Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Veröffentlicht 05.03.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:59:01

An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping error...

  • EPSS 0.69%
  • Veröffentlicht 04.03.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:23:04

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to t...

  • EPSS 0.69%
  • Veröffentlicht 04.03.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:44

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious i...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 04.03.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:45

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted malformed file can lead to an out-of-bounds re...

  • EPSS 0.69%
  • Veröffentlicht 04.03.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:59

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious inpu...

  • EPSS 0.8%
  • Veröffentlicht 01.03.2021 12:15:14
  • Zuletzt bearbeitet 21.11.2024 05:54:45

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnera...

  • EPSS 2.78%
  • Veröffentlicht 01.03.2021 12:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:23

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and use...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

  • EPSS 4.7%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 06:20:58

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

  • EPSS 12.14%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 06:20:59

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/uti...