Debian

Debian Linux

9951 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.48%
  • Veröffentlicht 23.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 06:21:25

A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.

Exploit
  • EPSS 1.45%
  • Veröffentlicht 23.02.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:46:12

A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access ...

  • EPSS 0.06%
  • Veröffentlicht 23.02.2021 04:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:47

In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.

  • EPSS 62.61%
  • Veröffentlicht 22.02.2021 02:15:14
  • Zuletzt bearbeitet 21.11.2024 05:55:54

Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.

  • EPSS 75.58%
  • Veröffentlicht 22.02.2021 02:15:14
  • Zuletzt bearbeitet 21.11.2024 05:55:54

Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.

  • EPSS 0.07%
  • Veröffentlicht 18.02.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:52

An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush...

  • EPSS 26.3%
  • Veröffentlicht 17.02.2021 23:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:09

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by...

  • EPSS 0.07%
  • Veröffentlicht 17.02.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:44

avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files unde...

  • EPSS 0.19%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to ...

  • EPSS 0.08%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in Xen 4.9 through 4.14.x. On Arm, a guest is allowed to control whether memory accesses are bypassing the cache. This means that Xen needs to ensure that all writes (such as the ones during scrubbing) have reached the memory ...