Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.54%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:00

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.

  • EPSS 0.54%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.

  • EPSS 0.38%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.

Exploit
  • EPSS 1.01%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the freexl::destroy_cell function.

Exploit
  • EPSS 0.77%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a memcpy call of the parse_SST function.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the parse_unicode_string function.

Exploit
  • EPSS 1.01%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the function read_mini_biff_next_record.

  • EPSS 1.79%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function allows command injection via a $(command) approach in the gplot rootname argument. This issue exists because of an incomplete fix for CVE-2018-3836.

  • EPSS 0.04%
  • Veröffentlicht 23.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:08

util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.