| curl |
CVE-2022-32221 |
严重 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: POST following PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-05 22:15 修改: 2026-02-13 20:16
|
| dpkg |
CVE-2022-1664 |
严重 |
1.19.7 |
1.19.8 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-05-26 14:15 修改: 2024-11-21 06:41
|
| git |
CVE-2022-23521 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u7 |
git: gitattributes parsing integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-01-17 23:15 修改: 2024-11-21 06:48
|
| git |
CVE-2022-41903 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u7 |
git: Heap overflow in `git archive`, `git log --format` leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-01-17 23:15 修改: 2024-11-21 07:24
|
| git |
CVE-2024-32002 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: Recursive clones RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 19:15 修改: 2025-11-04 17:15
|
| git-man |
CVE-2022-23521 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u7 |
git: gitattributes parsing integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-01-17 23:15 修改: 2024-11-21 06:48
|
| git-man |
CVE-2022-41903 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u7 |
git: Heap overflow in `git archive`, `git log --format` leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-01-17 23:15 修改: 2024-11-21 07:24
|
| git-man |
CVE-2024-32002 |
严重 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: Recursive clones RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 19:15 修改: 2025-11-04 17:15
|
| libc-bin |
CVE-2021-33574 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: mq_notify does not handle separately allocated thread attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-05-25 22:15 修改: 2024-11-21 06:09
|
| libc-bin |
CVE-2021-35942 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Arbitrary read in wordexp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-22 18:15 修改: 2026-02-13 21:16
|
| libc-bin |
CVE-2022-23218 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in svcunix_create via long pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc-bin |
CVE-2022-23219 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc-dev-bin |
CVE-2021-33574 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: mq_notify does not handle separately allocated thread attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-05-25 22:15 修改: 2024-11-21 06:09
|
| libc-dev-bin |
CVE-2021-35942 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Arbitrary read in wordexp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-22 18:15 修改: 2026-02-13 21:16
|
| libc-dev-bin |
CVE-2022-23218 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in svcunix_create via long pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc-dev-bin |
CVE-2022-23219 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc6 |
CVE-2021-33574 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: mq_notify does not handle separately allocated thread attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-05-25 22:15 修改: 2024-11-21 06:09
|
| libc6 |
CVE-2021-35942 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Arbitrary read in wordexp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-22 18:15 修改: 2026-02-13 21:16
|
| libc6 |
CVE-2022-23218 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in svcunix_create via long pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc6 |
CVE-2022-23219 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc6-dev |
CVE-2021-33574 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: mq_notify does not handle separately allocated thread attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-05-25 22:15 修改: 2024-11-21 06:09
|
| libc6-dev |
CVE-2021-35942 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Arbitrary read in wordexp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-22 18:15 修改: 2026-02-13 21:16
|
| libc6-dev |
CVE-2022-23218 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in svcunix_create via long pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libc6-dev |
CVE-2022-23219 |
严重 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-14 07:15 修改: 2025-05-05 17:17
|
| libcurl3-gnutls |
CVE-2022-32221 |
严重 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: POST following PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-12-05 22:15 修改: 2026-02-13 20:16
|
| libcurl4 |
CVE-2022-32221 |
严重 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: POST following PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-05 22:15 修改: 2026-02-13 20:16
|
| libdb5.3 |
CVE-2019-8457 |
严重 |
5.3.28+dfsg1-0.5 |
|
sqlite: heap out-of-bound read in function rtreenode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-05-30 16:29 修改: 2024-11-21 04:49
|
| libdpkg-perl |
CVE-2022-1664 |
严重 |
1.19.7 |
1.19.8 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-26 14:15 修改: 2024-11-21 06:41
|
| libexpat1 |
CVE-2022-22822 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in addBinding in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-22823 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in build_model in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-22824 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in defineAttribute in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-23852 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in function XML_GetBuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-24 02:15 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-25235 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-16 01:15 修改: 2025-05-05 17:18
|
| libexpat1 |
CVE-2022-25236 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-16 01:15 修改: 2025-05-05 17:18
|
| libexpat1 |
CVE-2022-25315 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Integer overflow in storeRawNames()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-18 05:15 修改: 2025-05-05 17:18
|
| libksba8 |
CVE-2022-3515 |
严重 |
1.3.5-2 |
1.3.5-2+deb10u1 |
libksba: integer overflow may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2023-01-12 15:15 修改: 2025-04-08 16:15
|
| libksba8 |
CVE-2022-47629 |
严重 |
1.3.5-2 |
1.3.5-2+deb10u2 |
libksba: integer overflow to code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-12-20 23:15 修改: 2025-04-16 18:16
|
| libldap-2.4-2 |
CVE-2022-29155 |
严重 |
2.4.47+dfsg-3+deb10u6 |
2.4.47+dfsg-3+deb10u7 |
openldap: OpenLDAP SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-04 20:15 修改: 2024-11-21 06:58
|
| libldap-common |
CVE-2022-29155 |
严重 |
2.4.47+dfsg-3+deb10u6 |
2.4.47+dfsg-3+deb10u7 |
openldap: OpenLDAP SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-04 20:15 修改: 2024-11-21 06:58
|
| libpcre2-8-0 |
CVE-2022-1586 |
严重 |
10.32-5 |
10.32-5+deb10u1 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1586
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-16 21:15 修改: 2025-03-25 19:39
|
| libpcre2-8-0 |
CVE-2022-1587 |
严重 |
10.32-5 |
10.32-5+deb10u1 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1587
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-16 21:15 修改: 2024-11-21 06:41
|
| libpython2.7-minimal |
CVE-2021-3177 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-01-19 06:15 修改: 2025-12-18 15:15
|
| libpython2.7-minimal |
CVE-2022-48565 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: XML External Entity in XML processing plistlib module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libpython2.7-stdlib |
CVE-2021-3177 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-01-19 06:15 修改: 2025-12-18 15:15
|
| libpython2.7-stdlib |
CVE-2022-48565 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: XML External Entity in XML processing plistlib module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libsqlite3-0 |
CVE-2020-35527 |
严重 |
3.27.2-3+deb10u1 |
3.27.2-3+deb10u2 |
sqlite: Out of bounds access during table rename
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35527
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-09-01 18:15 修改: 2024-11-21 05:27
|
| libssl1.1 |
CVE-2021-3711 |
严重 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
openssl: SM2 Decryption Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-24 15:15 修改: 2024-11-21 06:22
|
| libtasn1-6 |
CVE-2021-46848 |
严重 |
4.13-3 |
4.13-3+deb10u1 |
libtasn1: Out-of-bound access in ETYPE_OK
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-10-24 14:15 修改: 2025-05-07 15:15
|
| linux-libc-dev |
CVE-2023-25775 |
严重 |
4.19.194-2 |
4.19.304-1 |
kernel: irdma: Improper access control
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25775
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-11 03:15 修改: 2024-11-21 07:50
|
| openssh-client |
CVE-2023-38408 |
严重 |
1:7.9p1-10+deb10u2 |
1:7.9p1-10+deb10u3 |
openssh: Remote code execution in ssh-agent PKCS#11 support
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38408
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-07-20 03:15 修改: 2024-11-21 08:13
|
| openssl |
CVE-2021-3711 |
严重 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
openssl: SM2 Decryption Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-24 15:15 修改: 2024-11-21 06:22
|
| python2.7 |
CVE-2021-3177 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-01-19 06:15 修改: 2025-12-18 15:15
|
| python2.7 |
CVE-2022-48565 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: XML External Entity in XML processing plistlib module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| python2.7-minimal |
CVE-2021-3177 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-01-19 06:15 修改: 2025-12-18 15:15
|
| python2.7-minimal |
CVE-2022-48565 |
严重 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: XML External Entity in XML processing plistlib module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| wget |
CVE-2024-38428 |
严重 |
1.20.1-1.1 |
|
wget: Misinterpretation of input may lead to improper behavior
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-06-16 03:15 修改: 2025-04-21 10:15
|
| zlib1g |
CVE-2022-37434 |
严重 |
1:1.2.11.dfsg-1 |
1:1.2.11.dfsg-1+deb10u2 |
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-05 07:15 修改: 2025-05-30 20:15
|
| zlib1g |
CVE-2023-45853 |
严重 |
1:1.2.11.dfsg-1 |
|
zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-10-14 02:15 修改: 2024-12-20 17:41
|
| libc-bin |
CVE-2020-1752 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: use-after-free in glob() function when expanding ~user
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-30 17:15 修改: 2024-11-21 05:11
|
| libc-bin |
CVE-2020-6096 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: signed comparison vulnerability in the ARMv7 memcpy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-01 22:15 修改: 2024-11-21 05:35
|
| libc-bin |
CVE-2021-3326 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-01-27 20:15 修改: 2025-06-09 16:15
|
| libc-bin |
CVE-2021-3999 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Off-by-one buffer overflow/underflow in getcwd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-24 16:15 修改: 2025-12-02 21:15
|
| libc-bin |
CVE-2024-2961 |
高危 |
2.28-10 |
2.28-10+deb10u3 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-04-17 18:15 修改: 2026-05-12 12:16
|
| libc-bin |
CVE-2024-33599 |
高危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| g++-8 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| g++-8 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| gcc-8 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| gcc-8 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libc-dev-bin |
CVE-2020-1751 |
高危 |
2.28-10 |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-17 19:15 修改: 2024-11-21 05:11
|
| libc-dev-bin |
CVE-2020-1752 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: use-after-free in glob() function when expanding ~user
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-30 17:15 修改: 2024-11-21 05:11
|
| libc-dev-bin |
CVE-2020-6096 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: signed comparison vulnerability in the ARMv7 memcpy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-01 22:15 修改: 2024-11-21 05:35
|
| libc-dev-bin |
CVE-2021-3326 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-01-27 20:15 修改: 2025-06-09 16:15
|
| libc-dev-bin |
CVE-2021-3999 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Off-by-one buffer overflow/underflow in getcwd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-24 16:15 修改: 2025-12-02 21:15
|
| libc-dev-bin |
CVE-2024-2961 |
高危 |
2.28-10 |
2.28-10+deb10u3 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 18:15 修改: 2026-05-12 12:16
|
| libc-dev-bin |
CVE-2024-33599 |
高危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| gcc-8-base |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| gcc-8-base |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| cpp-8 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| curl |
CVE-2021-22946 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| libc6 |
CVE-2020-1751 |
高危 |
2.28-10 |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-17 19:15 修改: 2024-11-21 05:11
|
| libc6 |
CVE-2020-1752 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: use-after-free in glob() function when expanding ~user
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-30 17:15 修改: 2024-11-21 05:11
|
| libc6 |
CVE-2020-6096 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: signed comparison vulnerability in the ARMv7 memcpy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-01 22:15 修改: 2024-11-21 05:35
|
| libc6 |
CVE-2021-3326 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-01-27 20:15 修改: 2025-06-09 16:15
|
| libc6 |
CVE-2021-3999 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Off-by-one buffer overflow/underflow in getcwd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-24 16:15 修改: 2025-12-02 21:15
|
| libc6 |
CVE-2024-2961 |
高危 |
2.28-10 |
2.28-10+deb10u3 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-04-17 18:15 修改: 2026-05-12 12:16
|
| libc6 |
CVE-2024-33599 |
高危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| curl |
CVE-2022-22576 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-26 17:15 修改: 2026-04-16 15:16
|
| git |
CVE-2019-1387 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: Remote code execution in recursive clones with nested submodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2019-12-18 21:15 修改: 2025-11-04 16:15
|
| git |
CVE-2021-21300 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u4 |
git: remote code execution during clone operation on case-insensitive filesystems
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21300
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-03-09 20:15 修改: 2024-11-21 05:47
|
| git |
CVE-2021-40330 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u4 |
git: unexpected cross-protocol requests via a repository path containing a newline character
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40330
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-08-31 04:15 修改: 2024-11-21 06:23
|
| libc6-dev |
CVE-2020-1751 |
高危 |
2.28-10 |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-17 19:15 修改: 2024-11-21 05:11
|
| libc6-dev |
CVE-2020-1752 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: use-after-free in glob() function when expanding ~user
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-30 17:15 修改: 2024-11-21 05:11
|
| libc6-dev |
CVE-2020-6096 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: signed comparison vulnerability in the ARMv7 memcpy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-04-01 22:15 修改: 2024-11-21 05:35
|
| libc6-dev |
CVE-2021-3326 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-01-27 20:15 修改: 2025-06-09 16:15
|
| libc6-dev |
CVE-2021-3999 |
高危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Off-by-one buffer overflow/underflow in getcwd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-24 16:15 修改: 2025-12-02 21:15
|
| libc6-dev |
CVE-2024-2961 |
高危 |
2.28-10 |
2.28-10+deb10u3 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 18:15 修改: 2026-05-12 12:16
|
| libc6-dev |
CVE-2024-33599 |
高危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libcc1-0 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libcc1-0 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libcom-err2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-14 21:15 修改: 2025-04-23 19:15
|
| git |
CVE-2022-24765 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 06:51
|
| libcurl3-gnutls |
CVE-2021-22946 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| libcurl3-gnutls |
CVE-2022-22576 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-05-26 17:15 修改: 2026-04-16 15:16
|
| libcurl3-gnutls |
CVE-2022-27781 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| libcurl3-gnutls |
CVE-2022-27782 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| libcurl3-gnutls |
CVE-2023-27533 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-03-30 20:15 修改: 2026-02-13 21:16
|
| libcurl3-gnutls |
CVE-2023-27534 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u9 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-03-30 20:15 修改: 2025-04-23 17:16
|
| libcurl3-gnutls |
CVE-2024-2398 |
高危 |
7.64.0-4+deb10u2 |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-03-27 08:15 修改: 2025-07-30 19:42
|
| git |
CVE-2022-29187 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: Bypass of safe.directory protections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-07-12 21:15 修改: 2024-11-21 06:58
|
| libcurl4 |
CVE-2021-22946 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| libcurl4 |
CVE-2022-22576 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-26 17:15 修改: 2026-04-16 15:16
|
| libcurl4 |
CVE-2022-27781 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| libcurl4 |
CVE-2022-27782 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| libcurl4 |
CVE-2023-27533 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2026-02-13 21:16
|
| libcurl4 |
CVE-2023-27534 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u9 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-04-23 17:16
|
| libcurl4 |
CVE-2024-2398 |
高危 |
7.64.0-4+deb10u2 |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-03-27 08:15 修改: 2025-07-30 19:42
|
| git |
CVE-2022-39260 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: git shell function that splits command arguments can lead to arbitrary heap writes.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-10-19 12:15 修改: 2024-11-21 07:17
|
| git |
CVE-2023-23946 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u8 |
git: git apply: a path outside the working tree can be overwritten with crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-14 20:15 修改: 2024-11-21 07:47
|
| git |
CVE-2023-25652 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 20:15 修改: 2025-11-04 17:15
|
| git |
CVE-2023-29007 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: arbitrary configuration injection when renaming or deleting a section from a configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 21:15 修改: 2025-11-04 17:15
|
| git |
CVE-2024-32004 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: RCE while cloning local repos
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 19:15 修改: 2026-01-06 17:09
|
| git |
CVE-2024-32021 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: symlink bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 20:15 修改: 2026-01-05 19:19
|
| git |
CVE-2024-32465 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: additional local RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 20:15 修改: 2026-01-05 19:15
|
| curl |
CVE-2022-27781 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| curl |
CVE-2022-27782 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 15:16
|
| libexpat1 |
CVE-2021-45960 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-01 19:15 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2021-46143 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in doProlog in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-06 04:15 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-22825 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in lookup in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-22826 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in nextScaffoldPart in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-22827 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in storeAtts in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-10 14:12 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-23990 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: integer overflow in the doProlog function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-01-26 19:15 修改: 2025-05-05 17:17
|
| libexpat1 |
CVE-2022-25314 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Integer overflow in copyString()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-18 05:15 修改: 2025-05-05 17:18
|
| libexpat1 |
CVE-2022-40674 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u5 |
expat: a use-after-free in the doContent function in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-14 11:15 修改: 2025-05-30 20:15
|
| libexpat1 |
CVE-2022-43680 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u6 |
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-10-24 14:15 修改: 2025-05-30 20:15
|
| libexpat1 |
CVE-2023-52425 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u7 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-02-04 20:15 修改: 2025-11-04 19:16
|
| libext2fs2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-14 21:15 修改: 2025-04-23 19:15
|
| libgcc-8-dev |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libgcc-8-dev |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libgcc1 |
CVE-2018-12886 |
高危 |
1:8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libgcc1 |
CVE-2019-15847 |
高危 |
1:8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libgcrypt20 |
CVE-2021-33560 |
高危 |
1.8.4-5+deb10u1 |
|
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-06-08 11:15 修改: 2025-12-03 15:15
|
| libglib2.0-0 |
CVE-2023-29499 |
高危 |
2.58.3-2+deb10u3 |
2.58.3-2+deb10u5 |
glib: GVariant offset table entry size is not checked in is_normal()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-14 20:15 修改: 2024-11-21 07:57
|
| libgmp10 |
CVE-2021-43618 |
高危 |
2:6.1.2+dfsg-4 |
2:6.1.2+dfsg-4+deb10u1 |
gmp: Integer overflow and resultant buffer overflow via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-11-15 04:15 修改: 2024-11-21 06:29
|
| libgnutls30 |
CVE-2022-2509 |
高危 |
3.6.7-4+deb10u7 |
3.6.7-4+deb10u9 |
gnutls: Double free during gnutls_pkcs7_verify
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-01 14:15 修改: 2025-12-02 21:15
|
| libgnutls30 |
CVE-2023-0361 |
高危 |
3.6.7-4+deb10u7 |
3.6.7-4+deb10u10 |
gnutls: timing side-channel in the TLS RSA key exchange code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-02-15 18:15 修改: 2025-03-19 18:15
|
| libgnutls30 |
CVE-2024-0553 |
高危 |
3.6.7-4+deb10u7 |
3.6.7-4+deb10u12 |
gnutls: incomplete fix for CVE-2023-5981
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-01-16 12:15 修改: 2026-03-24 12:16
|
| libgomp1 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libgomp1 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libgssapi-krb5-2 |
CVE-2021-36222 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u2 |
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-07-22 18:15 修改: 2024-11-21 06:13
|
| libgssapi-krb5-2 |
CVE-2022-42898 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u5 |
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-25 06:15 修改: 2025-04-14 19:15
|
| libidn2-0 |
CVE-2019-12290 |
高危 |
2.0.5-1+deb10u1 |
|
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specifi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12290
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-10-22 16:15 修改: 2024-11-21 04:22
|
| libitm1 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libitm1 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libk5crypto3 |
CVE-2021-36222 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u2 |
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-07-22 18:15 修改: 2024-11-21 06:13
|
| libk5crypto3 |
CVE-2022-42898 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u5 |
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-25 06:15 修改: 2025-04-14 19:15
|
| libkrb5-3 |
CVE-2021-36222 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u2 |
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-07-22 18:15 修改: 2024-11-21 06:13
|
| libkrb5-3 |
CVE-2022-42898 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u5 |
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-25 06:15 修改: 2025-04-14 19:15
|
| libkrb5support0 |
CVE-2021-36222 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u2 |
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-07-22 18:15 修改: 2024-11-21 06:13
|
| libkrb5support0 |
CVE-2022-42898 |
高危 |
1.17-3+deb10u1 |
1.17-3+deb10u5 |
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-12-25 06:15 修改: 2025-04-14 19:15
|
| curl |
CVE-2023-27533 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2026-02-13 21:16
|
| git-man |
CVE-2019-1387 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: Remote code execution in recursive clones with nested submodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2019-12-18 21:15 修改: 2025-11-04 16:15
|
| git-man |
CVE-2021-21300 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u4 |
git: remote code execution during clone operation on case-insensitive filesystems
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21300
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-03-09 20:15 修改: 2024-11-21 05:47
|
| libldap-2.4-2 |
CVE-2023-2953 |
高危 |
2.4.47+dfsg-3+deb10u6 |
|
openldap: null pointer dereference in ber_memalloc_x function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-30 22:15 修改: 2025-01-10 22:15
|
| git-man |
CVE-2021-40330 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u4 |
git: unexpected cross-protocol requests via a repository path containing a newline character
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40330
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-08-31 04:15 修改: 2024-11-21 06:23
|
| libldap-common |
CVE-2023-2953 |
高危 |
2.4.47+dfsg-3+deb10u6 |
|
openldap: null pointer dereference in ber_memalloc_x function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-30 22:15 修改: 2025-01-10 22:15
|
| liblsan0 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| liblsan0 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| liblzma5 |
CVE-2022-1271 |
高危 |
5.2.4-1 |
5.2.4-1+deb10u1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-31 16:15 修改: 2025-06-09 15:15
|
| libmpx2 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libmpx2 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libncurses6 |
CVE-2021-39537 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-09-20 16:15 修改: 2024-11-21 06:19
|
| libncurses6 |
CVE-2022-29458 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u3 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| libncurses6 |
CVE-2023-29491 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-14 01:15 修改: 2025-11-04 19:15
|
| libncursesw6 |
CVE-2021-39537 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-09-20 16:15 修改: 2024-11-21 06:19
|
| libncursesw6 |
CVE-2022-29458 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u3 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| libncursesw6 |
CVE-2023-29491 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 01:15 修改: 2025-11-04 19:15
|
| libnghttp2-14 |
CVE-2020-11080 |
高危 |
1.36.0-2+deb10u1 |
1.36.0-2+deb10u2 |
nghttp2: overly large SETTINGS frames can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11080
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2020-06-03 23:15 修改: 2024-11-21 04:56
|
| libnghttp2-14 |
CVE-2023-44487 |
高危 |
1.36.0-2+deb10u1 |
1.36.0-2+deb10u2 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-10-10 14:15 修改: 2026-05-12 15:10
|
| git-man |
CVE-2022-24765 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 06:51
|
| git-man |
CVE-2022-29187 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: Bypass of safe.directory protections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-07-12 21:15 修改: 2024-11-21 06:58
|
| libpcre2-8-0 |
CVE-2019-20454 |
高危 |
10.32-5 |
10.32-5+deb10u1 |
pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20454
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2020-02-14 14:15 修改: 2024-11-21 04:38
|
| libperl5.28 |
CVE-2020-16156 |
高危 |
