Debian

Debian Linux

9142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 19.10.2015 10:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write reque...

  • EPSS 9.65%
  • Veröffentlicht 06.10.2015 01:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packe...

  • EPSS 10.16%
  • Veröffentlicht 06.10.2015 01:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field...

  • EPSS 9.57%
  • Veröffentlicht 01.10.2015 20:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.

Exploit
  • EPSS 19.75%
  • Veröffentlicht 28.09.2015 20:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

  • EPSS 7.79%
  • Veröffentlicht 28.09.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS respo...

  • EPSS 2.36%
  • Veröffentlicht 14.09.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.

  • EPSS 0.63%
  • Veröffentlicht 02.09.2015 10:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.

  • EPSS 0.06%
  • Veröffentlicht 31.08.2015 10:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that lev...

  • EPSS 21.23%
  • Veröffentlicht 31.08.2015 10:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f...