Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| linux | fixed | 6.19.6-2 | package | |
| linux | fixed | 6.12.74-2 | trixie | package |
| linux | fixed | 6.1.164-1 | bookworm | package |
| linux | fixed | 5.10.251-1 | bullseye | package |
Примечания
https://git.kernel.org/linus/e38c55d9f834e5b848bfed0f5c586aaf45acb825 (7.0-rc4)
NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
EPSS
Процентиль: 5%
0.00018
Низкий
Связанные уязвимости
github
1 день назад
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix memory leak in verify_header The function sets `*ns = NULL` on every call, leaking the namespace string allocated in previous iterations when multiple profiles are unpacked. This also breaks namespace consistency checking since *ns is always NULL when the comparison is made. Remove the incorrect assignment. The caller (aa_unpack) initializes *ns to NULL once before the loop, which is sufficient.
EPSS
Процентиль: 5%
0.00018
Низкий