5.28.1-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-12-13 18:15 修改: 2025-11-03 22:15
|
| libperl5.28 |
CVE-2023-31484 |
高危 |
5.28.1-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-29 00:15 修改: 2025-11-03 22:16
|
| git-man |
CVE-2022-39260 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: git shell function that splits command arguments can lead to arbitrary heap writes.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-10-19 12:15 修改: 2024-11-21 07:17
|
| git-man |
CVE-2023-23946 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u8 |
git: git apply: a path outside the working tree can be overwritten with crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-14 20:15 修改: 2024-11-21 07:47
|
| libpython2.7-minimal |
CVE-2015-20107 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: mailcap: findmatch() function does not sanitize the second argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-13 16:15 修改: 2025-11-03 22:15
|
| libpython2.7-minimal |
CVE-2019-20907 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: infinite loop in the tarfile module via crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-07-13 13:15 修改: 2024-11-21 04:39
|
| libpython2.7-minimal |
CVE-2020-10735 |
高危 |
2.7.16-2+deb10u1 |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-09 14:15 修改: 2025-11-03 22:15
|
| libpython2.7-minimal |
CVE-2020-26116 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CRLF injection via HTTP request method in httplib/http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-09-27 04:15 修改: 2024-11-21 05:19
|
| libpython2.7-minimal |
CVE-2021-3737 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-04 19:15 修改: 2025-12-17 22:15
|
| libpython2.7-minimal |
CVE-2022-0391 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-09 23:15 修改: 2025-12-17 21:15
|
| libpython2.7-minimal |
CVE-2022-45061 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-11-09 07:15 修改: 2025-11-03 22:16
|
| libpython2.7-minimal |
CVE-2022-48560 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: use after free in heappushpop() of heapq module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libpython2.7-minimal |
CVE-2023-24329 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-17 15:15 修改: 2025-11-03 22:16
|
| git-man |
CVE-2023-25652 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 20:15 修改: 2025-11-04 17:15
|
| git-man |
CVE-2023-29007 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: arbitrary configuration injection when renaming or deleting a section from a configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 21:15 修改: 2025-11-04 17:15
|
| libpython2.7-stdlib |
CVE-2015-20107 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: mailcap: findmatch() function does not sanitize the second argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-13 16:15 修改: 2025-11-03 22:15
|
| libpython2.7-stdlib |
CVE-2019-20907 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: infinite loop in the tarfile module via crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-07-13 13:15 修改: 2024-11-21 04:39
|
| libpython2.7-stdlib |
CVE-2020-10735 |
高危 |
2.7.16-2+deb10u1 |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-09 14:15 修改: 2025-11-03 22:15
|
| libpython2.7-stdlib |
CVE-2020-26116 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CRLF injection via HTTP request method in httplib/http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-09-27 04:15 修改: 2024-11-21 05:19
|
| libpython2.7-stdlib |
CVE-2021-3737 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-04 19:15 修改: 2025-12-17 22:15
|
| libpython2.7-stdlib |
CVE-2022-0391 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-09 23:15 修改: 2025-12-17 21:15
|
| libpython2.7-stdlib |
CVE-2022-45061 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-11-09 07:15 修改: 2025-11-03 22:16
|
| libpython2.7-stdlib |
CVE-2022-48560 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: use after free in heappushpop() of heapq module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libpython2.7-stdlib |
CVE-2023-24329 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-17 15:15 修改: 2025-11-03 22:16
|
| libquadmath0 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libquadmath0 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libsasl2-2 |
CVE-2022-24407 |
高危 |
2.1.27+dfsg-1+deb10u1 |
2.1.27+dfsg-1+deb10u2 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-02-24 15:15 修改: 2024-11-21 06:50
|
| libsasl2-modules-db |
CVE-2022-24407 |
高危 |
2.1.27+dfsg-1+deb10u1 |
2.1.27+dfsg-1+deb10u2 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-02-24 15:15 修改: 2024-11-21 06:50
|
| git-man |
CVE-2024-32004 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: RCE while cloning local repos
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 19:15 修改: 2026-01-06 17:09
|
| libsqlite3-0 |
CVE-2019-19603 |
高危 |
3.27.2-3+deb10u1 |
|
sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19603
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2019-12-09 19:15 修改: 2024-11-21 04:35
|
| libsqlite3-0 |
CVE-2020-35525 |
高危 |
3.27.2-3+deb10u1 |
3.27.2-3+deb10u2 |
sqlite: Null pointer derreference in src/select.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35525
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-09-01 18:15 修改: 2024-11-21 05:27
|
| libsqlite3-0 |
CVE-2023-7104 |
高危 |
3.27.2-3+deb10u1 |
|
sqlite: heap-buffer-overflow at sessionfuzz
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2023-12-29 10:15 修改: 2025-11-03 22:16
|
| libss2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-14 21:15 修改: 2025-04-23 19:15
|
| libssh2-1 |
CVE-2019-13115 |
高危 |
1.8.0-2.1 |
1.8.0-2.1+deb10u1 |
libssh2: integer overflow in kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13115
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2019-07-16 18:15 修改: 2024-11-21 04:24
|
| libssh2-1 |
CVE-2019-17498 |
高危 |
1.8.0-2.1 |
1.8.0-2.1+deb10u1 |
libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17498
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2019-10-21 22:15 修改: 2024-11-21 04:32
|
| libssh2-1 |
CVE-2020-22218 |
高危 |
1.8.0-2.1 |
1.8.0-2.1+deb10u1 |
libssh2: use-of-uninitialized-value in _libssh2_transport_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22218
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:13
|
| git-man |
CVE-2024-32021 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: symlink bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 20:15 修改: 2026-01-05 19:19
|
| libssl1.1 |
CVE-2021-3712 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-24 15:15 修改: 2026-04-16 15:16
|
| libssl1.1 |
CVE-2022-0778 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u8 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-03-15 17:15 修改: 2026-04-14 10:16
|
| libssl1.1 |
CVE-2022-1292 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u2 |
openssl: c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-03 16:15 修改: 2025-08-13 14:15
|
| libssl1.1 |
CVE-2022-2068 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u3 |
openssl: the c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-21 15:15 修改: 2025-11-03 22:15
|
| libssl1.1 |
CVE-2022-4450 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| libssl1.1 |
CVE-2023-0215 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| libssl1.1 |
CVE-2023-0286 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| libssl1.1 |
CVE-2023-0464 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-22 17:15 修改: 2025-05-05 16:15
|
| libstdc++-8-dev |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libstdc++-8-dev |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libstdc++6 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libstdc++6 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libsvn1 |
CVE-2022-24070 |
高危 |
1.10.4-1+deb10u2 |
1.10.4-1+deb10u3 |
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24070
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 06:49
|
| libsystemd0 |
CVE-2019-3843 |
高危 |
241-7~deb10u7 |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-04-26 21:29 修改: 2024-11-21 04:42
|
| libsystemd0 |
CVE-2019-3844 |
高危 |
241-7~deb10u7 |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-04-26 21:29 修改: 2024-11-21 04:42
|
| libsystemd0 |
CVE-2023-26604 |
高危 |
241-7~deb10u7 |
241-7~deb10u9 |
systemd: privilege escalation via the less pager
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-03-03 16:15 修改: 2025-06-20 19:17
|
| libsystemd0 |
CVE-2023-50387 |
高危 |
241-7~deb10u7 |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-14 16:15 修改: 2025-11-04 19:16
|
| libsystemd0 |
CVE-2023-50868 |
高危 |
241-7~deb10u7 |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-14 16:15 修改: 2025-12-23 20:20
|
| git-man |
CVE-2024-32465 |
高危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: additional local RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-05-14 20:15 修改: 2026-01-05 19:15
|
| libtinfo6 |
CVE-2021-39537 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-09-20 16:15 修改: 2024-11-21 06:19
|
| libtinfo6 |
CVE-2022-29458 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u3 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| libtinfo6 |
CVE-2023-29491 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 01:15 修改: 2025-11-04 19:15
|
| libtsan0 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libtsan0 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libubsan1 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libubsan1 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| libudev1 |
CVE-2019-3843 |
高危 |
241-7~deb10u7 |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-04-26 21:29 修改: 2024-11-21 04:42
|
| libudev1 |
CVE-2019-3844 |
高危 |
241-7~deb10u7 |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-04-26 21:29 修改: 2024-11-21 04:42
|
| libudev1 |
CVE-2023-26604 |
高危 |
241-7~deb10u7 |
241-7~deb10u9 |
systemd: privilege escalation via the less pager
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-03-03 16:15 修改: 2025-06-20 19:17
|
| libudev1 |
CVE-2023-50387 |
高危 |
241-7~deb10u7 |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-14 16:15 修改: 2025-11-04 19:16
|
| libudev1 |
CVE-2023-50868 |
高危 |
241-7~deb10u7 |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-14 16:15 修改: 2025-12-23 20:20
|
| gzip |
CVE-2022-1271 |
高危 |
1.9-3 |
1.9-3+deb10u1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-31 16:15 修改: 2025-06-09 15:15
|
| linux-libc-dev |
CVE-2013-7445 |
高危 |
4.19.194-2 |
|
kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7445
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2015-10-16 01:59 修改: 2026-05-06 22:30
|
| linux-libc-dev |
CVE-2019-19449 |
高危 |
4.19.194-2 |
|
kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19449
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-12-08 02:15 修改: 2024-11-21 04:34
|
| linux-libc-dev |
CVE-2019-19814 |
高危 |
4.19.194-2 |
|
kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19814
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-12-17 06:15 修改: 2024-11-21 04:35
|
| linux-libc-dev |
CVE-2019-25162 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: use after free in i2c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25162
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 18:15 修改: 2024-11-21 04:40
|
| linux-libc-dev |
CVE-2020-12362 |
高危 |
4.19.194-2 |
|
kernel: Integer overflow in Intel(R) Graphics Drivers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12362
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-17 14:15 修改: 2024-11-21 04:59
|
| linux-libc-dev |
CVE-2020-16119 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: DCCP CCID structure use-after-free may lead to DoS or code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16119
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-01-14 01:15 修改: 2024-11-21 05:06
|
| linux-libc-dev |
CVE-2021-20322 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20322
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-18 18:15 修改: 2024-11-21 05:46
|
| linux-libc-dev |
CVE-2021-22543 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22543
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-05-26 11:15 修改: 2024-11-21 05:50
|
| linux-libc-dev |
CVE-2021-22600 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: double free in packet_set_ring() in net/packet/af_packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-26 14:15 修改: 2025-10-24 13:54
|
| linux-libc-dev |
CVE-2021-33631 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: ext4: kernel bug in ext4_write_inline_data_end()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33631
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-18 15:15 修改: 2025-04-02 18:33
|
| linux-libc-dev |
CVE-2021-33909 |
高危 |
4.19.194-2 |
4.19.194-3 |
kernel: size_t-to-int conversion vulnerability in the filesystem layer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33909
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-20 19:15 修改: 2024-11-21 06:09
|
| linux-libc-dev |
CVE-2021-3444 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: bpf verifier incorrect mod32 truncation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3444
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-03-23 18:15 修改: 2024-11-21 06:21
|
| linux-libc-dev |
CVE-2021-35039 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: allows loading unsigned kernel modules via init_module syscall
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35039
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-07 01:15 修改: 2024-11-21 06:11
|
| linux-libc-dev |
CVE-2021-3600 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: eBPF 32-bit source register truncation on div/mod
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-08 19:15 修改: 2024-11-21 06:21
|
| linux-libc-dev |
CVE-2021-3609 |
高危 |
4.19.194-2 |
4.19.194-3 |
kernel: race condition in net/can/bcm.c leads to local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3609
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-03 19:15 修改: 2024-11-21 06:21
|
| linux-libc-dev |
CVE-2021-3612 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3612
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-09 11:15 修改: 2024-11-21 06:21
|
| linux-libc-dev |
CVE-2021-3640 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: use-after-free vulnerability in function sco_sock_sendmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3640
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-03 23:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3653 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: SVM nested virtualization issue in KVM (AVIC support)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3653
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-09-29 20:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3656 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3656
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-04 19:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3743 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3743
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-04 16:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3752 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: possible use-after-free in bluetooth module
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3752
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-16 19:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-37576 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: powerpc: KVM guest OS users can cause host OS memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37576
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-26 22:15 修改: 2024-11-21 06:15
|
| linux-libc-dev |
CVE-2021-3760 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfc: Use-After-Free vulnerability of ndev->rf_conn_info object
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3760
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-16 19:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-38160 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38160
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-07 04:15 修改: 2025-05-05 14:12
|
| linux-libc-dev |
CVE-2021-38207 |
高危 |
4.19.194-2 |
|
kernel: buffer overflow in drivers/net/ethernet/xilinx/ll_temac_main.c by sending heavy network traffic for about ten minutes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38207
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-08 20:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-38300 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: crafting anomalous machine code may lead to arbitrary Kernel code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38300
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-09-20 06:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-39685 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: USB gadget buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39685
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-16 15:15 修改: 2024-11-21 06:20
|
| linux-libc-dev |
CVE-2021-39686 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: race condition in the Android binder driver could lead to incorrect security checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39686
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-16 15:15 修改: 2024-11-21 06:20
|
| linux-libc-dev |
CVE-2021-39698 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: use-after-free in the file polling implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39698
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-16 15:15 修改: 2024-11-21 06:20
|
| linux-libc-dev |
CVE-2021-39713 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: race condition in the network scheduling subsystem could lead to an use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39713
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-16 15:15 修改: 2024-11-21 06:20
|
| linux-libc-dev |
CVE-2021-40490 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40490
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-09-03 01:15 修改: 2024-11-21 06:24
|
| linux-libc-dev |
CVE-2021-4083 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: fget: check that the fd still exists after getting a ref to it
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4083
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-18 17:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-41864 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41864
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-10-02 00:15 修改: 2024-11-21 06:26
|
| linux-libc-dev |
CVE-2021-4197 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: cgroup: Use open-time creds and namespace for migration perm checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4197
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-23 20:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-42008 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: slab out-of-bounds write in decode_data() in drivers/net/hamradio/6pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42008
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-10-05 00:15 修改: 2024-11-21 06:27
|
| linux-libc-dev |
CVE-2021-4202 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: Race condition in nci_request() leads to use after free while the device is getting removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4202
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-42252 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: memory overwrite in the kernel with potential privileges execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42252
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-10-11 19:15 修改: 2024-11-21 06:27
|
| linux-libc-dev |
CVE-2021-4439 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4439
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-44733 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: use-after-free in the TEE subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44733
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-22 17:15 修改: 2024-11-21 06:31
|
| linux-libc-dev |
CVE-2021-45469 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: out-of-bounds memory access in __f2fs_setxattr() in fs/f2fs/xattr.c when an inode has an invalid last xattr entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45469
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-23 19:15 修改: 2024-11-21 06:32
|
| linux-libc-dev |
CVE-2021-45485 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: information leak in the IPv6 implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45485
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-25 02:15 修改: 2024-11-21 06:32
|
| linux-libc-dev |
CVE-2021-46936 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: fix use-after-free in tw_timer_handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46936
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2021-47082 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: tun: avoid double free in tun_free_netdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47082
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-04 18:15 修改: 2025-01-14 15:00
|
| linux-libc-dev |
CVE-2021-47103 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: inet: fully convert sk->sk_rx_dst to RCU rules
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47103
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-04 18:15 修改: 2025-02-14 15:03
|
| linux-libc-dev |
CVE-2021-47194 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47194
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2024-11-21 06:35
|
| linux-libc-dev |
CVE-2021-47222 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: bridge: fix vlan tunnel dst refcnt when egressing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47222
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:13
|
| linux-libc-dev |
CVE-2021-47235 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: ethernet: fix potential use-after-free in ec_bhf_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47235
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:06
|
| linux-libc-dev |
CVE-2021-47239 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: usb: fix possible use-after-free in smsc75xx_bind
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47239
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:05
|
| linux-libc-dev |
CVE-2021-47240 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: qrtr: fix OOB Read in qrtr_endpoint_post
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47240
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:04
|
| linux-libc-dev |
CVE-2021-47243 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: sch_cake: Fix out of bounds when parsing TCP options and header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47243
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:04
|
| linux-libc-dev |
CVE-2021-47245 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: netfilter: synproxy: Fix out of bounds when parsing TCP options
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47245
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:03
|
| linux-libc-dev |
CVE-2021-47254 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: gfs2: Fix use-after-free in gfs2_glock_shrink_scan
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47254
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2026-03-17 17:28
|
| linux-libc-dev |
CVE-2021-47261 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: IB/mlx5: Fix initializing CQ fragments buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47261
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:03
|
| linux-libc-dev |
CVE-2021-47277 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: kvm: avoid speculation-based attacks from out-of-range memslot accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47277
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 14:30
|
| linux-libc-dev |
CVE-2021-47280 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: drm: Fix use-after-free read in drm_getunique()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47280
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:31
|
| linux-libc-dev |
CVE-2021-47288 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47288
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-23 16:45
|
| linux-libc-dev |
CVE-2021-47293 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net/sched: act_skbmod: Skip non-Ethernet packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47293
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-05-07 17:51
|
| linux-libc-dev |
CVE-2021-47301 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: igb: Fix use-after-free error during reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47301
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 20:44
|
| linux-libc-dev |
CVE-2021-47309 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: validate lwtstate->data before returning from skb_tunnel_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47309
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 18:44
|
| linux-libc-dev |
CVE-2021-47310 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: ti: fix UAF in tlan_remove_one
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47310
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:50
|
| linux-libc-dev |
CVE-2021-47311 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: qcom/emac: fix UAF in emac_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47311
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:50
|
| linux-libc-dev |
CVE-2021-47321 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47321
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:51
|
| linux-libc-dev |
CVE-2021-47328 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: scsi: iscsi: Fix conn use after free during resets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47328
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:52
|
| linux-libc-dev |
CVE-2021-47334 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: misc/libmasm/module: Fix two use after free in ibmasm_init_one
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47334
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:25
|
| linux-libc-dev |
CVE-2021-47336 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: smackfs: restrict bytes count in smk_set_cipso()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47336
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-05-12 19:58
|
| linux-libc-dev |
CVE-2021-47346 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47346
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-03-06 12:57
|
| linux-libc-dev |
CVE-2021-47355 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47355
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:29
|
| linux-libc-dev |
CVE-2021-47357 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: atm: iphase: fix possible use-after-free in ia_module_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47357
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:30
|
| linux-libc-dev |
CVE-2021-47358 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: staging: greybus: uart: fix tty use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47358
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:31
|
| linux-libc-dev |
CVE-2021-47361 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: mcb: fix error handling in mcb_alloc_bus()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47361
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:45
|
| linux-libc-dev |
CVE-2021-47372 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: macb: fix use after free on rmmod
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47372
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 17:57
|
| linux-libc-dev |
CVE-2021-47383 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: tty: Fix out-of-bound vmalloc access in imageblit
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47383
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-12-10 08:15
|
| linux-libc-dev |
CVE-2021-47388 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: mac80211: fix use-after-free in CCMP/GCMP RX
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47388
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 20:05
|
| linux-libc-dev |
CVE-2021-47393 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47393
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-23 20:17
|
| linux-libc-dev |
CVE-2021-47404 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47404
