Debian

Debian Linux

9144 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:18:26

In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being use...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:21:45

A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `uns...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 22:15:17
  • Zuletzt bearbeitet 21.11.2024 05:21:45

A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:24

The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 08.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:24

There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these ca...

  • EPSS 0.35%
  • Veröffentlicht 08.12.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:45

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they...

  • EPSS 0.16%
  • Veröffentlicht 08.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:52

A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.

  • EPSS 0.08%
  • Veröffentlicht 07.12.2020 22:15:20
  • Zuletzt bearbeitet 21.11.2024 05:23:19

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it...

Exploit
  • EPSS 68.75%
  • Veröffentlicht 07.12.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:17

ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible...

Exploit
  • EPSS 2.27%
  • Veröffentlicht 07.12.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:17

In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.