Debian

Debian Linux

9213 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.97%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:07

A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bou...

  • EPSS 3.02%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Fir...

  • EPSS 1.18%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulner...

  • EPSS 0.07%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permissi...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 28.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:37:51

In binder_alloc_free_page of binder_alloc.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for ex...

Exploit
  • EPSS 4.39%
  • Veröffentlicht 28.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:12

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.

Exploit
  • EPSS 0.59%
  • Veröffentlicht 28.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:12

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.

  • EPSS 5.08%
  • Veröffentlicht 28.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:13

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.

  • EPSS 0.95%
  • Veröffentlicht 28.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:13

In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.

  • EPSS 5.05%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...