Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.78%
  • Veröffentlicht 31.10.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

  • EPSS 1.46%
  • Veröffentlicht 29.10.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequent...

  • EPSS 0.27%
  • Veröffentlicht 28.10.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow and crash when processing a malformed CUE (.cue) file.

  • EPSS 0.31%
  • Veröffentlicht 28.10.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow (with a resultant invalid free) and crash when processing a malformed CUE (.cue) file.

  • EPSS 0.25%
  • Veröffentlicht 28.10.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to an "Access violation near NULL on destination operand" and crash when processing a malformed CUE (.cue) file.

  • EPSS 76.53%
  • Veröffentlicht 27.10.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the ...

  • EPSS 8.55%
  • Veröffentlicht 27.10.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative ...

  • EPSS 0.77%
  • Veröffentlicht 27.10.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 27.10.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_comma...

  • EPSS 1.16%
  • Veröffentlicht 27.10.2017 05:29:02
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Use of an uninitialized value in Skia in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.