Debian

Debian 8 (jessie)

428 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow)...

  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a deni...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-...

  • EPSS 0.02%
  • Veröffentlicht 10.10.2016 10:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluet...

  • EPSS 0.06%
  • Veröffentlicht 06.08.2016 20:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fe...

  • EPSS 0.03%
  • Veröffentlicht 06.08.2016 20:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "doubl...

Exploit
  • EPSS 51.99%
  • Veröffentlicht 06.08.2016 20:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

  • EPSS 0.07%
  • Veröffentlicht 06.08.2016 20:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash)...

  • EPSS 0.06%
  • Veröffentlicht 03.07.2016 21:59:18
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerabi...

  • EPSS 1.63%
  • Veröffentlicht 03.07.2016 21:59:17
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by levera...