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:05
|
| linux-libc-dev |
CVE-2021-47458 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: ocfs2: mount fails with buffer overflow in strlen
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47458
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-09-23 20:25
|
| linux-libc-dev |
CVE-2021-47474 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: comedi: vmk80xx: fix bulk-buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47474
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-24 18:51
|
| linux-libc-dev |
CVE-2021-47475 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: comedi: vmk80xx: fix transfer-buffer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47475
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-24 18:58
|
| linux-libc-dev |
CVE-2021-47477 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: comedi: dt9812: fix DMA buffers on stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47477
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-24 19:00
|
| linux-libc-dev |
CVE-2021-47483 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: regmap: Fix possible double-free in regcache_rbtree_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47483
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-01-06 19:52
|
| linux-libc-dev |
CVE-2021-47485 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47485
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-01-06 19:53
|
| linux-libc-dev |
CVE-2021-47497 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47497
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-24 19:16
|
| linux-libc-dev |
CVE-2021-47500 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: iio: mma8452: Fix trigger reference couting
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47500
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-01-06 20:45
|
| linux-libc-dev |
CVE-2021-47505 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: aio: fix use-after-free due to missing POLLFREE handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47505
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-01-10 18:00
|
| linux-libc-dev |
CVE-2021-47506 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfsd: fix use-after-free due to delegation race
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47506
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-01-06 20:44
|
| linux-libc-dev |
CVE-2021-47520 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: can: pch_can: pch_can_rx_normal: fix use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47520
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47521 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: can: sja1000: fix use after free in ems_pcmcia_add_card()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47521
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47541 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47541
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47549 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47549
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-01-07 17:04
|
| linux-libc-dev |
CVE-2021-47565 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47565
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:41
|
| linux-libc-dev |
CVE-2021-47566 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: proc/vmcore: fix clearing user buffer by properly using clear_user()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47566
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:41
|
| linux-libc-dev |
CVE-2021-47571 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47571
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47576 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47576
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47589 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: igbvf: fix double free in `igbvf_probe`
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47589
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47598 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: sch_cake: do not call cake_destroy() from cake_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47598
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47600 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: dm btree remove: fix use after free in rebalance_children()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47609 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47609
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2022-0330 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: possible privileges escalation due to missing TLB flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0330
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0435 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0435
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0492 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: cgroups v1 release_agent feature may allow privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0492
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-03 19:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0850 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: information leak in copy_page_to_iter() in iov_iter.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0850
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1011 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1011
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-18 18:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1012 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1012
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-05 16:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1048 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: race condition in snd_pcm_hw_free leading to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1048
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-29 16:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1199 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: Null pointer dereference and use after free in ax25_release()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1199
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2025-04-23 18:15
|
| linux-libc-dev |
CVE-2022-1353 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: kernel info leak issue in pfkey_register
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1353
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-29 16:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1419 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: a concurrency use-after-free in vgem_gem_dumb_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1419
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1652 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: A concurrency use-after-free in floppy disk device driver.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1652
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-1678 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: improper update of sock reference in TCP pacing can lead to memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1678
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-25 15:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-1679 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1679
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-16 18:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-1729 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: race condition in perf_event_open leads to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1729
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-01 21:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-1734 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from user-space
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1734
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-18 17:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-20141 |
高危 |
4.19.194-2 |
4.19.208-1 |
kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20141
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 14:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20368 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20368
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-11 15:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20421 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: use after free in binder_inc_ref_for_node in drivers/android/binder.c due
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20421
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-11 20:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20422 |
高危 |
4.19.194-2 |
4.19.260-1 |
In emulation_proc_handler of armv8_deprecated.c, there is a possible w ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20422
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-11 20:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20566 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: possible use after free due to improper locking in l2cap_chan_put of l2cap_core
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20566
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-16 16:15 修改: 2025-04-21 14:15
|
| linux-libc-dev |
CVE-2022-22942 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: failing usercopy allows for use-after-free exploitation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22942
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-12-13 09:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23036 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23036
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23037 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23037
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23038 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23038
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23039 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23039
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23040 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23040
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23041 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23041
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-23042 |
高危 |
4.19.194-2 |
4.19.235-1 |
Linux PV device frontends vulnerable to attacks by backends T[his CNA ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23042
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 20:15 修改: 2024-11-21 06:47
|
| linux-libc-dev |
CVE-2022-24958 |
高危 |
4.19.194-2 |
4.19.235-1 |
kernel: use-after-free in dev->buf release in drivers/usb/gadget/legacy/inode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24958
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-11 06:15 修改: 2024-11-21 06:51
|
| linux-libc-dev |
CVE-2022-2586 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2586
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-08 18:15 修改: 2025-10-28 13:34
|
| linux-libc-dev |
CVE-2022-2588 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2588
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-08 18:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-26365 |
高危 |
4.19.194-2 |
4.19.260-1 |
Linux disk/nic frontends data leaks T[his CNA information record relat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26365
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-05 13:15 修改: 2024-11-21 06:53
|
| linux-libc-dev |
CVE-2022-2639 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2639
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-01 21:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-26490 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26490
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-06 04:15 修改: 2025-06-25 21:01
|
| linux-libc-dev |
CVE-2022-27223 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index is not validated
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27223
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-16 00:15 修改: 2024-11-21 06:55
|
| linux-libc-dev |
CVE-2022-27666 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: buffer overflow in IPsec ESP transformation code
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27666
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-23 06:15 修改: 2024-11-21 06:56
|
| linux-libc-dev |
CVE-2022-28390 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28390
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-03 21:15 修改: 2025-06-25 21:00
|
| linux-libc-dev |
CVE-2022-29581 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29581
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-17 17:15 修改: 2024-11-21 06:59
|
| linux-libc-dev |
CVE-2022-2964 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: memory corruption in AX88179_178A based USB ethernet device.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2964
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-09 15:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-2977 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: use-after-free Read in put_device (/dev/vtpmx)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2977
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-14 21:15 修改: 2024-11-21 07:02
|
| linux-libc-dev |
CVE-2022-2978 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: use-after-free in nilfs_mdt_destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2978
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-24 16:15 修改: 2024-11-21 07:02
|
| linux-libc-dev |
CVE-2022-3028 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: race condition in xfrm_probe_algs can lead to OOB read/write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3028
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-31 16:15 修改: 2024-11-21 07:18
|
| linux-libc-dev |
CVE-2022-30594 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30594
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-12 05:15 修改: 2024-11-21 07:02
|
| linux-libc-dev |
CVE-2022-3202 |
高危 |
4.19.194-2 |
4.19.249-1 |
Kernel: jfs: Null Pointer Deference in jfs_evict_inode leads to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3202
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-14 15:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-32250 |
高危 |
4.19.194-2 |
4.19.249-2 |
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32250
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-02 21:15 修改: 2024-11-21 07:06
|
| linux-libc-dev |
CVE-2022-3239 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: media: em28xx: initialize refcount before kref_get
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3239
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-19 20:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-33740 |
高危 |
4.19.194-2 |
4.19.260-1 |
Linux disk/nic frontends data leaks T[his CNA information record relat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33740
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-05 13:15 修改: 2024-11-21 07:08
|
| linux-libc-dev |
CVE-2022-33741 |
高危 |
4.19.194-2 |
4.19.260-1 |
Linux disk/nic frontends data leaks T[his CNA information record relat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33741
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-05 13:15 修改: 2024-11-21 07:08
|
| linux-libc-dev |
CVE-2022-33742 |
高危 |
4.19.194-2 |
4.19.260-1 |
Linux disk/nic frontends data leaks T[his CNA information record relat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33742
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-05 13:15 修改: 2024-11-21 07:08
|
| linux-libc-dev |
CVE-2022-3424 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: Use after Free in gru_set_context_option leading to kernel panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-06 23:15 修改: 2025-03-06 21:15
|
| linux-libc-dev |
CVE-2022-3545 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: nfp: use-after-free in area_cache_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3545
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-17 12:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3564 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3564
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-17 19:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3565 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: use-after-free in l1oip timer handlers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3565
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-17 19:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3635 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: use after in tst_timer in drivers/atm/idt77252.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3635
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-21 11:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3640 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3640
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-21 15:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3649 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3649
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-21 20:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-36946 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36946
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-27 20:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2022-4095 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: Use-after-Free/Double-Free bug in read_bbreg_hdl in drivers/staging/rtl8712/rtl8712_cmd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4095
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-22 15:15 修改: 2025-02-26 17:15
|
| linux-libc-dev |
CVE-2022-41858 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41858
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-17 18:15 修改: 2025-04-07 17:15
|
| linux-libc-dev |
CVE-2022-42896 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42896
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-23 15:15 修改: 2024-11-21 07:25
|
| linux-libc-dev |
CVE-2022-4378 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4378
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-05 16:15 修改: 2025-04-10 15:16
|
| linux-libc-dev |
CVE-2022-45934 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45934
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-27 04:15 修改: 2025-04-29 14:15
|
| linux-libc-dev |
CVE-2022-4744 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: tun: avoid double free in tun_free_netdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4744
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-30 21:15 修改: 2025-02-14 16:15
|
| linux-libc-dev |
CVE-2022-48626 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: moxart: fix potential use-after-free on remove path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48626
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:27 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48672 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48672
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48695 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: scsi: mpt3sas: Fix use-after-free warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48695
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 18:15 修改: 2024-12-26 20:38
|
| linux-libc-dev |
CVE-2022-48701 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: ALSA: usb-audio: ALSA USB Audio Out-of-Bounds Bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48701
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 16:15 修改: 2025-03-05 15:13
|
| linux-libc-dev |
CVE-2022-48702 |
高危 |
4.19.194-2 |
4.19.260-1 |
kernel: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48702
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 16:15 修改: 2025-03-05 15:13
|
| linux-libc-dev |
CVE-2022-48717 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: ASoC: max9759: fix underflow in speaker_gain_control_put()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48717
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2025-03-05 19:17
|
| linux-libc-dev |
CVE-2022-48732 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: drm/nouveau: fix off by one in BIOS boundary checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48732
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48738 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48738
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-09-29 18:39
|
| linux-libc-dev |
CVE-2022-48742 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48742
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48757 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: fix information leakage in /proc/net/ptype
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48757
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-09-17 17:13
|
| linux-libc-dev |
CVE-2022-48759 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48759
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-09-17 17:18
|
| linux-libc-dev |
CVE-2022-48760 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48760
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-09-17 16:49
|
| linux-libc-dev |
CVE-2022-48771 |
高危 |
4.19.194-2 |
4.19.232-1 |
kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48771
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-01-06 21:41
|
| linux-libc-dev |
CVE-2023-0045 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: Bypassing Spectre-BTI User Space Mitigations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-25 23:15 修改: 2025-02-13 17:15
|
| linux-libc-dev |
CVE-2023-0266 |
高危 |
4.19.194-2 |
4.19.282-1 |
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0266
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-30 14:15 修改: 2025-10-24 13:54
|
| linux-libc-dev |
CVE-2023-0386 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: FUSE filesystem low-privileged user privileges escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0386
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-22 21:15 修改: 2025-11-04 16:47
|
| linux-libc-dev |
CVE-2023-0461 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: net/ulp: use-after-free in listening ULP sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0461
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-02-28 15:15 修改: 2024-11-21 07:37
|
| linux-libc-dev |
CVE-2023-1077 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Type confusion in pick_next_rt_entity()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1077
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2024-11-21 07:38
|
| linux-libc-dev |
CVE-2023-1078 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: Heap OOB Write in rds_rm_zerocopy_callback()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1078
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-1118 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-02 18:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-1281 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1281
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-22 14:15 修改: 2025-02-13 17:15
|
| linux-libc-dev |
CVE-2023-1380 |
高危 |
4.19.194-2 |
4.19.289-1 |
Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2024-11-21 07:39
|
| linux-libc-dev |
CVE-2023-1670 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: use after free bug in xirc2ps_detach
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1670
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-30 23:15 修改: 2025-02-14 16:15
|
| linux-libc-dev |
CVE-2023-1829 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1829
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-12 12:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-1838 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1838
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-05 19:15 修改: 2024-11-21 07:39
|
| linux-libc-dev |
CVE-2023-1989 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Use after free bug in btsdio_remove due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1989
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-11 21:15 修改: 2024-11-21 07:40
|
| linux-libc-dev |
CVE-2023-2007 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: DPT I2O controller TOCTOU information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2007
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-24 23:15 修改: 2024-11-21 07:57
|
| linux-libc-dev |
CVE-2023-20938 |
高危 |
4.19.194-2 |
|
In binder_transaction_buffer_release of binder.c, there is a possible ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20938
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-02-28 17:15 修改: 2024-11-21 07:41
|
| linux-libc-dev |
CVE-2023-23559 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23559
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-13 01:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-28466 |
高危 |
4.19.194-2 |
|
kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28466
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-16 00:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-3090 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3090
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-28 20:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-3111 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: Use after free in prepare_to_relocate in fs/btrfs/relocation.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3111
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-05 21:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-3141 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: Use after free bug in r592_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3141
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-09 20:15 修改: 2025-03-11 15:15
|
| linux-libc-dev |
CVE-2023-31436 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: out-of-bounds write in qfq_change_class function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31436
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-28 02:15 修改: 2024-11-21 08:01
|
| linux-libc-dev |
CVE-2023-32233 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32233
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-08 20:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-3268 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: out-of-bounds access in relay_file_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3268
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-16 19:15 修改: 2025-03-11 15:15
|
| linux-libc-dev |
CVE-2023-3390 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3390
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-28 21:15 修改: 2024-11-21 08:17
|
| linux-libc-dev |
CVE-2023-34319 |
高危 |
4.19.194-2 |
4.19.304-1 |
xen: buffer overrun in netback due to unusual packet (XSA-432)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34319
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-22 14:15 修改: 2025-11-04 20:16
|
| linux-libc-dev |
CVE-2023-35001 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35001
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-05 19:15 修改: 2024-11-21 08:07
|
| linux-libc-dev |
CVE-2023-3567 |
高危 |
4.19.194-2 |
4.19.282-1 |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-24 16:15 修改: 2024-11-21 08:17
|
| linux-libc-dev |
CVE-2023-35788 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35788
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-16 21:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-35823 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: saa7134: race condition leading to use-after-free in saa7134_finidev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35823
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-18 22:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-35824 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35824
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-18 22:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-35828 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: renesas_usb3: race condition leading to use-after-free in renesas_usb3_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35828
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-18 22:15 修改: 2024-11-21 08:08
|
| linux-libc-dev |
CVE-2023-3609 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3609
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-21 21:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-3611 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3611
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-21 21:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-3776 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3776
