Debian

Debian Linux

9928 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 19.05.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:56:32

PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritat...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 19.05.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:14

a Improper Access Control vulnerability in of Open Build Service allows remote attackers to read files of an OBS package where the sourceaccess/access is disabled This issue affects: Open Build Service versions prior to 2.10.5.

  • EPSS 0.09%
  • Veröffentlicht 19.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:22

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.

  • EPSS 15.51%
  • Veröffentlicht 19.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:00

Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

  • EPSS 9.08%
  • Veröffentlicht 19.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:01

Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.

Exploit
  • EPSS 19.88%
  • Veröffentlicht 19.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:07

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of ...

  • EPSS 92.63%
  • Veröffentlicht 19.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:07

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local se...

  • EPSS 3.27%
  • Veröffentlicht 18.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:44

gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753...

  • EPSS 0.1%
  • Veröffentlicht 15.05.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:00:29

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

Exploit
  • EPSS 2.22%
  • Veröffentlicht 15.05.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:04

libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.