Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 14.05.2024 15:12:27
  • Zuletzt bearbeitet 12.05.2026 12:16:32

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal of ovs_ct_limit_exit, is not part of the RCU read cri...

  • EPSS 0.02%
  • Veröffentlicht 14.05.2024 15:12:27
  • Zuletzt bearbeitet 12.05.2026 12:16:32

In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, ...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 14:23:13
  • Zuletzt bearbeitet 23.12.2025 18:56:05

In the Linux kernel, the following vulnerability has been resolved: io_uring: drop any code related to SCM_RIGHTS This is dead code after we dropped support for passing io_uring fds over SCM_RIGHTS, get rid of it.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 07.05.2024 18:15:08
  • Zuletzt bearbeitet 12.05.2026 12:16:35

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can ...

  • EPSS 0.85%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:34

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...

  • EPSS 0.36%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:34

nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...

  • EPSS 0.23%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:34

nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...

  • EPSS 0.61%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:35

nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 ...

  • EPSS 38.93%
  • Veröffentlicht 06.05.2024 15:15:23
  • Zuletzt bearbeitet 03.12.2025 15:32:11

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to intera...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 05.05.2024 20:15:07
  • Zuletzt bearbeitet 03.11.2025 21:16:11

dcmnet in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message.