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-21 21:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-3812 |
高危 |
4.19.194-2 |
4.19.269-1 |
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3812
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-24 16:15 修改: 2024-11-21 08:18
|
| linux-libc-dev |
CVE-2023-40283 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40283
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-14 03:15 修改: 2026-02-25 18:17
|
| linux-libc-dev |
CVE-2023-4206 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4206
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-02-13 17:17
|
| linux-libc-dev |
CVE-2023-4207 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4207
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-02-13 17:17
|
| linux-libc-dev |
CVE-2023-4208 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4208
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-02-13 17:17
|
| linux-libc-dev |
CVE-2023-4244 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4244
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-02-13 17:17
|
| linux-libc-dev |
CVE-2023-42753 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: netfilter: potential slab-out-of-bound access due to integer underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42753
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-25 21:15 修改: 2024-11-21 08:23
|
| linux-libc-dev |
CVE-2023-4387 |
高危 |
4.19.194-2 |
4.19.249-1 |
kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4387
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-16 19:15 修改: 2025-06-03 03:15
|
| linux-libc-dev |
CVE-2023-45871 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: IGB driver inadequate buffer size for frames larger than MTU
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45871
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-15 01:15 修改: 2025-05-05 14:12
|
| linux-libc-dev |
CVE-2023-4622 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use after free in unix_stream_sendpage
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4622
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-02-13 18:15
|
| linux-libc-dev |
CVE-2023-4623 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net/sched: sch_hfsc UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4623
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-06 14:15 修改: 2025-03-20 16:59
|
| linux-libc-dev |
CVE-2023-46838 |
高危 |
4.19.194-2 |
4.19.316-1 |
Transmit requests in Xen's virtual network protocol can consist of mul ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46838
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-29 11:15 修改: 2025-11-04 19:16
|
| linux-libc-dev |
CVE-2023-4921 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in sch_qfq network scheduler
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4921
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-12 20:15 修改: 2025-02-13 18:15
|
| linux-libc-dev |
CVE-2023-51042 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51042
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 11:15 修改: 2024-11-21 08:37
|
| linux-libc-dev |
CVE-2023-51043 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51043
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 11:15 修改: 2024-11-21 08:37
|
| linux-libc-dev |
CVE-2023-51780 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in net/atm/ioctl.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51780
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-11 19:15 修改: 2024-11-21 08:38
|
| linux-libc-dev |
CVE-2023-51781 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in net/appletalk/ddp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51781
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-11 19:15 修改: 2024-11-21 08:38
|
| linux-libc-dev |
CVE-2023-51782 |
高危 |
4.19.194-2 |
4.19.304-1 |
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51782
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-11 19:15 修改: 2024-11-21 08:38
|
| linux-libc-dev |
CVE-2023-52340 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52340
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-07-05 02:15 修改: 2025-11-04 18:15
|
| linux-libc-dev |
CVE-2023-52436 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: f2fs: explicitly null-terminate the xattr list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52436
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-20 21:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52439 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: uio: Fix use-after-free in uio_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52439
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-20 21:15 修改: 2024-12-27 16:15
|
| linux-libc-dev |
CVE-2023-52444 |
高危 |
4.19.194-2 |
4.19.316-1 |
In the Linux kernel, the following vulnerability has been resolved: f ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52444
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52445 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: pvrusb2: fix use after free on context disconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52445
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52451 |
高危 |
4.19.194-2 |
|
kernel: powerpc: Fix access beyond end of drmem array
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52451
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52464 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52464
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-23 15:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52469 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: use-after-free in kv_parse_power_table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52469
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52475 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in powermate_config_complete
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52475
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-29 06:15 修改: 2024-12-09 18:47
|
| linux-libc-dev |
CVE-2023-52502 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52502
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-03-19 16:11
|
| linux-libc-dev |
CVE-2023-52504 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: x86/alternatives: Disable KASAN in apply_alternatives()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52504
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:05
|
| linux-libc-dev |
CVE-2023-52507 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: nfc: nci: assert requested protocol is valid
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52507
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-01-13 18:51
|
| linux-libc-dev |
CVE-2023-52510 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: ieee802154: ca8210: Fix a potential UAF in ca8210_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52510
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:11
|
| linux-libc-dev |
CVE-2023-52525 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52525
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-01-13 20:04
|
| linux-libc-dev |
CVE-2023-52578 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: net: bridge: data races indata-races in br_handle_frame_finish()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52578
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 17:44
|
| linux-libc-dev |
CVE-2023-52594 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52594
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2024-12-12 15:10
|
| linux-libc-dev |
CVE-2023-52598 |
高危 |
4.19.194-2 |
|
kernel: s390/ptrace: handle setting of fpc register correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52598
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-02-14 16:40
|
| linux-libc-dev |
CVE-2023-52599 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: jfs: fix array-index-out-of-bounds in diNewExt
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52599
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36
|
| linux-libc-dev |
CVE-2023-52600 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: jfs: fix uaf in jfs_evict_inode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36
|
| linux-libc-dev |
CVE-2023-52603 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: UBSAN: array-index-out-of-bounds in dtSplitRoot
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52603
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36
|
| linux-libc-dev |
CVE-2023-52604 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: FS:JFS:UBSAN: array-index-out-of-bounds in dbAdjTree
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52604
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:49
|
| linux-libc-dev |
CVE-2023-52612 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: crypto: scomp - fix req->dst buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52612
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-02-27 03:23
|
| linux-libc-dev |
CVE-2023-52628 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52628
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-28 08:15 修改: 2025-11-04 18:15
|
| linux-libc-dev |
CVE-2023-52679 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: of: Fix double free in of_parse_phandle_with_args_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52679
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-01-10 17:43
|
| linux-libc-dev |
CVE-2023-52691 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/amd/pm: fix a double-free in si_dpm_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52691
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-01-10 17:59
|
| linux-libc-dev |
CVE-2023-52764 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52764
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:52
|
| linux-libc-dev |
CVE-2023-52796 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: ipvlan: add ipvlan_route_v6_outbound() helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52796
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 20:12
|
| linux-libc-dev |
CVE-2023-52799 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52799
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-03-06 12:57
|
| linux-libc-dev |
CVE-2023-52804 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: fs/jfs: Add validity check for db_maxag and db_agpref
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52804
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 22:40
|
| linux-libc-dev |
CVE-2023-52805 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: jfs: fix array-index-out-of-bounds in diAlloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52805
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2023-52818 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52818
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:08
|
| linux-libc-dev |
CVE-2023-52835 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: perf/core: Bail out early if the request AUX area is out of bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52835
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 22:47
|
| linux-libc-dev |
CVE-2023-52836 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: locking/ww_mutex/test: Fix potential workqueue corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52836
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 23:20
|
| linux-libc-dev |
CVE-2023-52840 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52840
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-12-31 19:48
|
| linux-libc-dev |
CVE-2023-52847 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: media: bttv: fix use after free error due to btv->timeout timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-03-04 16:56
|
| linux-libc-dev |
CVE-2023-52864 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: platform/x86: wmi: Fix opening of char device
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52864
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-24 00:15
|
| linux-libc-dev |
CVE-2023-52867 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: drm/radeon: possible buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52867
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-24 00:47
|
| linux-libc-dev |
CVE-2023-52868 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: thermal: core: prevent potential string overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52868
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-26 16:17
|
| linux-libc-dev |
CVE-2023-5717 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5717
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-25 18:17 修改: 2025-02-13 18:15
|
| linux-libc-dev |
CVE-2023-6040 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6040
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-12 02:15 修改: 2025-03-20 16:59
|
| linux-libc-dev |
CVE-2023-6270 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: AoE: improper reference count leads to use-after-free vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6270
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-04 17:15 修改: 2026-03-24 12:16
|
| linux-libc-dev |
CVE-2023-6606 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Out-Of-Bounds Read vulnerability in smbCalcSize
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6606
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-12-08 17:15 修改: 2024-11-21 08:44
|
| linux-libc-dev |
CVE-2023-6931 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6931
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-12-19 14:15 修改: 2026-05-12 11:16
|
| linux-libc-dev |
CVE-2023-6932 |
高危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free in IPv4 IGMP
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6932
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-12-19 14:15 修改: 2026-05-12 11:16
|
| linux-libc-dev |
CVE-2024-0775 |
高危 |
4.19.194-2 |
4.19.289-1 |
kernel: use-after-free while changing the mount option in __ext4_remount leading
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0775
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-22 13:15 修改: 2024-11-21 08:47
|
| linux-libc-dev |
CVE-2024-1086 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1086
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-31 13:15 修改: 2025-10-27 17:06
|
| linux-libc-dev |
CVE-2024-26597 |
高危 |
4.19.194-2 |
4.19.316-1 |
In the Linux kernel, the following vulnerability has been resolved: n ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26597
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-23 15:15 修改: 2024-11-21 09:02
|
| linux-libc-dev |
CVE-2024-26625 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: llc: call sock_orphan() at release time
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26625
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-01-07 20:17
|
| linux-libc-dev |
CVE-2024-26654 |
高危 |
4.19.194-2 |
|
kernel: ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26654
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-01 09:15 修改: 2025-02-03 14:32
|
| linux-libc-dev |
CVE-2024-26664 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: hwmon: (coretemp) Fix out-of-bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26664
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:13
|
| linux-libc-dev |
CVE-2024-26704 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: fix double-free of blocks due to wrong extents moved_len
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26704
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 15:15 修改: 2025-01-14 15:37
|
| linux-libc-dev |
CVE-2024-26754 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26754
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-01-07 21:13
|
| linux-libc-dev |
CVE-2024-26763 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: dm-crypt: don't modify the data when using authenticated encryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26763
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-18 16:40
|
| linux-libc-dev |
CVE-2024-26791 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: btrfs: dev-replace: properly validate device names
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26791
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-04 09:15 修改: 2024-12-20 14:35
|
| linux-libc-dev |
CVE-2024-26793 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26793
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-04 09:15 修改: 2024-12-20 15:56
|
| linux-libc-dev |
CVE-2024-26852 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26852
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26883 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: bpf: Fix stackmap overflow check on 32-bit arches
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26883
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26884 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: bpf: Fix hashtab overflow check on 32-bit arches
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26884
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26898 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26898
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26934 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26934
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26955 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: prevent kernel bug at submit_bh_wbc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26955
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:59
|
| linux-libc-dev |
CVE-2024-26956 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix failure to detect DAT corruption in btree and direct mappings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26956
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:57
|
| linux-libc-dev |
CVE-2024-26957 |
高危 |
4.19.194-2 |
|
kernel: s390/zcrypt: fix reference counting on zcrypt card objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26957
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-03-20 21:27
|
| linux-libc-dev |
CVE-2024-26965 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26965
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:54
|
| linux-libc-dev |
CVE-2024-26974 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: crypto: qat - resolve race condition during AER recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26974
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26981 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix OOB in nilfs_set_de_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26981
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:15
|
| linux-libc-dev |
CVE-2024-27000 |
高危 |
4.19.194-2 |
|
kernel: serial: mxs-auart: add spinlock around changing cts state
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27000
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:46
|
| linux-libc-dev |
CVE-2024-27008 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm: nv04: Fix out of bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27008
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-01 15:17
|
| linux-libc-dev |
CVE-2024-27020 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27020
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27024 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/rds: fix WARNING in rds_conn_connect_if_down
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27024
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27043 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: edia: dvbdev: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27043
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:13
|
| linux-libc-dev |
CVE-2024-27075 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: dvb-frontends: avoid stack overflow warnings with clang
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27075
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2025-12-23 00:39
|
| linux-libc-dev |
CVE-2024-27395 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27395
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-14 15:12 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27396 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net: gtp: Fix Use-After-Free in gtp_dellink
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27396
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-14 15:12 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27398 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27398
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-14 15:12 修改: 2026-01-22 20:37
|
| linux-libc-dev |
CVE-2024-27401 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: firewire: nosy: ensure user_length is taken into account when fetching packet contents
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27401
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-14 15:12 修改: 2026-01-22 20:39
|
| linux-libc-dev |
CVE-2024-35789 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35789
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35847 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: irqchip/gic-v3-its: Prevent double free on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2024-12-30 17:41
|
| linux-libc-dev |
CVE-2024-35849 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35849
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35886 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipv6: Fix infinite recursion in fib6_dump_done().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36015 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: ppdev: Add an error check in register_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36015
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-29 08:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-36883 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net: fix out-of-bounds access in ops_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36883
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:24
|
| linux-libc-dev |
CVE-2024-36886 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: TIPC message reassembly use-after-free remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:24
|
| linux-libc-dev |
CVE-2024-36904 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36904
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36934 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: bna: ensure the copied buf is NUL terminated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36934
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:03
|
| linux-libc-dev |
CVE-2024-36940 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: pinctrl: core: delete incorrect free in pinctrl_enable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36940
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36960 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/vmwgfx: Fix invalid reads in fence signaled events
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36960
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-03 08:15 修改: 2025-04-01 18:36
|
| linux-libc-dev |
CVE-2024-36971 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: net: kernel: UAF in network route management
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36971
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-10 09:15 修改: 2025-11-05 19:19
|
| linux-libc-dev |
CVE-2024-38381 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nfc: nci: Fix uninit-value in nci_rx_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38381
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38552 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/amd/display: Fix potential index out of bounds in color transformation function
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38552
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38560 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: bfa: Ensure the copied buf is NUL terminated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38560
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38578 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: ecryptfs: Fix buffer size for tag 66 packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38578
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38583 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix use-after-free of timer for log writer thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38583
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38599 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: jffs2: prevent xattr node from overflowing the eraseblock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38599
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38621 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: stk1160: fix bounds checking in stk1160_copy_video()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38621
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38627 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: stm class: Fix a double free in stm_register_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38627
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38659 |
高危 |
4.19.194-2 |
4.19.316-1 |
kernel: enic: Validate length of nl attributes in enic_set_vf_port
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38659
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2026-05-12 12:16
|
| ncurses-base |
CVE-2021-39537 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-09-20 16:15 修改: 2024-11-21 06:19
|
| ncurses-base |
CVE-2022-29458 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u3 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| ncurses-base |
CVE-2023-29491 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 01:15 修改: 2025-11-04 19:15
|
| ncurses-bin |
CVE-2021-39537 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-09-20 16:15 修改: 2024-11-21 06:19
|
| ncurses-bin |
CVE-2022-29458 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u3 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| ncurses-bin |
CVE-2023-29491 |
高危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u5 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 01:15 修改: 2025-11-04 19:15
|
| libasan5 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| openssh-client |
CVE-2021-41617 |
高危 |
1:7.9p1-10+deb10u2 |
1:7.9p1-10+deb10u4 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-09-26 19:15 修改: 2026-05-12 10:16
|
| libasan5 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| openssl |
CVE-2021-3712 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u7 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-24 15:15 修改: 2026-04-16 15:16
|
| openssl |
CVE-2022-0778 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u8 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-03-15 17:15 修改: 2026-04-14 10:16
|
| openssl |
CVE-2022-1292 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u2 |
openssl: c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-05-03 16:15 修改: 2025-08-13 14:15
|
| openssl |
CVE-2022-2068 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u3 |
openssl: the c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-21 15:15 修改: 2025-11-03 22:15
|
| openssl |
CVE-2022-4450 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| openssl |
CVE-2023-0215 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| openssl |
CVE-2023-0286 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| openssl |
CVE-2023-0464 |
高危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-22 17:15 修改: 2025-05-05 16:15
|
| perl |
CVE-2020-16156 |
高危 |
5.28.1-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-12-13 18:15 修改: 2025-11-03 22:15
|
| perl |
CVE-2023-31484 |
高危 |
5.28.1-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-29 00:15 修改: 2025-11-03 22:16
|
| perl-base |
CVE-2020-16156 |
高危 |
5.28.1-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-12-13 18:15 修改: 2025-11-03 22:15
|
| perl-base |
CVE-2023-31484 |
高危 |
5.28.1-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-29 00:15 修改: 2025-11-03 22:16
|
| perl-modules-5.28 |
CVE-2020-16156 |
高危 |
5.28.1-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-12-13 18:15 修改: 2025-11-03 22:15
|
| perl-modules-5.28 |
CVE-2023-31484 |
高危 |
5.28.1-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-29 00:15 修改: 2025-11-03 22:16
|
| libatomic1 |
CVE-2018-12886 |
高危 |
8.3.0-6 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-05-22 19:29 修改: 2024-11-21 03:46
|
| libatomic1 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| python2.7 |
