Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.86%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:42

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.

  • EPSS 5.59%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:42

The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Proto...

  • EPSS 0.51%
  • Veröffentlicht 16.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:04

In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will h...

Exploit
  • EPSS 0.7%
  • Veröffentlicht 16.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:31

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost....

Exploit
  • EPSS 7.59%
  • Veröffentlicht 16.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:45

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a...

  • EPSS 3.12%
  • Veröffentlicht 16.02.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:45

Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long...

  • EPSS 1.14%
  • Veröffentlicht 15.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:33

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an "empty" nick.

  • EPSS 0.64%
  • Veröffentlicht 15.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:34

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings.

  • EPSS 1.14%
  • Veröffentlicht 15.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:34

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur.

  • EPSS 0.82%
  • Veröffentlicht 15.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:34

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order.