Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 02.05.2016 10:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tty_open function in drivers/tty/tty_io.c in the Linux kernel before 3.1.1 mishandles a driver-lookup failure, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other im...

  • EPSS 0.03%
  • Veröffentlicht 27.04.2016 17:59:27
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, a...

  • EPSS 0.03%
  • Veröffentlicht 27.04.2016 17:59:26
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.

  • EPSS 0.13%
  • Veröffentlicht 27.04.2016 17:59:24
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device ...

  • EPSS 0.2%
  • Veröffentlicht 27.04.2016 17:59:23
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLA...

  • EPSS 0.04%
  • Veröffentlicht 27.04.2016 17:59:22
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

  • EPSS 0.07%
  • Veröffentlicht 27.04.2016 17:59:21
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 27.04.2016 17:59:20
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by insertin...

  • EPSS 0.02%
  • Veröffentlicht 27.04.2016 17:59:19
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing ...

  • EPSS 0.11%
  • Veröffentlicht 27.04.2016 17:59:18
  • Zuletzt bearbeitet 06.05.2026 22:30:45

sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _...