Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.57%
  • Veröffentlicht 05.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:56

The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other im...

  • EPSS 0.8%
  • Veröffentlicht 04.06.2018 21:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identif...

  • EPSS 0.82%
  • Veröffentlicht 04.06.2018 21:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in...

  • EPSS 1.11%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lo...

  • EPSS 0.8%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacke...

  • EPSS 0.29%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in...

  • EPSS 0.73%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generate...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 31.05.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 02:44:13

The package `node-cli` before 1.0.0 insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to.

  • EPSS 4.3%
  • Veröffentlicht 31.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:43

In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.

  • EPSS 0.79%
  • Veröffentlicht 30.05.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:27

SchedMD Slurm before 17.02.11 and 17.1x.x before 17.11.7 mishandles user names (aka user_name fields) and group ids (aka gid fields).