CVE-2015-20107 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: mailcap: findmatch() function does not sanitize the second argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-13 16:15 修改: 2025-11-03 22:15
|
| python2.7 |
CVE-2019-20907 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: infinite loop in the tarfile module via crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-07-13 13:15 修改: 2024-11-21 04:39
|
| python2.7 |
CVE-2020-10735 |
高危 |
2.7.16-2+deb10u1 |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-09 14:15 修改: 2025-11-03 22:15
|
| python2.7 |
CVE-2020-26116 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CRLF injection via HTTP request method in httplib/http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-09-27 04:15 修改: 2024-11-21 05:19
|
| python2.7 |
CVE-2021-3737 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-04 19:15 修改: 2025-12-17 22:15
|
| python2.7 |
CVE-2022-0391 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-09 23:15 修改: 2025-12-17 21:15
|
| python2.7 |
CVE-2022-45061 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-11-09 07:15 修改: 2025-11-03 22:16
|
| python2.7 |
CVE-2022-48560 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: use after free in heappushpop() of heapq module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| python2.7 |
CVE-2023-24329 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-17 15:15 修改: 2025-11-03 22:16
|
| curl |
CVE-2023-27534 |
高危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u9 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-04-23 17:16
|
| curl |
CVE-2024-2398 |
高危 |
7.64.0-4+deb10u2 |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-03-27 08:15 修改: 2025-07-30 19:42
|
| python2.7-minimal |
CVE-2015-20107 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: mailcap: findmatch() function does not sanitize the second argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-13 16:15 修改: 2025-11-03 22:15
|
| python2.7-minimal |
CVE-2019-20907 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: infinite loop in the tarfile module via crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-07-13 13:15 修改: 2024-11-21 04:39
|
| python2.7-minimal |
CVE-2020-10735 |
高危 |
2.7.16-2+deb10u1 |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-09 14:15 修改: 2025-11-03 22:15
|
| python2.7-minimal |
CVE-2020-26116 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CRLF injection via HTTP request method in httplib/http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-09-27 04:15 修改: 2024-11-21 05:19
|
| python2.7-minimal |
CVE-2021-3737 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-04 19:15 修改: 2025-12-17 22:15
|
| python2.7-minimal |
CVE-2022-0391 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-09 23:15 修改: 2025-12-17 21:15
|
| python2.7-minimal |
CVE-2022-45061 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-11-09 07:15 修改: 2025-11-03 22:16
|
| python2.7-minimal |
CVE-2022-48560 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: use after free in heappushpop() of heapq module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| python2.7-minimal |
CVE-2023-24329 |
高危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-17 15:15 修改: 2025-11-03 22:16
|
| subversion |
CVE-2022-24070 |
高危 |
1.10.4-1+deb10u2 |
1.10.4-1+deb10u3 |
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24070
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 06:49
|
| cpp-8 |
CVE-2019-15847 |
高危 |
8.3.0-6 |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-02 23:15 修改: 2024-11-21 04:29
|
| e2fsprogs |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-04-14 21:15 修改: 2025-04-23 19:15
|
| libc-bin |
CVE-2020-1751 |
高危 |
2.28-10 |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-04-17 19:15 修改: 2024-11-21 05:11
|
| zlib1g |
CVE-2018-25032 |
高危 |
1:1.2.11.dfsg-1 |
1:1.2.11.dfsg-1+deb10u1 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-03-25 09:15 修改: 2025-08-21 20:37
|
| libc6-dev |
CVE-2024-33600 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc6-dev |
CVE-2024-33601 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc6-dev |
CVE-2024-33602 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libmount1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libmount1 |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| bsdutils |
CVE-2024-28085 |
中危 |
1:2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| fdisk |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libc-bin |
CVE-2016-10228 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv program can hang when invoked with the -c option
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2017-03-02 01:59 修改: 2026-05-13 00:24
|
| libc-bin |
CVE-2019-25013 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-01-04 18:15 修改: 2025-06-09 16:15
|
| libc-bin |
CVE-2020-10029 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-03-04 15:15 修改: 2024-11-21 04:54
|
| libncurses6 |
CVE-2020-19189 |
中危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u4 |
ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:09
|
| libncurses6 |
CVE-2023-50495 |
中危 |
6.1+20181013-2+deb10u2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| libc-bin |
CVE-2020-27618 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-02-26 23:15 修改: 2025-06-09 16:15
|
| libc-bin |
CVE-2023-4806 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-09-18 17:15 修改: 2026-05-12 11:16
|
| libc-bin |
CVE-2023-4813 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-09-12 22:15 修改: 2025-09-26 12:15
|
| libncursesw6 |
CVE-2020-19189 |
中危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u4 |
ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:09
|
| libncursesw6 |
CVE-2023-50495 |
中危 |
6.1+20181013-2+deb10u2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| libc-bin |
CVE-2024-33600 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc-bin |
CVE-2024-33601 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libnghttp2-14 |
CVE-2024-28182 |
中危 |
1.36.0-2+deb10u1 |
1.36.0-2+deb10u3 |
nghttp2: CONTINUATION frames DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-04-04 15:15 修改: 2025-11-04 19:17
|
| libpam-modules |
CVE-2024-22365 |
中危 |
1.3.1-5 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-06 08:15 修改: 2026-05-12 12:16
|
| libpam-modules-bin |
CVE-2024-22365 |
中危 |
1.3.1-5 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-06 08:15 修改: 2026-05-12 12:16
|
| libpam-runtime |
CVE-2024-22365 |
中危 |
1.3.1-5 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-06 08:15 修改: 2026-05-12 12:16
|
| libpam0g |
CVE-2024-22365 |
中危 |
1.3.1-5 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-02-06 08:15 修改: 2026-05-12 12:16
|
| libc-bin |
CVE-2024-33602 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libcurl3-gnutls |
CVE-2021-22947 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| libcurl3-gnutls |
CVE-2022-27774 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-06-02 14:15 修改: 2026-04-16 14:16
|
| libpcre3 |
CVE-2020-14155 |
中危 |
2:8.39-12 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-06-15 17:15 修改: 2024-11-21 05:02
|
| libcurl3-gnutls |
CVE-2022-27776 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:56
|
| libcurl3-gnutls |
CVE-2022-32206 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libcurl3-gnutls |
CVE-2022-32208 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libcurl3-gnutls |
CVE-2022-43552 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-09 20:15 修改: 2024-11-21 07:26
|
| libcurl3-gnutls |
CVE-2023-23916 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-23 20:15 修改: 2025-03-12 19:15
|
| libcurl3-gnutls |
CVE-2023-27535 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| libcurl3-gnutls |
CVE-2023-27536 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-03-30 20:15 修改: 2025-02-14 16:15
|
| libcurl3-gnutls |
CVE-2023-27538 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| libcurl3-gnutls |
CVE-2023-28321 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: IDN wildcard match may lead to Improper Cerificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15
|
| libcurl3-gnutls |
CVE-2023-46218 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-12-07 01:15 修改: 2026-05-12 11:16
|
| fdisk |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| curl |
CVE-2021-22947 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| curl |
CVE-2022-27774 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 14:16
|
| libpython2.7-minimal |
CVE-2020-8492 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-01-30 19:15 修改: 2024-11-21 05:38
|
| libpython2.7-minimal |
CVE-2021-23336 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-02-15 13:15 修改: 2025-12-17 22:15
|
| libpython2.7-minimal |
CVE-2021-3733 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-10 17:42 修改: 2025-11-03 22:15
|
| libpython2.7-minimal |
CVE-2021-4189 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: ftplib should not use the host from the PASV response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-08-24 16:15 修改: 2025-12-17 22:15
|
| libpython2.7-minimal |
CVE-2022-48566 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libpython2.7-minimal |
CVE-2023-27043 |
中危 |
2.7.16-2+deb10u1 |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-19 00:15 修改: 2026-05-12 11:16
|
| libpython2.7-minimal |
CVE-2023-40217 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: TLS handshake bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-25 01:15 修改: 2025-11-03 22:16
|
| libpython2.7-minimal |
CVE-2024-0450 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u4 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-03-19 16:15 修改: 2026-04-15 00:35
|
| git-man |
CVE-2022-39253 |
中危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: exposure of sensitive information to a malicious actor
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-10-19 11:15 修改: 2024-11-21 07:17
|
| git-man |
CVE-2023-22490 |
中危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u8 |
git: data exfiltration with maliciously crafted repository
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-14 20:15 修改: 2024-11-21 07:44
|
| gnupg |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| gnupg-l10n |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| gnupg-utils |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| libcurl4 |
CVE-2021-22947 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-09-29 20:15 修改: 2026-04-16 15:16
|
| libcurl4 |
CVE-2022-27774 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2026-04-16 14:16
|
| libcurl4 |
CVE-2022-27776 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:56
|
| libcurl4 |
CVE-2022-32206 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libcurl4 |
CVE-2022-32208 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libcurl4 |
CVE-2022-43552 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-09 20:15 修改: 2024-11-21 07:26
|
| libpython2.7-stdlib |
CVE-2020-8492 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-01-30 19:15 修改: 2024-11-21 05:38
|
| libpython2.7-stdlib |
CVE-2021-23336 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-02-15 13:15 修改: 2025-12-17 22:15
|
| libpython2.7-stdlib |
CVE-2021-3733 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-10 17:42 修改: 2025-11-03 22:15
|
| libpython2.7-stdlib |
CVE-2021-4189 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: ftplib should not use the host from the PASV response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-08-24 16:15 修改: 2025-12-17 22:15
|
| libpython2.7-stdlib |
CVE-2022-48566 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| libpython2.7-stdlib |
CVE-2023-27043 |
中危 |
2.7.16-2+deb10u1 |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-19 00:15 修改: 2026-05-12 11:16
|
| libpython2.7-stdlib |
CVE-2023-40217 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: TLS handshake bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-25 01:15 修改: 2025-11-03 22:16
|
| libpython2.7-stdlib |
CVE-2024-0450 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u4 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-03-19 16:15 修改: 2026-04-15 00:35
|
| libcurl4 |
CVE-2023-23916 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-23 20:15 修改: 2025-03-12 19:15
|
| libcurl4 |
CVE-2023-27535 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| libcurl4 |
CVE-2023-27536 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-02-14 16:15
|
| libcurl4 |
CVE-2023-27538 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| libsmartcols1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libsmartcols1 |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| libcurl4 |
CVE-2023-28321 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: IDN wildcard match may lead to Improper Cerificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15
|
| libcurl4 |
CVE-2023-46218 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-12-07 01:15 修改: 2026-05-12 11:16
|
| gpg |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| gpg-agent |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| libsqlite3-0 |
CVE-2019-19645 |
中危 |
3.27.2-3+deb10u1 |
|
sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2019-12-09 16:15 修改: 2024-11-21 04:35
|
| libsqlite3-0 |
CVE-2019-19924 |
中危 |
3.27.2-3+deb10u1 |
|
sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19924
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2019-12-24 16:15 修改: 2024-11-21 04:35
|
| libsqlite3-0 |
CVE-2020-13631 |
中危 |
3.27.2-3+deb10u1 |
|
sqlite: Virtual table can be renamed into the name of one of its shadow tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-05-27 15:15 修改: 2024-11-21 05:01
|
| libelf1 |
CVE-2020-21047 |
中危 |
0.176-1.1 |
0.176-1.1+deb10u1 |
The libcpu component which is used by libasm of elfutils version 0.177 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21047
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:12
|
| gpg-wks-client |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| libc-dev-bin |
CVE-2016-10228 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv program can hang when invoked with the -c option
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2017-03-02 01:59 修改: 2026-05-13 00:24
|
| libc-dev-bin |
CVE-2019-25013 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-01-04 18:15 修改: 2025-06-09 16:15
|
| libc-dev-bin |
CVE-2020-10029 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-03-04 15:15 修改: 2024-11-21 04:54
|
| libc-dev-bin |
CVE-2020-27618 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-26 23:15 修改: 2025-06-09 16:15
|
| libc-dev-bin |
CVE-2023-4806 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-18 17:15 修改: 2026-05-12 11:16
|
| libc-dev-bin |
CVE-2023-4813 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-12 22:15 修改: 2025-09-26 12:15
|
| libc-dev-bin |
CVE-2024-33600 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc-dev-bin |
CVE-2024-33601 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc-dev-bin |
CVE-2024-33602 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| gpg-wks-server |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| gpgconf |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| libssl1.1 |
CVE-2021-4160 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u8 |
openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4160
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-01-28 22:15 修改: 2024-11-21 06:37
|
| libssl1.1 |
CVE-2022-2097 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-05 11:15 修改: 2024-11-21 07:00
|
| libssl1.1 |
CVE-2022-4304 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| libssl1.1 |
CVE-2023-0465 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-28 15:15 修改: 2025-02-18 21:15
|
| libssl1.1 |
CVE-2023-0466 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-28 15:15 修改: 2025-02-19 18:15
|
| libssl1.1 |
CVE-2023-2650 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-30 14:15 修改: 2025-03-19 16:15
|
| libssl1.1 |
CVE-2023-3446 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u6 |
openssl: Excessive time spent checking DH keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-07-19 12:15 修改: 2025-04-23 17:16
|
| libssl1.1 |
CVE-2023-3817 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u6 |
OpenSSL: Excessive time spent checking DH q parameter value
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-07-31 16:15 修改: 2025-05-05 16:15
|
| libssl1.1 |
CVE-2023-5678 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-11-06 16:15 修改: 2026-05-12 11:16
|
| libssl1.1 |
CVE-2024-0727 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-01-26 09:15 修改: 2026-05-12 12:16
|
| libssl1.1 |
CVE-2024-4741 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-11-13 11:15 修改: 2026-04-15 00:35
|
| gpgsm |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| gpgv |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| curl |
CVE-2022-27776 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:56
|
| iproute2 |
CVE-2019-20795 |
中危 |
4.20.0-2+deb10u1 |
|
iproute: use-after-free in get_netnsid_from_name in ip/ipnetns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20795
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-05-09 21:15 修改: 2024-11-21 04:39
|
| libaprutil1 |
CVE-2022-25147 |
中危 |
1.6.1-4 |
1.6.1-4+deb10u1 |
apr-util: out-of-bounds writes in the apr_base64
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25147
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-01-31 16:15 修改: 2025-02-13 17:15
|
| libsvn1 |
CVE-2021-28544 |
中危 |
1.10.4-1+deb10u2 |
1.10.4-1+deb10u3 |
subversion: SVN authz protected copyfrom paths regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28544
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 05:59
|
| libexpat1 |
CVE-2022-25313 |
中危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Stack exhaustion in doctype parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-02-18 05:15 修改: 2025-05-30 20:15
|
| curl |
CVE-2022-32206 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libfdisk1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libfdisk1 |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| git |
CVE-2022-39253 |
中危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u5 |
git: exposure of sensitive information to a malicious actor
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-10-19 11:15 修改: 2024-11-21 07:17
|
| libsystemd0 |
CVE-2021-33910 |
中危 |
241-7~deb10u7 |
241-7~deb10u8 |
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33910
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-20 19:15 修改: 2025-06-09 16:15
|
| libsystemd0 |
CVE-2021-3997 |
中危 |
241-7~deb10u7 |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-23 20:15 修改: 2024-11-21 06:23
|
| libsystemd0 |
CVE-2022-3821 |
中危 |
241-7~deb10u7 |
241-7~deb10u10 |
systemd: buffer overrun in format_timespan() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-11-08 22:15 修改: 2025-05-02 18:15
|
| libsystemd0 |
CVE-2022-4415 |
中危 |
241-7~deb10u7 |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-01-11 15:15 修改: 2025-11-03 20:15
|
| libsystemd0 |
CVE-2023-7008 |
中危 |
241-7~deb10u7 |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-23 13:15 修改: 2025-11-04 17:15
|
| git |
CVE-2023-22490 |
中危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u8 |
git: data exfiltration with maliciously crafted repository
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-02-14 20:15 修改: 2024-11-21 07:44
|
| linux-libc-dev |
CVE-2019-16089 |
中危 |
4.19.194-2 |
|
kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16089
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-09-06 23:15 修改: 2024-11-21 04:30
|
| linux-libc-dev |
CVE-2019-20794 |
中危 |
4.19.194-2 |
|
kernel: task processes not being properly ended could lead to resource exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20794
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-05-09 18:15 修改: 2024-11-21 04:39
|
| linux-libc-dev |
CVE-2020-12363 |
中危 |
4.19.194-2 |
|
kernel: Improper input validation in some Intel(R) Graphics Drivers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12363
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-17 14:15 修改: 2024-11-21 04:59
|
| linux-libc-dev |
CVE-2020-12364 |
中危 |
4.19.194-2 |
|
kernel: Null pointer dereference in some Intel(R) Graphics Drivers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12364
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-17 14:15 修改: 2024-11-21 04:59
|
| linux-libc-dev |
CVE-2020-14304 |
中危 |
4.19.194-2 |
|
kernel: ethtool when reading eeprom of device could lead to memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14304
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-09-15 20:15 修改: 2024-11-21 05:02
|
| linux-libc-dev |
CVE-2020-36311 |
中危 |
4.19.194-2 |
4.19.194-3 |
kernel: DoS by triggering destruction of a large SEV VM
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36311
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-04-07 00:15 修改: 2024-11-21 05:29
|
| linux-libc-dev |
CVE-2020-36322 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36322
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-04-14 06:15 修改: 2024-11-21 05:29
|
| linux-libc-dev |
CVE-2020-36516 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: off-path attacker may inject data or terminate victim's TCP session
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36516
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-26 04:15 修改: 2024-11-21 05:29
|
| linux-libc-dev |
CVE-2020-3702 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: ath9k: information disclosure via specifically timed and handcrafted traffic
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3702
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-09-08 10:15 修改: 2024-11-21 05:31
|
| linux-libc-dev |
CVE-2021-0920 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: Use After Free in unix_gc() which could result in a local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0920
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-15 19:15 修改: 2025-10-23 14:53
|
| linux-libc-dev |
CVE-2021-20317 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: timer tree corruption leads to missing wakeup and system freeze
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20317
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-09-27 11:15 修改: 2024-11-21 05:46
|
| linux-libc-dev |
CVE-2021-20320 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: s390 eBPF JIT miscompilation issues fixes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20320
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-18 18:15 修改: 2024-11-21 05:46
|
| linux-libc-dev |
CVE-2021-20321 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20321
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-18 18:15 修改: 2024-11-21 05:46
|
| linux-libc-dev |
CVE-2021-26401 |
中危 |
4.19.194-2 |
4.19.232-1 |
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26401
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-11 18:15 修改: 2024-11-21 05:56
|
| linux-libc-dev |
CVE-2021-28711 |
中危 |
4.19.194-2 |
4.19.232-1 |
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28711
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| linux-libc-dev |
CVE-2021-28712 |
中危 |
4.19.194-2 |
4.19.232-1 |
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28712
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| linux-libc-dev |
CVE-2021-28713 |
中危 |
4.19.194-2 |
4.19.232-1 |
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28713
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| linux-libc-dev |
CVE-2021-28714 |
中危 |
4.19.194-2 |
4.19.232-1 |
Guest can force Linux netback driver to hog large amounts of kernel me ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28714
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-06 18:15 修改: 2024-11-21 06:00
|
| linux-libc-dev |
CVE-2021-28715 |
中危 |
4.19.194-2 |
4.19.232-1 |
Guest can force Linux netback driver to hog large amounts of kernel me ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28715
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-06 18:15 修改: 2025-05-22 19:15
|
| linux-libc-dev |
CVE-2021-28950 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28950
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-03-20 20:15 修改: 2024-11-21 06:00
|
| linux-libc-dev |
CVE-2021-33624 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: Linux kernel BPF protection against speculative execution attacks can be bypassed to read arbitrary kernel memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33624
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-06-23 16:15 修改: 2025-11-11 16:15
|
| linux-libc-dev |
CVE-2021-33630 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/sched: cbs NULL pointer dereference when offloading is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33630
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-18 15:15 修改: 2025-04-02 18:33
|
| linux-libc-dev |
CVE-2021-33655 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33655
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-18 15:15 修改: 2024-11-21 06:09
|
| linux-libc-dev |
CVE-2021-33656 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33656
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-18 15:15 修改: 2025-04-02 18:33
|
| linux-libc-dev |
CVE-2021-34556 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: BPF program can obtain sensitive information from kernel memory via a speculative store bypass side-channel attack because of the possibility of uninitialized memory locations on the BPF stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34556
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-02 05:15 修改: 2024-11-21 06:10
|
| linux-libc-dev |
CVE-2021-34693 |
中危 |
4.19.194-2 |
4.19.194-3 |
kernel: allows local users to obtain sensitive information from stack memory because of uninitialized data structure in net/can/bcm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34693
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-06-14 22:15 修改: 2024-11-21 06:10
|
| linux-libc-dev |
CVE-2021-35477 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: BPF program can obtain sensitive information from kernel memory via a speculative store bypass side-channel attack because the technique used by the BPF verifier to manage speculation is unreliable
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35477
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-02 04:15 修改: 2024-11-21 06:12
|
| linux-libc-dev |
CVE-2021-3679 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: DoS in rb_per_cpu_empty()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3679
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-05 20:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-37159 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37159
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-07-21 15:16 修改: 2024-11-21 06:14
|
| linux-libc-dev |
CVE-2021-3732 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3732
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-10 17:42 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3744 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3744
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-04 16:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3753 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: a race out-of-bound read in vt
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3753
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-16 19:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3764 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: DoS in ccp_run_aes_gcm_cmd() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3764
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-23 16:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3772 |
中危 |
4.19.194-2 |
4.19.235-1 |
kernel: sctp: Invalid chunks may be used to remotely remove existing associations
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3772
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-02 23:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-38198 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38198
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-08 20:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-38199 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: incorrect connection-setup ordering allows operators of remote NFSv4 servers to cause a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38199
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-08 20:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-39633 |
中危 |
4.19.194-2 |
4.19.208-1 |
