Debian

Debian 8 (jessie)

428 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

  • EPSS 9.72%
  • Veröffentlicht 31.08.2015 10:59:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect chec...

  • EPSS 21.23%
  • Veröffentlicht 31.08.2015 10:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f...

  • EPSS 0.22%
  • Veröffentlicht 31.08.2015 10:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.

  • EPSS 0.08%
  • Veröffentlicht 31.08.2015 10:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late co...

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, ...

  • EPSS 0.29%
  • Veröffentlicht 31.08.2015 10:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.

  • EPSS 0.08%
  • Veröffentlicht 31.08.2015 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.

  • EPSS 0.05%
  • Veröffentlicht 05.08.2015 18:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted...

  • EPSS 0.03%
  • Veröffentlicht 27.05.2015 10:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but t...