Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow)...

  • EPSS 0.05%
  • Veröffentlicht 16.10.2016 21:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permission...

  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a deni...

  • EPSS 1.21%
  • Veröffentlicht 16.10.2016 21:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated b...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.

  • EPSS 0.08%
  • Veröffentlicht 16.10.2016 21:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use ...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.

  • EPSS 10.56%
  • Veröffentlicht 10.10.2016 11:00:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.