In gre_handle_offloads of ip_gre.c, there is a possible page fault due ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39633
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-01-14 20:15 修改: 2024-11-21 06:19
|
| linux-libc-dev |
CVE-2021-4002 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: possible leak or coruption of data residing on hugetlbfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4002
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-03 22:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-4135 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Heap information leak in map_lookup_elem function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4135
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-14 20:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-4149 |
中危 |
4.19.194-2 |
4.19.235-1 |
kernel: Improper lock operation in btrfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4149
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-23 20:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-4155 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4155
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-24 16:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-4159 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: another kernel ptr leak vulnerability via BPF in coerce_reg_to_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4159
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-24 16:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-4203 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4203
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:37
|
| linux-libc-dev |
CVE-2021-42739 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Heap buffer overflow in firedtv driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42739
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-10-20 07:15 修改: 2024-11-21 06:28
|
| linux-libc-dev |
CVE-2021-43389 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43389
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-11-04 19:15 修改: 2024-11-21 06:29
|
| linux-libc-dev |
CVE-2021-43975 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43975
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-11-17 17:15 修改: 2024-11-21 06:30
|
| linux-libc-dev |
CVE-2021-43976 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43976
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-11-17 17:15 修改: 2024-11-21 06:30
|
| linux-libc-dev |
CVE-2021-44879 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44879
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-14 12:15 修改: 2024-11-21 06:31
|
| linux-libc-dev |
CVE-2021-45095 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: refcount leak in pep_sock_accept() in net/phonet/pep.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45095
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-16 04:15 修改: 2024-11-21 06:31
|
| linux-libc-dev |
CVE-2021-45480 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: memory leak in the __rds_conn_create() in net/rds/connection.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45480
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-24 23:15 修改: 2024-11-21 06:32
|
| linux-libc-dev |
CVE-2021-45868 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45868
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-18 07:15 修改: 2024-11-21 06:33
|
| linux-libc-dev |
CVE-2021-46906 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: info leak in hid_submit_ctrl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46906
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 18:15 修改: 2025-12-10 07:15
|
| linux-libc-dev |
CVE-2021-46924 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: NFC: st21nfca: Fix memory leak in device probe and remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46924
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2021-46929 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: sctp: use call_rcu to free endpoint
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46929
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2021-46932 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Input: appletouch - initialize work before device registration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46932
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2021-46933 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46933
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2025-04-22 17:15
|
| linux-libc-dev |
CVE-2021-46935 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: binder: fix async_free_space accounting for empty parcels
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46935
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2021-47086 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: phonet/pep: refuse to enable an unbound pipe
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47086
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-04 18:15 修改: 2025-01-16 17:13
|
| linux-libc-dev |
CVE-2021-47100 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47100
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-04 18:15 修改: 2025-02-03 13:51
|
| linux-libc-dev |
CVE-2021-47104 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47104
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-04 19:15 修改: 2025-01-07 17:32
|
| linux-libc-dev |
CVE-2021-47161 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: spi: spi-fsl-dspi: Fix a resource leak in an error handling path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47161
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-25 10:15 修改: 2025-03-19 16:28
|
| linux-libc-dev |
CVE-2021-47181 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: musb: tusb6010: check return value after calling platform_get_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47181
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2024-12-20 14:31
|
| linux-libc-dev |
CVE-2021-47184 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: i40e: Fix NULL ptr dereference on VSI filter sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47184
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-01-14 16:41
|
| linux-libc-dev |
CVE-2021-47185 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47185
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-03-21 14:59
|
| linux-libc-dev |
CVE-2021-47189 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: btrfs: fix memory ordering between normal and ordered work functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47189
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-04-30 16:34
|
| linux-libc-dev |
CVE-2021-47203 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47203
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-03-27 21:15
|
| linux-libc-dev |
CVE-2021-47206 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: host: ohci-tmio: check return value after calling platform_get_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47206
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-01-07 17:12
|
| linux-libc-dev |
CVE-2021-47207 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ALSA: gus: fix null pointer dereference on pointer block
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47207
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-01-13 20:42
|
| linux-libc-dev |
CVE-2021-47210 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47210
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-03-27 21:17
|
| linux-libc-dev |
CVE-2021-47216 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: advansys: Fix kernel pointer leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47216
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-03-18 17:01
|
| linux-libc-dev |
CVE-2021-47217 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47217
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 19:15 修改: 2025-01-14 14:44
|
| linux-libc-dev |
CVE-2021-47223 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: bridge: fix vlan tunnel dst null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47223
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-02-03 16:11
|
| linux-libc-dev |
CVE-2021-47229 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: PCI: aardvark: Fix kernel panic during PIO transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47229
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:42
|
| linux-libc-dev |
CVE-2021-47231 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: can: mcba_usb: fix memory leak in mcba_usb
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47231
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:31
|
| linux-libc-dev |
CVE-2021-47236 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: cdc_eem: fix tx fixup skb leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47236
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:44
|
| linux-libc-dev |
CVE-2021-47237 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: hamradio: fix memory leak in mkiss_close
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47237
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:05
|
| linux-libc-dev |
CVE-2021-47238 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: ipv4: fix memory leak in ip_mc_add1_src
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47238
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:31
|
| linux-libc-dev |
CVE-2021-47248 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: udp: fix race between close() and udp_abort()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47248
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:21
|
| linux-libc-dev |
CVE-2021-47249 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: rds: fix memory leak in rds_recvmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47249
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:01
|
| linux-libc-dev |
CVE-2021-47250 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: ipv4: fix memory leak in netlbl_cipsov4_add_std
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47250
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:00
|
| linux-libc-dev |
CVE-2021-47252 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: batman-adv: Avoid WARN_ON timing related checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47252
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:12
|
| linux-libc-dev |
CVE-2021-47256 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: mm/memory-failure: make sure wait for page writeback in memory_failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47256
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:05
|
| linux-libc-dev |
CVE-2021-47257 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: ieee802154: fix null deref in parse dev addr
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47257
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:30
|
| linux-libc-dev |
CVE-2021-47258 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: scsi: core: Fix error handling of scsi_host_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47258
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:05
|
| linux-libc-dev |
CVE-2021-47259 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: NFS: Fix use-after-free in nfs4_init_client()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47259
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:30
|
| linux-libc-dev |
CVE-2021-47260 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: NFS: Fix a potential NULL dereference in nfs_get_client()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47260
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:35
|
| linux-libc-dev |
CVE-2021-47267 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: usb: fix various gadget panics on 10gbps cabling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47267
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:30
|
| linux-libc-dev |
CVE-2021-47269 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: usb: dwc3: ep0: fix NULL pointer exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47269
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:33
|
| linux-libc-dev |
CVE-2021-47270 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: usb: fix various gadgets null ptr deref on 10gbps cabling.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47270
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:32
|
| linux-libc-dev |
CVE-2021-47274 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: tracing: Correct the length check which causes memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47274
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:29
|
| linux-libc-dev |
CVE-2021-47276 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: ftrace: Do not blindly read the ip address in ftrace_bug()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47276
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-30 14:46
|
| linux-libc-dev |
CVE-2021-47284 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: isdn: mISDN: netjet: Fix crash in nj_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47284
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:48
|
| linux-libc-dev |
CVE-2021-47294 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: netrom: Decrease sock refcount when sock timers expire
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47294
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-06-23 20:19
|
| linux-libc-dev |
CVE-2021-47296 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47296
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-06-23 20:19
|
| linux-libc-dev |
CVE-2021-47297 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: net: fix uninit-value in caif_seqpkt_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47297
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:42
|
| linux-libc-dev |
CVE-2021-47305 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: dma-buf/sync_file: Don't leak fences on merge failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47305
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-05-12 20:00
|
| linux-libc-dev |
CVE-2021-47308 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: scsi: libfc: Fix array index out of bound exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47308
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:42
|
| linux-libc-dev |
CVE-2021-47314 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: memory: fsl_ifc: fix leak of private memory on probe failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47314
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:38
|
| linux-libc-dev |
CVE-2021-47315 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: memory: fsl_ifc: fix leak of IO mapping on probe failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47315
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-05-12 20:00
|
| linux-libc-dev |
CVE-2021-47319 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: virtio-blk: Fix memory leak among suspend/resume procedure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47319
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:28
|
| linux-libc-dev |
CVE-2021-47320 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: nfs: fix acl memory leak of posix_acl_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47320
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:27
|
| linux-libc-dev |
CVE-2021-47323 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47323
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:40
|
| linux-libc-dev |
CVE-2021-47324 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: watchdog: Fix possible use-after-free in wdt_startup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47324
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:39
|
| linux-libc-dev |
CVE-2021-47330 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47330
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:17
|
| linux-libc-dev |
CVE-2021-47337 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47337
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:15
|
| linux-libc-dev |
CVE-2021-47340 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: jfs: fix GPF in diFree
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47340
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-12-10 08:15
|
| linux-libc-dev |
CVE-2021-47343 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: dm btree remove: assign new_root only when removal succeeds
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47343
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-05-12 19:58
|
| linux-libc-dev |
CVE-2021-47344 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: media: zr364xx: fix memory leak in zr364xx_start_readpipe
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47344
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:13
|
| linux-libc-dev |
CVE-2021-47345 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: RDMA/cma: Fix rdma_resolve_route() memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47345
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:12
|
| linux-libc-dev |
CVE-2021-47347 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: wl1251: Fix possible buffer overflow in wl1251_cmd_scan
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47347
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:31
|
| linux-libc-dev |
CVE-2021-47353 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: udf: Fix NULL pointer dereference in udf_symlink function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47353
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:11
|
| linux-libc-dev |
CVE-2021-47356 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: mISDN: fix possible use-after-free in HFC_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47356
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:54
|
| linux-libc-dev |
CVE-2021-47373 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: irqchip/gic-v3-its: Fix potential VPE leak on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47373
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-26 17:57
|
| linux-libc-dev |
CVE-2021-47375 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47375
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:53
|
| linux-libc-dev |
CVE-2021-47387 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47387
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-25 15:38
|
| linux-libc-dev |
CVE-2021-47395 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47395
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-25 15:36
|
| linux-libc-dev |
CVE-2021-47397 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47397
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:06
|
| linux-libc-dev |
CVE-2021-47401 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ipack: ipoctal: fix stack information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47401
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-26 19:03
|
| linux-libc-dev |
CVE-2021-47403 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ipack: ipoctal: fix module reference leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47403
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:52
|
| linux-libc-dev |
CVE-2021-47405 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: HID: usbhid: free raw_report buffers in usbhid_stop
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47405
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-02-03 16:11
|
| linux-libc-dev |
CVE-2021-47409 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: dwc2: check return value after calling platform_get_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47409
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 20:00
|
| linux-libc-dev |
CVE-2021-47416 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: phy: mdio: fix memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47416
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-31 18:53
|
| linux-libc-dev |
CVE-2021-47418 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net_sched: fix NULL deref in fifo_set_limit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47418
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-31 20:03
|
| linux-libc-dev |
CVE-2021-47423 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: drm/nouveau/debugfs: fix file release memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47423
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:36
|
| linux-libc-dev |
CVE-2021-47424 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: i40e: Fix freeing of uninitialized misc IRQ vector
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47424
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-23 20:17
|
| linux-libc-dev |
CVE-2021-47425 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: i2c: acpi: fix resource leak in reconfiguration device addition
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47425
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 15:15 修改: 2025-09-23 20:18
|
| linux-libc-dev |
CVE-2021-47434 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: xhci: Fix command ring pointer corruption while aborting a command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47434
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-09-25 15:58
|
| linux-libc-dev |
CVE-2021-47435 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: dm: fix mempool NULL pointer race when completing IO
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47435
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-01-31 15:16
|
| linux-libc-dev |
CVE-2021-47436 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usb: musb: dsps: Fix the probe error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47436
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-03-01 02:38
|
| linux-libc-dev |
CVE-2021-47440 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: encx24j600: check error in devm_regmap_init_encx24j600
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47440
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-04-02 15:14
|
| linux-libc-dev |
CVE-2021-47442 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47442
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-01-07 20:14
|
| linux-libc-dev |
CVE-2021-47443 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47443
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-04-02 15:12
|
| linux-libc-dev |
CVE-2021-47445 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: drm/msm: Fix null pointer dereference on pointer edp
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47445
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-01-14 16:28
|
| linux-libc-dev |
CVE-2021-47456 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: can: peak_pci: peak_pci_remove(): fix UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47456
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-04-02 15:11
|
| linux-libc-dev |
CVE-2021-47460 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ocfs2: fix data corruption after conversion from inline format
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47460
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-09-24 12:05
|
| linux-libc-dev |
CVE-2021-47468 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: isdn: mISDN: Fix sleeping function called from invalid context
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47468
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 07:15 修改: 2025-09-24 18:40
|
| linux-libc-dev |
CVE-2021-47476 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: comedi: ni_usb6501: fix NULL-deref in command paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47476
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-04-02 15:10
|
| linux-libc-dev |
CVE-2021-47478 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: isofs: Fix out of bound access for corrupted isofs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47478
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-04-02 15:09
|
| linux-libc-dev |
CVE-2021-47480 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: core: Put LLD module refcnt after SCSI device is released
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47480
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-29 16:43
|
| linux-libc-dev |
CVE-2021-47482 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: batman-adv: fix error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47482
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-04-02 15:09
|
| linux-libc-dev |
CVE-2021-47495 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: usbnet: sanity check for maxpacket
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47495
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-22 09:15 修改: 2025-09-29 16:34
|
| linux-libc-dev |
CVE-2021-47499 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47499
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-01-06 20:45
|
| linux-libc-dev |
CVE-2021-47509 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ALSA: pcm: oss: Limit the period size to 16MB
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47509
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-29 16:30
|
| linux-libc-dev |
CVE-2021-47511 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ALSA: pcm: oss: Fix negative period/buffer sizes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47511
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-29 17:09
|
| linux-libc-dev |
CVE-2021-47515 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: seg6: fix the iif in the IPv6 socket control block
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47515
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-24 19:37
|
| linux-libc-dev |
CVE-2021-47516 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47516
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47518 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47518
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47527 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: serial: core: fix transmit-buffer reset and memleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47527
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-24 19:47
|
| linux-libc-dev |
CVE-2021-47538 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47538
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:55
|
| linux-libc-dev |
CVE-2021-47542 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47542
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47547 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47547
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-04-01 18:41
|
| linux-libc-dev |
CVE-2021-47548 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47548
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 15:15 修改: 2025-04-01 18:42
|
| linux-libc-dev |
CVE-2021-47579 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: ovl: fix warning in ovl_create_real()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47579
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2025-09-29 17:15
|
| linux-libc-dev |
CVE-2021-47583 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: media: mxl111sf: change mutex_init() location
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47583
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47587 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: systemport: Add global locking for descriptor lifecycle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47587
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47588 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: sit: do not call ipip6_dev_free() from sit_init_net()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47588
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2025-10-01 13:42
|
| linux-libc-dev |
CVE-2021-47602 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: mac80211: track only QoS data frames for admission control
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47602
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47603 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: audit: improve robustness of the audit queue handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47603
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47606 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: netlink: af_netlink: Prevent empty skb by adding a check on len.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47606
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47611 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: mac80211: validate extended element ID is present
