veröffentlicht 16.03.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by tri...

  • EPSS 0.04%
  • Veröffentlicht 16.03.2015 10:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The XFS implementation in the Linux kernel before 3.15 improperly uses an old size value during remote attribute replacement, which allows local users to cause a denial of service (transaction overrun and data corruption) or possibly gain privileges ...

  • EPSS 0.05%
  • Veröffentlicht 16.03.2015 10:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows ...