Debian

Debian 7 (wheezy)

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 94.18%
  • Veröffentlicht 10.11.2016 21:59:00
  • Zuletzt bearbeitet 21.04.2026 17:43:46

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in Oc...

  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow)...

  • EPSS 0.05%
  • Veröffentlicht 16.10.2016 21:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permission...

  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a deni...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-...

  • EPSS 0.02%
  • Veröffentlicht 10.10.2016 10:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluet...

  • EPSS 0.05%
  • Veröffentlicht 31.08.2016 14:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/fcntl.c in the "aufs 3.2.x+setfl-debian" patch in the linux-image package 3.2.0-4 (kernel 3.2.81-1) in Debian wheezy mishandles F_SETFL fcntl calls on directories, which allows local users to cause a denial of service (NULL pointer dereference and...

  • EPSS 0.06%
  • Veröffentlicht 06.08.2016 20:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fe...

  • EPSS 0.03%
  • Veröffentlicht 06.08.2016 20:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "doubl...

Exploit
  • EPSS 51.99%
  • Veröffentlicht 06.08.2016 20:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.