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47611
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47612 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfc: fix segfault in nfc_genl_dump_devices_done
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47612
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47617 |
中危 |
4.19.194-2 |
4.19.235-1 |
kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47617
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47619 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: i40e: Fix queues reservation for XDP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47619
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2021-47620 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Bluetooth: refactor malicious adv data check
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47620
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2024-11-21 06:36
|
| linux-libc-dev |
CVE-2022-0001 |
中危 |
4.19.194-2 |
4.19.232-1 |
hw: cpu: intel: Branch History Injection (BHI)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0001
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-11 18:15 修改: 2025-05-05 17:17
|
| linux-libc-dev |
CVE-2022-0002 |
中危 |
4.19.194-2 |
4.19.232-1 |
hw: cpu: intel: Intra-Mode BTI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0002
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-11 18:15 修改: 2025-05-05 17:17
|
| linux-libc-dev |
CVE-2022-0322 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0322
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0480 |
中危 |
4.19.194-2 |
|
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0480
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0487 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: use after free in moxart_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0487
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-04 23:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0494 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: information leak in scsi_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0494
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0617 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0617
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-16 17:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-0812 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: NFS over RDMA random memory leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0812
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-0854 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: swiotlb information leak with DMA_FROM_DEVICE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0854
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-23 20:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1016 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1016
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:39
|
| linux-libc-dev |
CVE-2022-1195 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1195
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-29 16:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1198 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: use-after-free in drivers/net/hamradio/6pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1198
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1204 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: Use after free in net/ax25/af_ax25.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1204
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1205 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1205
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1462 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: possible race condition in drivers/tty/tty_buffers.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1462
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-02 14:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1516 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: null-ptr-deref caused by x25_disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1516
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-05 15:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-1974 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1974
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-1975 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: sleep in atomic bug when firmware download timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1975
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-20008 |
中危 |
4.19.194-2 |
4.19.232-1 |
In mmc_blk_read_single of block.c, there is a possible way to read ker ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20008
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-05-10 20:15 修改: 2024-11-21 06:41
|
| linux-libc-dev |
CVE-2022-20132 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: Out of bounds read in lg_probe and related functions of hid-lg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20132
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 13:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20154 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: possible use after free in lock_sock_nested of sock.c for the SCTP protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20154
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 14:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20369 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20369
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-11 15:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20423 |
中危 |
4.19.194-2 |
4.19.249-1 |
In rndis_set_response of rndis.c, there is a possible out of bounds wr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20423
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-11 20:15 修改: 2024-11-21 06:42
|
| linux-libc-dev |
CVE-2022-20572 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20572
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-16 16:15 修改: 2025-04-18 15:15
|
| linux-libc-dev |
CVE-2022-21123 |
中危 |
4.19.194-2 |
4.19.249-2 |
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21123
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 20:15 修改: 2025-05-05 17:17
|
| linux-libc-dev |
CVE-2022-21125 |
中危 |
4.19.194-2 |
4.19.249-2 |
hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21125
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 20:15 修改: 2025-05-05 17:17
|
| linux-libc-dev |
CVE-2022-21166 |
中危 |
4.19.194-2 |
4.19.249-2 |
hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21166
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-15 21:15 修改: 2025-05-05 17:17
|
| linux-libc-dev |
CVE-2022-21499 |
中危 |
4.19.194-2 |
|
kernel: possible to use the debugger to write zero into a location of choice
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21499
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-09 21:15 修改: 2024-11-21 06:44
|
| linux-libc-dev |
CVE-2022-2153 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2153
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-31 16:15 修改: 2024-11-21 07:00
|
| linux-libc-dev |
CVE-2022-2318 |
中危 |
4.19.194-2 |
4.19.260-1 |
Kernel: A use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2318
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-06 19:15 修改: 2024-11-21 07:00
|
| linux-libc-dev |
CVE-2022-2380 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: vulnerability in sm712fb driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2380
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-13 19:15 修改: 2025-04-23 18:15
|
| linux-libc-dev |
CVE-2022-23960 |
中危 |
4.19.194-2 |
4.19.249-2 |
hw: cpu: arm64: Spectre-BHB
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23960
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-13 00:15 修改: 2024-11-21 06:49
|
| linux-libc-dev |
CVE-2022-24959 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24959
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-11 06:15 修改: 2024-11-21 06:51
|
| linux-libc-dev |
CVE-2022-2503 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: LoadPin bypass via dm-verity table reload
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2503
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-12 11:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-25258 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: security issues in the OS descriptor handling section of composite_setup function (composite.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25258
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-16 20:15 修改: 2024-11-21 06:51
|
| linux-libc-dev |
CVE-2022-25375 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: information disclosure in drivers/usb/gadget/function/rndis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25375
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-20 20:15 修改: 2024-11-21 06:52
|
| linux-libc-dev |
CVE-2022-26373 |
中危 |
4.19.194-2 |
4.19.260-1 |
hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26373
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-18 20:15 修改: 2025-05-05 17:18
|
| linux-libc-dev |
CVE-2022-2663 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: netfilter: nf_conntrack_irc message handling issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2663
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-01 21:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-26966 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: heap memory leak in drivers/net/usb/sr9700.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26966
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-03-12 22:15 修改: 2024-11-21 06:54
|
| linux-libc-dev |
CVE-2022-28356 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: refcount leak in llc_ui_bind and llc_ui_autobind
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28356
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-02 21:15 修改: 2025-05-05 17:18
|
| linux-libc-dev |
CVE-2022-28388 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28388
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-03 21:15 修改: 2025-05-05 17:18
|
| linux-libc-dev |
CVE-2022-28389 |
中危 |
4.19.194-2 |
4.19.249-2 |
kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28389
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-04-03 21:15 修改: 2024-11-21 06:57
|
| linux-libc-dev |
CVE-2022-2873 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: an out-of-bounds vulnerability in i2c-ismt driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2873
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-22 15:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-29900 |
中危 |
4.19.194-2 |
|
hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29900
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-12 19:15 修改: 2024-11-21 06:59
|
| linux-libc-dev |
CVE-2022-29901 |
中危 |
4.19.194-2 |
4.19.269-1 |
hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29901
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-12 19:15 修改: 2024-11-21 06:59
|
| linux-libc-dev |
CVE-2022-3107 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3107
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-14 21:15 修改: 2025-04-22 15:15
|
| linux-libc-dev |
CVE-2022-3111 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: wm8350-power: memory leak in free_charger_irq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3111
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-14 21:15 修改: 2025-04-22 14:15
|
| linux-libc-dev |
CVE-2022-33744 |
中危 |
4.19.194-2 |
4.19.260-1 |
Arm guests can cause Dom0 DoS via PV devices When mapping pages of gue ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33744
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-05 13:15 修改: 2024-11-21 07:08
|
| linux-libc-dev |
CVE-2022-3524 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: memory leak in ipv6_renew_options()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3524
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-16 10:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3586 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: net scheduler use-after-free information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3586
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-19 18:15 修改: 2025-06-25 20:59
|
| linux-libc-dev |
CVE-2022-3594 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: Rate limit overflow messages in r8152 in intr_callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3594
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-18 20:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3621 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3621
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-20 20:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3628 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: USB-accessible buffer overflow in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3628
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-12 19:15 修改: 2025-04-08 15:15
|
| linux-libc-dev |
CVE-2022-36280 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36280
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-09 15:15 修改: 2024-11-21 07:12
|
| linux-libc-dev |
CVE-2022-3643 |
中危 |
4.19.194-2 |
4.19.269-1 |
v1: Guests can trigger NIC interface reset/abort/crash via netback
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3643
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-07 01:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3646 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3646
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-21 18:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-36879 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36879
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-07-27 04:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2022-3707 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3707
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-06 23:15 修改: 2025-03-07 16:15
|
| linux-libc-dev |
CVE-2022-39188 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39188
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-02 05:15 修改: 2024-11-21 07:17
|
| linux-libc-dev |
CVE-2022-39842 |
中危 |
4.19.194-2 |
4.19.260-1 |
Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39842
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-05 07:15 修改: 2024-11-21 07:18
|
| linux-libc-dev |
CVE-2022-40307 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: use-after-free in efi_capsule_write in capsule-loader.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40307
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-09 05:15 修改: 2024-11-21 07:21
|
| linux-libc-dev |
CVE-2022-40768 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40768
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-18 05:15 修改: 2024-11-21 07:22
|
| linux-libc-dev |
CVE-2022-40982 |
中危 |
4.19.194-2 |
4.19.289-2 |
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40982
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-11 03:15 修改: 2024-11-21 07:22
|
| linux-libc-dev |
CVE-2022-41218 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Report vmalloc UAF in dvb-core/dmxdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41218
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-21 07:15 修改: 2025-05-28 16:15
|
| linux-libc-dev |
CVE-2022-41849 |
中危 |
4.19.194-2 |
4.19.269-1 |
Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41849
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-30 06:15 修改: 2024-11-21 07:23
|
| linux-libc-dev |
CVE-2022-41850 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41850
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-09-30 06:15 修改: 2024-11-21 07:23
|
| linux-libc-dev |
CVE-2022-42328 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42328
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-07 01:15 修改: 2025-04-23 15:15
|
| linux-libc-dev |
CVE-2022-42329 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42329
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-07 01:15 修改: 2025-04-23 15:15
|
| linux-libc-dev |
CVE-2022-42703 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: use-after-free related to leaf anon_vma double reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42703
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-09 23:15 修改: 2024-11-21 07:25
|
| linux-libc-dev |
CVE-2022-42895 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42895
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-23 15:15 修改: 2024-11-21 07:25
|
| linux-libc-dev |
CVE-2022-43750 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: memory corruption in usbmon driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43750
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-26 04:15 修改: 2025-05-07 14:15
|
| linux-libc-dev |
CVE-2022-4662 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4662
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-12-22 22:15 修改: 2025-04-09 19:15
|
| linux-libc-dev |
CVE-2022-47929 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: NULL pointer dereference in traffic control subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47929
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-17 21:15 修改: 2025-04-04 18:15
|
| linux-libc-dev |
CVE-2022-48619 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: event code falling outside of a bitmap in input_set_capability() leads to panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48619
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-12 03:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48627 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: vt: fix memory overlapping when deleting chars in the buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48627
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-04-29 16:51
|
| linux-libc-dev |
CVE-2022-48629 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: crypto: qcom-rng - ensure buffer for generate is completely filled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48629
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-05 12:15 修改: 2025-02-26 07:00
|
| linux-libc-dev |
CVE-2022-48630 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48630
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-05 12:15 修改: 2025-02-03 14:09
|
| linux-libc-dev |
CVE-2022-48636 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48636
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-28 13:15 修改: 2025-03-21 18:26
|
| linux-libc-dev |
CVE-2022-48641 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: netfilter: ebtables: fix memory leak when blob is malformed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48641
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-28 13:15 修改: 2025-01-07 16:57
|
| linux-libc-dev |
CVE-2022-48651 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48651
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-28 13:15 修改: 2025-03-20 21:33
|
| linux-libc-dev |
CVE-2022-48659 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: mm/slub: fix to return errno if kmalloc() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48659
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-28 13:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48671 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48671
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48687 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48687
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48688 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: i40e: Fix kernel crash during module removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48688
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48693 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48693
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48697 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: nvmet: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48697
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 16:15 修改: 2025-04-08 15:47
|
| linux-libc-dev |
CVE-2022-48704 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: drm/radeon: add a force flush to delay work when radeon
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48704
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-03 18:15 修改: 2025-09-19 14:44
|
| linux-libc-dev |
CVE-2022-48708 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: pinctrl: single: fix potential NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48708
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:05
|
| linux-libc-dev |
CVE-2022-48710 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: drm/radeon: fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48710
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:09
|
| linux-libc-dev |
CVE-2022-48711 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: tipc: improve size validations for received domain records
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48711
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2025-09-17 17:11
|
| linux-libc-dev |
CVE-2022-48715 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48715
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2025-10-01 13:43
|
| linux-libc-dev |
CVE-2022-48722 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: ieee802154: ca8210: Stop leaking skb's
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48722
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 11:15 修改: 2025-09-17 17:13
|
| linux-libc-dev |
CVE-2022-48724 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48724
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48743 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: net: amd-xgbe: Fix skb data length underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48743
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48754 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: phylib: fix potential use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48754
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-03-24 18:17
|
| linux-libc-dev |
CVE-2022-48756 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48756
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| linux-libc-dev |
CVE-2022-48758 |
中危 |
4.19.194-2 |
4.19.232-1 |
kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48758
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-20 12:15 修改: 2025-09-29 17:23
|
| linux-libc-dev |
CVE-2023-0394 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: NULL pointer dereference in rawv6_push_pending_frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0394
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-26 21:18 修改: 2025-03-31 15:15
|
| linux-libc-dev |
CVE-2023-0458 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0458
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-26 19:15 修改: 2024-11-21 07:37
|
| linux-libc-dev |
CVE-2023-0459 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Copy_from_user on 64-bit versions may leak kernel information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0459
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-25 14:15 修改: 2024-11-21 07:37
|
| linux-libc-dev |
CVE-2023-0590 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: use-after-free due to race condition in qdisc_graft()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0590
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-23 21:15 修改: 2024-11-21 07:37
|
| linux-libc-dev |
CVE-2023-0615 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: multiple issues for the Video for Linux version 2 test driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0615
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-02-06 23:15 修改: 2025-03-25 20:15
|
| linux-libc-dev |
CVE-2023-1073 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: HID: check empty report_list in hid_validate_values()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1073
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-1074 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: sctp: fail if no bound addresses can be used for a given scope
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1074
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-1079 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: hid: Use After Free in asus_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1079
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2025-02-19 22:15
|
| linux-libc-dev |
CVE-2023-1095 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1095
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-02-28 23:15 修改: 2025-03-18 16:15
|
| linux-libc-dev |
CVE-2023-1206 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: hash collisions in the IPv6 connection lookup table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1206
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-30 22:15 修改: 2024-11-21 07:38
|
| linux-libc-dev |
CVE-2023-1382 |
中危 |
4.19.194-2 |
4.19.269-1 |
kernel: denial of service in tipc_conn_close
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1382
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-19 23:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-1637 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: save/restore speculative MSRs during S3 suspend/resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1637
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 22:15 修改: 2025-02-19 21:15
|
| linux-libc-dev |
CVE-2023-1855 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: use-after-free bug in remove function xgene_hwmon_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1855
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-05 20:15 修改: 2025-02-12 16:15
|
| linux-libc-dev |
CVE-2023-1859 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Use after free in xen_9pfs_front_remove due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1859
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-17 23:15 修改: 2025-03-18 19:15
|
| linux-libc-dev |
CVE-2023-1990 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Use after free bug in ndlc_remove due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1990
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-12 20:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-1998 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Spectre v2 SMT mitigations problem
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1998
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-21 15:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-2002 |
中危 |
4.19.194-2 |
4.19.289-1 |
Kernel: bluetooth: Unauthorized management command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2002
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-26 17:15 修改: 2024-11-21 07:57
|
| linux-libc-dev |
CVE-2023-20569 |
中危 |
4.19.194-2 |
|
amd: Return Address Predictor vulnerability leading to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20569
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-08 18:15 修改: 2024-11-21 07:41
|
| linux-libc-dev |
CVE-2023-20593 |
中危 |
4.19.194-2 |
4.19.289-1 |
hw: amd: Cross-Process Information Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20593
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-24 20:15 修改: 2025-02-13 17:16
|
| linux-libc-dev |
CVE-2023-2162 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: UAF during login when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-19 20:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-2194 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2194
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-20 21:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-2269 |
中危 |
4.19.194-2 |
4.19.289-1 |
kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2269
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-25 21:15 修改: 2024-11-21 07:58
|
| linux-libc-dev |
CVE-2023-23454 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23454
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-12 07:15 修改: 2025-03-20 21:15
|
| linux-libc-dev |
CVE-2023-23455 |
中危 |
4.19.194-2 |
4.19.282-1 |
Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23455
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-01-12 07:15 修改: 2025-03-20 21:15
|
| linux-libc-dev |
CVE-2023-2513 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: ext4: use-after-free in ext4_xattr_set_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2513
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-08 21:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-26545 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: mpls: double free on sysctl allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26545
