Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 18.03.2024 11:15:09
  • Zuletzt bearbeitet 04.04.2025 14:51:32

In the Linux kernel, the following vulnerability has been resolved: block/rnbd-srv: Check for unlikely string overflow Since "dev_search_path" can technically be as large as PATH_MAX, there was a risk of truncation when copying it and a second stri...

  • EPSS 0.01%
  • Veröffentlicht 18.03.2024 11:15:09
  • Zuletzt bearbeitet 10.03.2025 15:48:56

In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when setting number of cpus to an odd number When the number of cpu cores is adjusted to 7 or other odd numbers, the zone size will become an odd number. The ...

  • EPSS 0.02%
  • Veröffentlicht 18.03.2024 11:15:09
  • Zuletzt bearbeitet 04.04.2025 14:49:01

In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we p...

  • EPSS 0.01%
  • Veröffentlicht 18.03.2024 11:15:08
  • Zuletzt bearbeitet 27.02.2025 03:20:23

In the Linux kernel, the following vulnerability has been resolved: crypto: scomp - fix req->dst buffer overflow The req->dst buffer size should be checked before copying from the scomp_scratch->dst to avoid req->dst buffer overflow problem.

  • EPSS 0.02%
  • Veröffentlicht 18.03.2024 11:15:08
  • Zuletzt bearbeitet 10.03.2025 15:50:52

In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init When the mpi_ec_ctx structure is initialized, some fields are not cleared, causing a crash when referencing the field...

  • EPSS 0.01%
  • Veröffentlicht 18.03.2024 11:15:07
  • Zuletzt bearbeitet 10.03.2025 15:28:37

In the Linux kernel, the following vulnerability has been resolved: binder: fix race between mmput() and do_exit() Task A calls binder_update_page_range() to allocate and insert pages on a remote address space from Task B. For this, Task A pins the...

  • EPSS 3.2%
  • Veröffentlicht 18.03.2024 02:15:06
  • Zuletzt bearbeitet 20.03.2025 20:15:30

A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters t...

  • EPSS 0.58%
  • Veröffentlicht 13.03.2024 16:15:29
  • Zuletzt bearbeitet 07.08.2025 12:15:27

Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0....

  • EPSS 52.45%
  • Veröffentlicht 13.03.2024 16:15:29
  • Zuletzt bearbeitet 29.10.2025 12:15:34

Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset unt...

  • EPSS 0.01%
  • Veröffentlicht 11.03.2024 18:15:19
  • Zuletzt bearbeitet 03.04.2025 15:20:30

In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corru...