Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.96%
  • Veröffentlicht 04.06.2018 21:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in...

  • EPSS 1.12%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lo...

  • EPSS 0.8%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacke...

  • EPSS 0.47%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in...

  • EPSS 1.07%
  • Veröffentlicht 04.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generate...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 31.05.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 02:44:13

The package `node-cli` before 1.0.0 insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to.

  • EPSS 4.3%
  • Veröffentlicht 31.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:43

In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.

  • EPSS 0.79%
  • Veröffentlicht 30.05.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:27

SchedMD Slurm before 17.02.11 and 17.1x.x before 17.11.7 mishandles user names (aka user_name fields) and group ids (aka gid fields).

Exploit
  • EPSS 0.74%
  • Veröffentlicht 30.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:22

The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.

Exploit
  • EPSS 41.72%
  • Veröffentlicht 30.05.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:57

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that ...