Debian

Debian Linux

9921 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.8%
  • Veröffentlicht 14.05.2024 18:15:13
  • Zuletzt bearbeitet 01.04.2025 17:47:50

If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerability affects Firefox < 126, Firefox ESR < 115.11,...

  • EPSS 34.61%
  • Veröffentlicht 14.05.2024 18:15:12
  • Zuletzt bearbeitet 24.04.2025 19:15:46

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 15:12:29
  • Zuletzt bearbeitet 22.01.2026 20:39:28

In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head pa...

  • EPSS 0.67%
  • Veröffentlicht 14.05.2024 15:12:28
  • Zuletzt bearbeitet 22.01.2026 20:37:07

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout When the sco connection is established and then, the sco socket is releasing, timeout_work will be scheduled to judge ...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 15:12:28
  • Zuletzt bearbeitet 22.01.2026 20:37:12

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race condition between l2cap_chan_timeout() and l2cap_chan_del(). When we use l2cap_chan_del() to delete the c...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 15:12:27
  • Zuletzt bearbeitet 14.01.2025 14:27:22

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read cri...

  • EPSS 0.02%
  • Veröffentlicht 14.05.2024 15:12:27
  • Zuletzt bearbeitet 14.01.2025 14:26:09

In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, ...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 14:23:13
  • Zuletzt bearbeitet 23.12.2025 18:56:05

In the Linux kernel, the following vulnerability has been resolved: io_uring: drop any code related to SCM_RIGHTS This is dead code after we dropped support for passing io_uring fds over SCM_RIGHTS, get rid of it.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 07.05.2024 18:15:08
  • Zuletzt bearbeitet 04.11.2025 22:16:01

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can ...

  • EPSS 0.56%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:56:01

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...