Debian

Debian 12 (bookworm)

11227 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.72%
  • Veröffentlicht 07.06.2015 23:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and syste...

  • EPSS 1.25%
  • Veröffentlicht 07.06.2015 23:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.

  • EPSS 3.72%
  • Veröffentlicht 07.06.2015 23:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or po...

  • EPSS 5.91%
  • Veröffentlicht 07.06.2015 23:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary co...

  • EPSS 0.03%
  • Veröffentlicht 27.05.2015 10:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but t...

  • EPSS 0.13%
  • Veröffentlicht 27.05.2015 10:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiti...

  • EPSS 4.11%
  • Veröffentlicht 27.05.2015 10:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of serv...

  • EPSS 0.04%
  • Veröffentlicht 27.05.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the...

Exploit
  • EPSS 1.72%
  • Veröffentlicht 27.05.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value ...

  • EPSS 0.1%
  • Veröffentlicht 27.05.2015 10:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header an...