Debian

Debian 13 (trixie)

13171 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 31.08.2015 10:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.

  • EPSS 0.08%
  • Veröffentlicht 31.08.2015 10:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late co...

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, ...

  • EPSS 0.29%
  • Veröffentlicht 31.08.2015 10:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.

  • EPSS 0.08%
  • Veröffentlicht 31.08.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.

  • EPSS 0.04%
  • Veröffentlicht 31.08.2015 10:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted...

  • EPSS 0.04%
  • Veröffentlicht 31.08.2015 10:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

  • EPSS 0.04%
  • Veröffentlicht 31.08.2015 10:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

  • EPSS 0.04%
  • Veröffentlicht 31.08.2015 10:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c...