Debian

Debian Linux

9921 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 10.11.2024 22:15:12
  • Zuletzt bearbeitet 03.11.2025 23:16:11

An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.

  • EPSS 0.05%
  • Veröffentlicht 10.11.2024 22:15:12
  • Zuletzt bearbeitet 03.11.2025 23:16:11

An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color space.

  • EPSS 0.24%
  • Veröffentlicht 10.11.2024 22:15:12
  • Zuletzt bearbeitet 03.11.2025 23:16:12

An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.

  • EPSS 0.1%
  • Veröffentlicht 10.11.2024 21:15:14
  • Zuletzt bearbeitet 03.11.2025 23:16:11

An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.

  • EPSS 0.17%
  • Veröffentlicht 27.10.2024 05:15:04
  • Zuletzt bearbeitet 15.10.2025 17:54:22

An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.

  • EPSS 0.08%
  • Veröffentlicht 21.10.2024 12:15:05
  • Zuletzt bearbeitet 18.11.2025 15:36:36

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1) Use...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 15.10.2024 21:15:10
  • Zuletzt bearbeitet 24.03.2025 14:41:38

In Libheif 1.17.6, insufficient checks in ImageOverlay::parse() decoding a heif file containing an overlay image with forged offsets can lead to an out-of-bounds read and write.

Warnung
  • EPSS 24.63%
  • Veröffentlicht 09.10.2024 13:15:12
  • Zuletzt bearbeitet 04.11.2025 14:35:50

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ...

  • EPSS 0.23%
  • Veröffentlicht 03.10.2024 17:15:15
  • Zuletzt bearbeitet 17.12.2024 19:28:03

NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend...

Exploit
  • EPSS 31.53%
  • Veröffentlicht 26.09.2024 22:15:04
  • Zuletzt bearbeitet 03.11.2025 23:16:12

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with ot...