Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 17.02.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:31:28

snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in ...

Exploit
  • EPSS 1.23%
  • Veröffentlicht 17.02.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:31:28

A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namesp...

Exploit
  • EPSS 1.01%
  • Veröffentlicht 17.02.2022 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:39:04

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

  • EPSS 0.3%
  • Veröffentlicht 16.02.2022 21:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:44

Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

  • EPSS 0.44%
  • Veröffentlicht 16.02.2022 21:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:44

Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

  • EPSS 0.44%
  • Veröffentlicht 16.02.2022 21:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:44

Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

  • EPSS 0.33%
  • Veröffentlicht 16.02.2022 21:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:45

Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.

  • EPSS 0.44%
  • Veröffentlicht 16.02.2022 21:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:45

Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' a...

  • EPSS 0.18%
  • Veröffentlicht 16.02.2022 20:15:07
  • Zuletzt bearbeitet 21.11.2024 06:51:53

An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function ...

Warnung Exploit
  • EPSS 10.91%
  • Veröffentlicht 16.02.2022 19:15:08
  • Zuletzt bearbeitet 06.11.2025 14:50:43

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new loc...