linux-libc-dev |
CVE-2023-0266 |
高危 |
4.15.0-206.217 |
4.15.0-208.220 |
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0266
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-01-30 14:15 修改: 2023-08-29 17:59
|
linux-libc-dev |
CVE-2023-1281 |
高危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1281
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-22 14:15 修改: 2023-06-26 16:57
|
linux-libc-dev |
CVE-2023-1380 |
高危 |
4.15.0-206.217 |
4.15.0-212.223 |
Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-27 21:15 修改: 2023-12-08 20:45
|
linux-libc-dev |
CVE-2023-1829 |
高危 |
4.15.0-206.217 |
4.15.0-210.221 |
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1829
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-12 12:15 修改: 2023-10-05 14:52
|
linux-libc-dev |
CVE-2023-30456 |
高危 |
4.15.0-206.217 |
4.15.0-212.223 |
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30456
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-10 02:15 修改: 2023-07-26 17:15
|
linux-libc-dev |
CVE-2023-31436 |
高危 |
4.15.0-206.217 |
4.15.0-212.223 |
kernel: out-of-bounds write in qfq_change_class function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31436
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-28 02:15 修改: 2024-10-21 16:35
|
linux-libc-dev |
CVE-2023-32233 |
高危 |
4.15.0-206.217 |
4.15.0-212.223 |
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32233
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-05-08 20:15 修改: 2023-09-28 19:07
|
linux-libc-dev |
CVE-2023-3567 |
高危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-07-24 16:15 修改: 2024-09-13 19:15
|
libpython3.6-minimal |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:149e3a021fa6d8d08cf5757b4c04d460bdad4e7617db973f024c2b7e6dc1b8dc
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libpython3.6-stdlib |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:149e3a021fa6d8d08cf5757b4c04d460bdad4e7617db973f024c2b7e6dc1b8dc
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libssl1.1 |
CVE-2023-2650 |
中危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.23 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
libtinfo5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
libncurses5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
libncursesw5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
linux-libc-dev |
CVE-2022-3424 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: Use after Free in gru_set_context_option leading to kernel panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-06 23:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-36280 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36280
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2022-09-09 15:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2022-47929 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: NULL pointer dereference in traffic control subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47929
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-01-17 21:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2022-48708 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: pinctrl: single: fix potential NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48708
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:05
|
linux-libc-dev |
CVE-2022-48877 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: f2fs: let's avoid panic if extent_tree is not created
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48877
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-05 17:47
|
linux-libc-dev |
CVE-2022-48891 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: regulator: da9211: Use irq handler when ready
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48891
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:39
|
linux-libc-dev |
CVE-2022-48899 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: drm/virtio: Fix GEM handle creation UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48899
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:22
|
linux-libc-dev |
CVE-2022-48945 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: media: vivid: fix compose size exceed boundary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48945
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-09-23 10:15 修改: 2024-09-26 13:32
|
linux-libc-dev |
CVE-2022-48946 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: udf: Fix preallocation discarding at indirect extent boundary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48946
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:13
|
linux-libc-dev |
CVE-2022-48948 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48948
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:34
|
linux-libc-dev |
CVE-2022-48949 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: igb: Initialize mailbox message for VF reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48949
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:32
|
linux-libc-dev |
CVE-2022-48951 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48951
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:01
|
linux-libc-dev |
CVE-2022-48991 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48991
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:36
|
linux-libc-dev |
CVE-2023-0394 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: NULL pointer dereference in rawv6_push_pending_frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0394
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-01-26 21:18 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-0458 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0458
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-26 19:15 修改: 2023-05-09 13:58
|
linux-libc-dev |
CVE-2023-0459 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: Copy_from_user on 64-bit versions may leak kernel information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0459
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-05-25 14:15 修改: 2023-06-06 13:47
|
linux-libc-dev |
CVE-2023-1073 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: HID: check empty report_list in hid_validate_values()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1073
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15
|
linux-libc-dev |
CVE-2023-1074 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: sctp: fail if no bound addresses can be used for a given scope
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1074
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15
|
linux-libc-dev |
CVE-2023-2162 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: UAF during login when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-19 20:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-23455 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23455
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-01-12 07:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-23559 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23559
