Debian

Debian Linux

9946 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Veröffentlicht 13.04.2024 15:15:52
  • Zuletzt bearbeitet 17.06.2025 20:58:12

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untr...

  • EPSS 0.16%
  • Veröffentlicht 13.04.2024 12:15:11
  • Zuletzt bearbeitet 04.11.2025 19:17:03

In the Linux kernel, the following vulnerability has been resolved: amdkfd: use calloc instead of kzalloc to avoid integer overflow This uses calloc instead of doing the multiplication which might overflow.

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 14:15:07
  • Zuletzt bearbeitet 27.03.2025 21:10:26

In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry...

  • EPSS 2.11%
  • Veröffentlicht 10.04.2024 12:15:09
  • Zuletzt bearbeitet 04.11.2025 19:17:08

HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 18.03.2025 17:04:12

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 27.03.2025 21:36:57

In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 27.03.2025 21:37:24

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...

  • EPSS 3.26%
  • Veröffentlicht 04.04.2024 20:15:08
  • Zuletzt bearbeitet 04.11.2025 22:15:53

Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.

  • EPSS 1.12%
  • Veröffentlicht 04.04.2024 20:15:08
  • Zuletzt bearbeitet 30.06.2025 12:55:47

HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, ...

  • EPSS 24.97%
  • Veröffentlicht 04.04.2024 15:15:38
  • Zuletzt bearbeitet 04.11.2025 19:17:05

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. ...