Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 24.02.2021 15:15:13
  • Last modified 09.06.2025 15:15:25

The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the loc...

  • EPSS 1.48%
  • Published 23.02.2021 23:15:14
  • Last modified 21.11.2024 06:21:25

A flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.

Exploit
  • EPSS 0.21%
  • Published 23.02.2021 23:15:14
  • Last modified 21.11.2024 06:21:26

A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.

Exploit
  • EPSS 1.48%
  • Published 23.02.2021 20:15:12
  • Last modified 21.11.2024 06:21:25

A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.

Exploit
  • EPSS 1.45%
  • Published 23.02.2021 19:15:13
  • Last modified 21.11.2024 05:46:12

A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access ...

  • EPSS 0.05%
  • Published 23.02.2021 04:15:13
  • Last modified 21.11.2024 05:21:47

In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.

  • EPSS 67.15%
  • Published 22.02.2021 02:15:14
  • Last modified 21.11.2024 05:55:54

Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.

  • EPSS 70.56%
  • Published 22.02.2021 02:15:14
  • Last modified 21.11.2024 05:55:54

Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.

  • EPSS 0.07%
  • Published 18.02.2021 17:15:15
  • Last modified 21.11.2024 05:57:52

An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush...

  • EPSS 2.12%
  • Published 17.02.2021 23:15:13
  • Last modified 21.11.2024 05:39:09

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by...