Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.53%
  • Veröffentlicht 12.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:21

Directory traversal issues in the D-Mod extractor in DFArc and DFArc2 (as well as in RTsoft's Dink Smallwood HD / ProtonSDK version) before 3.14 allow an attacker to overwrite arbitrary files on the user's system.

  • EPSS 0.13%
  • Veröffentlicht 12.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:32

In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS...

  • EPSS 0.09%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:26

In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.

  • EPSS 0.03%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:27

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...

Exploit
  • EPSS 0.66%
  • Veröffentlicht 12.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:51

An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.

  • EPSS 81.09%
  • Veröffentlicht 12.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:49

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime result...

  • EPSS 1.06%
  • Veröffentlicht 12.06.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP reque...

  • EPSS 18.16%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affec...

  • EPSS 3.92%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 5...

  • EPSS 1.04%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:17

Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.