Debian

Debian Linux

9213 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.97%
  • Published 28.02.2019 18:29:00
  • Last modified 21.11.2024 03:45:07

A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bou...

  • EPSS 3.02%
  • Published 28.02.2019 18:29:00
  • Last modified 21.11.2024 03:45:08

By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Fir...

  • EPSS 1.18%
  • Published 28.02.2019 18:29:00
  • Last modified 21.11.2024 03:45:08

A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulner...

  • EPSS 0.07%
  • Published 28.02.2019 18:29:00
  • Last modified 21.11.2024 03:45:08

A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permissi...

Exploit
  • EPSS 0.49%
  • Published 28.02.2019 17:29:00
  • Last modified 21.11.2024 04:37:51

In binder_alloc_free_page of binder_alloc.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for ex...

Exploit
  • EPSS 4.39%
  • Published 28.02.2019 04:29:00
  • Last modified 21.11.2024 04:51:12

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.

Exploit
  • EPSS 0.59%
  • Published 28.02.2019 04:29:00
  • Last modified 21.11.2024 04:51:12

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.

  • EPSS 5.08%
  • Published 28.02.2019 04:29:00
  • Last modified 21.11.2024 04:51:13

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.

  • EPSS 0.95%
  • Published 28.02.2019 04:29:00
  • Last modified 21.11.2024 04:51:13

In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.

  • EPSS 5.05%
  • Published 27.02.2019 23:29:00
  • Last modified 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...