Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.54%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid ...

  • EPSS 1.92%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger...

  • EPSS 2.73%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

  • EPSS 0.47%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.

  • EPSS 6.73%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network...

  • EPSS 0.06%
  • Veröffentlicht 29.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corru...

  • EPSS 0.07%
  • Veröffentlicht 29.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to c...

  • EPSS 0.07%
  • Veröffentlicht 29.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the...

  • EPSS 0.08%
  • Veröffentlicht 29.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, whic...

  • EPSS 0.06%
  • Veröffentlicht 29.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is...