Debian

Debian Linux

9952 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 09.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:14

exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.

  • EPSS 0.06%
  • Veröffentlicht 09.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:14

An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can'...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 09.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:15

An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.

  • EPSS 0.04%
  • Veröffentlicht 09.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:15

An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 09.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:15

An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 09.05.2020 18:15:11
  • Zuletzt bearbeitet 03.11.2025 20:15:44

json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.

  • EPSS 0.13%
  • Veröffentlicht 08.05.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:51

There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 07.05.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:40

In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the me...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 07.05.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:40

In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.05.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:40

In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.