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-01-13 01:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2023-26545 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: mpls: double free on sysctl allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26545
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-02-25 04:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-28328 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28328
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-19 23:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-3161 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: fbcon: shift-out-of-bounds in fbcon_set_font()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3161
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-06-12 20:15 修改: 2023-06-22 00:17
|
linux-libc-dev |
CVE-2023-32269 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: user after free in nr_listen in net/netrom/af_netrom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32269
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-05-05 17:15 修改: 2023-05-11 23:04
|
linux-libc-dev |
CVE-2023-3358 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3358
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-06-28 22:15 修改: 2023-07-06 16:54
|
linux-libc-dev |
CVE-2023-52646 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: aio: fix mremap after fork null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-04-26 13:15 修改: 2024-04-26 15:32
|
linux-libc-dev |
CVE-2023-52703 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-11-07 17:35
|
linux-libc-dev |
CVE-2023-52705 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: nilfs2: fix underflow in second superblock position calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52705
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:18
|
linux-libc-dev |
CVE-2023-52730 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: mmc: sdio: fix possible resource leaks in some error paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52742 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: net: USB: Fix wrong-direction WARNING in plusb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52742
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52747 |
中危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: IB/hfi1: Restore allocated resources on failed copyout
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52893 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: gsmi: fix null-deref in gsmi_get_variable
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52893
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:24
|
linux-libc-dev |
CVE-2023-52894 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52894
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:27
|
linux-libc-dev |
CVE-2023-52900 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: nilfs2: fix general protection fault in nilfs_btree_insert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52900
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:40
|
linux-libc-dev |
CVE-2023-52901 |
中危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: usb: xhci: Check endpoint is valid before dereferencing it
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52901
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:37
|
linux-libc-dev |
CVE-2023-52907 |
中危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52907
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2024-08-21 07:15 修改: 2024-09-12 16:06
|
ncurses-base |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
ncurses-bin |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
openssl |
CVE-2023-2650 |
中危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.23 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
perl-base |
CVE-2023-31484 |
中危 |
5.26.1-6ubuntu0.6 |
5.26.1-6ubuntu0.7 |
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
python3.6 |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:149e3a021fa6d8d08cf5757b4c04d460bdad4e7617db973f024c2b7e6dc1b8dc
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
python3.6-minimal |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:149e3a021fa6d8d08cf5757b4c04d460bdad4e7617db973f024c2b7e6dc1b8dc
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libncurses5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libssl1.1 |
CVE-2023-0464 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2023-0465 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0466 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libncurses5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libtinfo5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
libtinfo5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
linux-libc-dev |
CVE-2021-3669 |
低危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3669
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2022-08-26 16:15 修改: 2023-07-07 19:16
|
linux-libc-dev |
CVE-2022-3903 |
低危 |
4.15.0-206.217 |
4.15.0-209.220 |
kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3903
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2022-11-14 21:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-41218 |
低危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: Report vmalloc UAF in dvb-core/dmxdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41218
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2022-09-21 07:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2023-0045 |
低危 |
4.15.0-206.217 |
4.15.0-208.220 |
kernel: Bypassing Spectre-BTI User Space Mitigations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-04-25 23:15 修改: 2023-08-11 19:53
|
linux-libc-dev |
CVE-2023-1118 |
低危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-02 18:15 修改: 2023-07-06 13:43
|
linux-libc-dev |
CVE-2023-1513 |
低危 |
4.15.0-206.217 |
4.15.0-211.222 |
kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:04
|
libncursesw5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-base |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-base |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-base |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
ncurses-base |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libncursesw5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-bin |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-bin |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-bin |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
ncurses-bin |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libncursesw5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
openssl |
CVE-2023-0464 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-0465 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0466 |
低危 |
1.1.1-1ubuntu2.1~18.04.21 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:1b470aacaff368380c02792973267f90efcc1ddc14bbba9e62b85e6892f6a23f
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libncursesw5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libncurses5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libncurses5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:b7e0fa7bfe7f9796f1268cca2e65a8bfb1e010277652cee9a9c9d077a83db3c4
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|