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-02-25 04:15 修改: 2025-06-25 20:54
|
| linux-libc-dev |
CVE-2023-28328 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28328
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-19 23:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-2860 |
中危 |
4.19.194-2 |
4.19.260-1 |
kernel: ipv6: sr: out-of-bounds read when setting HMAC data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2860
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-24 16:15 修改: 2024-11-21 07:59
|
| linux-libc-dev |
CVE-2023-28772 |
中危 |
4.19.194-2 |
4.19.208-1 |
kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28772
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-23 15:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-2985 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: use-after-free issue in hfsplus_release_folio in fs/hfsplus/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2985
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-01 01:15 修改: 2025-03-11 16:15
|
| linux-libc-dev |
CVE-2023-3006 |
中危 |
4.19.194-2 |
|
RHEL: Add Spectre-BHB mitigation for AmpereOne
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3006
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-31 20:15 修改: 2025-01-09 21:15
|
| linux-libc-dev |
CVE-2023-30456 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30456
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-10 02:15 修改: 2025-03-19 16:15
|
| linux-libc-dev |
CVE-2023-30772 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: da9150: race condition leading to use-after-free in da9150_charger_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30772
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-16 04:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-31084 |
中危 |
4.19.194-2 |
4.19.289-1 |
kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31084
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-04-24 06:15 修改: 2025-03-18 20:15
|
| linux-libc-dev |
CVE-2023-3159 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: use after free issue in driver/firewire in outbound_phy_packet_callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3159
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-12 21:15 修改: 2025-04-23 17:16
|
| linux-libc-dev |
CVE-2023-3161 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: fbcon: shift-out-of-bounds in fbcon_set_font()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3161
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-12 20:15 修改: 2025-03-11 15:15
|
| linux-libc-dev |
CVE-2023-3212 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: gfs2: NULL pointer dereference in gfs2_evict_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3212
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-23 20:15 修改: 2024-11-21 08:16
|
| linux-libc-dev |
CVE-2023-3220 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: NULL pointer dereference in dpu_crtc_atomic_check() in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3220
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-20 20:15 修改: 2025-03-11 15:15
|
| linux-libc-dev |
CVE-2023-32269 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: user after free in nr_listen in net/netrom/af_netrom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32269
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-05 17:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-33203 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33203
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-18 08:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-3338 |
中危 |
4.19.194-2 |
4.19.289-1 |
kernel: DECnet: crash due to a NULL pointer dereference in the dn_nsp_send function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3338
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-30 22:15 修改: 2024-11-21 08:17
|
| linux-libc-dev |
CVE-2023-3358 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3358
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-06-28 22:15 修改: 2025-03-10 21:15
|
| linux-libc-dev |
CVE-2023-34256 |
中危 |
4.19.194-2 |
4.19.289-1 |
An issue was discovered in the Linux kernel before 6.3.3. There is an ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34256
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-05-31 20:15 修改: 2025-03-11 16:15
|
| linux-libc-dev |
CVE-2023-34324 |
中危 |
4.19.194-2 |
4.19.304-1 |
Closing of an event channel in the Linux kernel can result in a deadlo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34324
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-05 17:15 修改: 2025-11-04 20:16
|
| linux-libc-dev |
CVE-2023-3772 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3772
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-07-25 16:15 修改: 2024-11-21 08:18
|
| linux-libc-dev |
CVE-2023-39189 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39189
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-09 18:15 修改: 2024-11-21 08:14
|
| linux-libc-dev |
CVE-2023-39192 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: netfilter: xtables out-of-bounds read in u32_match_it()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39192
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-09 18:15 修改: 2024-11-21 08:14
|
| linux-libc-dev |
CVE-2023-39193 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39193
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-09 18:15 修改: 2024-11-21 08:14
|
| linux-libc-dev |
CVE-2023-39194 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39194
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-09 18:15 修改: 2024-11-21 08:14
|
| linux-libc-dev |
CVE-2023-42754 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42754
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-05 19:15 修改: 2024-11-21 08:23
|
| linux-libc-dev |
CVE-2023-42755 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: rsvp: out-of-bounds read in rsvp_classify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42755
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-05 19:15 修改: 2024-11-21 08:23
|
| linux-libc-dev |
CVE-2023-4385 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: jfs: NULL pointer dereference in dbFree()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4385
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-16 17:15 修改: 2024-11-21 08:34
|
| linux-libc-dev |
CVE-2023-4459 |
中危 |
4.19.194-2 |
4.19.249-1 |
kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4459
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-08-21 19:15 修改: 2024-11-21 08:35
|
| linux-libc-dev |
CVE-2023-45862 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: drivers/usb/storage/ene_ub6250.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45862
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-14 21:15 修改: 2024-11-21 08:27
|
| linux-libc-dev |
CVE-2023-45863 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45863
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-10-14 21:15 修改: 2024-11-21 08:27
|
| linux-libc-dev |
CVE-2023-46343 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46343
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 10:15 修改: 2025-06-17 14:15
|
| linux-libc-dev |
CVE-2023-47233 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Use after free in brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47233
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-11-03 21:15 修改: 2026-05-12 11:16
|
| linux-libc-dev |
CVE-2023-52429 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: missing check for struct in dm-table.c can cause a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52429
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-12 03:15 修改: 2025-11-04 19:16
|
| linux-libc-dev |
CVE-2023-52443 |
中危 |
4.19.194-2 |
4.19.316-1 |
In the Linux kernel, the following vulnerability has been resolved: a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52443
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52449 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52449
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52470 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: null-ptr-deref in alloc_workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52470
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| linux-libc-dev |
CVE-2023-52477 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52477
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-29 06:15 修改: 2024-12-09 18:39
|
| linux-libc-dev |
CVE-2023-52478 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52478
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-29 06:15 修改: 2025-01-10 18:27
|
| linux-libc-dev |
CVE-2023-52486 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52486
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-11 18:15 修改: 2025-01-14 15:01
|
| linux-libc-dev |
CVE-2023-52527 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52527
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-01-13 20:39
|
| linux-libc-dev |
CVE-2023-52528 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52528
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:27
|
| linux-libc-dev |
CVE-2023-52566 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: nilfs2: potential use after free in nilfs_gccache_submit_read_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52566
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2025-04-08 15:08
|
| linux-libc-dev |
CVE-2023-52567 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: serial: 8250_port: IRQ data NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52567
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:26
|
| linux-libc-dev |
CVE-2023-52574 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: team: NULL pointer dereference when team device type is changed
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52574
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:30
|
| linux-libc-dev |
CVE-2023-52577 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: dccp: out-of-bounds access in dccp_v4_err() and dccp_v6_err()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52577
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:21
|
| linux-libc-dev |
CVE-2023-52583 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ceph: fix deadlock or deadcode of misusing dget()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52583
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-02-03 14:18
|
| linux-libc-dev |
CVE-2023-52587 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: IB/ipoib: Fix mcast list locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52587
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-02-14 16:39
|
| linux-libc-dev |
CVE-2023-52597 |
中危 |
4.19.194-2 |
|
kernel: KVM: s390: fix setting of fpc register
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52597
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-03-14 18:51
|
| linux-libc-dev |
CVE-2023-52601 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: jfs: fix array-index-out-of-bounds in dbAdjTree
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52601
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-03-14 18:50
|
| linux-libc-dev |
CVE-2023-52602 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: jfs: fix slab-out-of-bounds Read in dtSearch
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52602
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-03-14 18:49
|
| linux-libc-dev |
CVE-2023-52606 |
中危 |
4.19.194-2 |
|
kernel: powerpc/lib: Validate size for vector operations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52606
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-02-14 16:40
|
| linux-libc-dev |
CVE-2023-52607 |
中危 |
4.19.194-2 |
|
kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52607
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-06 07:15 修改: 2025-03-14 18:47
|
| linux-libc-dev |
CVE-2023-52609 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: binder: fix race between mmput() and do_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52609
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-03-10 15:28
|
| linux-libc-dev |
CVE-2023-52615 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52615
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2024-12-12 15:20
|
| linux-libc-dev |
CVE-2023-52619 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: pstore/ram: Fix crash when setting number of cpus to an odd number
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52619
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-03-10 15:48
|
| linux-libc-dev |
CVE-2023-52622 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: avoid online resizing failures due to oversized flex bg
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52622
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-26 18:15 修改: 2025-03-17 15:19
|
| linux-libc-dev |
CVE-2023-52623 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: SUNRPC: Fix a suspicious RCU usage warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52623
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-26 18:15 修改: 2025-12-31 00:52
|
| linux-libc-dev |
CVE-2023-52644 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52644
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2025-04-02 13:17
|
| linux-libc-dev |
CVE-2023-52646 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: aio: fix mremap after fork null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-26 13:15 修改: 2025-01-27 15:09
|
| linux-libc-dev |
CVE-2023-52650 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52650
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:09
|
| linux-libc-dev |
CVE-2023-52670 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: rpmsg: virtio: Free driver_override when rpmsg_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52670
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-23 18:20
|
| linux-libc-dev |
CVE-2023-52675 |
中危 |
4.19.194-2 |
|
kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52675
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-03-04 16:53
|
| linux-libc-dev |
CVE-2023-52683 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ACPI: LPIT: Avoid u32 multiplication overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52683
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-12-17 03:43
|
| linux-libc-dev |
CVE-2023-52686 |
中危 |
4.19.194-2 |
|
kernel: powerpc/powernv: Add a null pointer check in opal_event_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52686
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-03-04 16:52
|
| linux-libc-dev |
CVE-2023-52693 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ACPI: video: check for error while searching for backlight device parent
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52693
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-12-17 03:43
|
| linux-libc-dev |
CVE-2023-52698 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: calipso: fix memory leak in netlbl_calipso_add_pass()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52698
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 15:15 修改: 2025-01-07 20:18
|
| linux-libc-dev |
CVE-2023-52699 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: sysv: don't call sb_bread() with pointers_lock held
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52699
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2025-04-04 14:24
|
| linux-libc-dev |
CVE-2023-52703 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 18:54
|
| linux-libc-dev |
CVE-2023-52705 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: nilfs2: fix underflow in second superblock position calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52705
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:18
|
| linux-libc-dev |
CVE-2023-52730 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: mmc: sdio: fix possible resource leaks in some error paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 18:57
|
| linux-libc-dev |
CVE-2023-52742 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: net: USB: Fix wrong-direction WARNING in plusb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52742
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:47
|
| linux-libc-dev |
CVE-2023-52747 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: IB/hfi1: Restore allocated resources on failed copyout
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:10
|
| linux-libc-dev |
CVE-2023-52753 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: drm/amd/display: Avoid NULL dereference of timing generator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52753
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-11-21 08:40
|
| linux-libc-dev |
CVE-2023-52774 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: s390/dasd: protect device queue against concurrent access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52774
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-23 20:00
|
| linux-libc-dev |
CVE-2023-52789 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: tty: vcc: Add check for kstrdup() in vcc_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52789
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-01-15 17:57
|
| linux-libc-dev |
CVE-2023-52806 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52806
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-11-21 08:40
|
| linux-libc-dev |
CVE-2023-52809 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52809
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2024-11-21 08:40
|
| linux-libc-dev |
CVE-2023-52810 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: fs/jfs: Add check for negative db_l2nbperpage
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52810
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:02
|
| linux-libc-dev |
CVE-2023-52813 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52813
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-26 16:58
|
| linux-libc-dev |
CVE-2023-52817 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52817
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-16 14:15
|
| linux-libc-dev |
CVE-2023-52819 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52819
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:00
|
| linux-libc-dev |
CVE-2023-52832 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52832
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2026-01-05 11:15
|
| linux-libc-dev |
CVE-2023-52838 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: fbdev: imsttfb: fix a resource leak in probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52838
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-04-02 14:57
|
| linux-libc-dev |
CVE-2023-52843 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: llc: verify mac len before reading mac header
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52843
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-24 00:04
|
| linux-libc-dev |
CVE-2023-52845 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52845
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-01-31 16:01
|
| linux-libc-dev |
CVE-2023-52853 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: hid: cp2112: Fix duplicate workqueue initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52853
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-09-26 16:18
|
| linux-libc-dev |
CVE-2023-52855 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52855
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:06
|
| linux-libc-dev |
CVE-2023-52865 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52865
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-01-14 16:29
|
| linux-libc-dev |
CVE-2023-52875 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52875
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-21 16:15 修改: 2025-01-06 20:31
|
| linux-libc-dev |
CVE-2023-52880 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52880
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-24 16:15 修改: 2025-12-17 03:31
|
| linux-libc-dev |
CVE-2023-52881 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52881
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-29 11:16 修改: 2025-09-27 00:00
|
| linux-libc-dev |
CVE-2023-7042 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7042
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-12-21 20:15 修改: 2024-11-21 08:45
|
| linux-libc-dev |
CVE-2023-7192 |
中危 |
4.19.194-2 |
4.19.282-1 |
kernel: refcount leak in ctnetlink_create_conntrack()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7192
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-02 19:15 修改: 2024-11-21 08:45
|
| linux-libc-dev |
CVE-2024-0340 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0340
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-09 18:15 修改: 2025-05-14 04:16
|
| linux-libc-dev |
CVE-2024-0607 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nf_tables: pointer math issue in nft_byteorder_eval()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0607
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-18 16:15 修改: 2024-11-21 08:46
|
| linux-libc-dev |
CVE-2024-0639 |
中危 |
4.19.194-2 |
4.19.304-1 |
kernel: potential deadlock on &net->sctp.addr_wq_lock leading to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0639
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-17 16:15 修改: 2024-11-21 08:47
|
| linux-libc-dev |
CVE-2024-22099 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: NULL Pointer dereference bluetooth allows Overflow Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22099
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-25 07:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-22386 |
中危 |
4.19.194-2 |
4.19.304-1 |
A race condition was found in the Linux kernel's drm/exynos device dri ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22386
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-05 08:15 修改: 2024-11-21 08:56
|
| linux-libc-dev |
CVE-2024-23848 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: use-after-free in cec_queue_msg_fh
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23848
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-23849 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23849
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 09:15 修改: 2025-11-04 19:16
|
| linux-libc-dev |
CVE-2024-23851 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: copy_params can attempt to allocate more than INT_MAX bytes and crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23851
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-01-23 09:15 修改: 2025-11-04 19:16
|
| linux-libc-dev |
CVE-2024-24857 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24857
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-05 08:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-24858 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24858
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-05 08:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-24861 |
中危 |
4.19.194-2 |
4.19.316-1 |
A race condition was found in the Linux kernel's media/xc4000 device d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24861
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-05 08:15 修改: 2025-02-13 18:17
|
| linux-libc-dev |
CVE-2024-25739 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: crash due to a missing check for leb_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25739
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-12 03:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26600 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26600
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:27 修改: 2024-11-21 09:02
|
| linux-libc-dev |
CVE-2024-26602 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26602
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:28 修改: 2024-11-21 09:02
|
| linux-libc-dev |
CVE-2024-26606 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: signal epoll threads of self-work
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26606
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-26 16:28 修改: 2025-11-04 19:17
|
| linux-libc-dev |
CVE-2024-26615 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26615
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-11 18:15 修改: 2024-12-12 15:31
|
| linux-libc-dev |
CVE-2024-26633 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26633
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-04-04 14:49
|
| linux-libc-dev |
CVE-2024-26635 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: llc: Drop support for ETH_P_TR_802_2.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26635
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-03-10 17:06
|
| linux-libc-dev |
CVE-2024-26636 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: llc: make llc_ui_sendmsg() more robust against bonding changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26636
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-18 11:15 修改: 2025-03-10 17:04
|
| linux-libc-dev |
CVE-2024-26642 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26642
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26645 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tracing: Ensure visibility when inserting an element into tracing_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26645
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-26 16:15 修改: 2025-03-17 15:20
|
| linux-libc-dev |
CVE-2024-26651 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: sr9800: Add check for usbnet_get_endpoints
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26651
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-27 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26663 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26663
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-02 07:15 修改: 2025-01-07 17:20
|
| linux-libc-dev |
CVE-2024-26671 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: blk-mq: fix IO hang from sbitmap wakeup race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26671
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:03
|
| linux-libc-dev |
CVE-2024-26675 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ppp_async: limit MRU to 64K
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26675
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:42
|
| linux-libc-dev |
CVE-2024-26679 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: inet: read sk->sk_family once in inet_recv_error()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26679
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:42
|
| linux-libc-dev |
CVE-2024-26685 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix potential bug in end_buffer_async_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26685
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 15:15 修改: 2025-04-08 15:35
|
| linux-libc-dev |
CVE-2024-26696 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26696
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 15:15 修改: 2025-03-17 15:37
|
| linux-libc-dev |
CVE-2024-26697 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix data corruption in dsync block recovery for small block sizes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26697
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 15:15 修改: 2025-03-17 15:37
|
| linux-libc-dev |
CVE-2024-26722 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26722
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 15:15 修改: 2025-01-07 17:35
|
| linux-libc-dev |
CVE-2024-26735 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26735
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-17 16:05
|
| linux-libc-dev |
CVE-2024-26744 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26744
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-05-02 07:15
|
| linux-libc-dev |
CVE-2024-26751 |
中危 |
4.19.194-2 |
|
kernel: ARM: ep93xx: Add terminator to gpiod_lookup_table
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26751
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-17 16:57
|
| linux-libc-dev |
CVE-2024-26752 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: l2tp: pass correct message length to ip6_append_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26752
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-17 16:57
|
| linux-libc-dev |
CVE-2024-26766 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26766
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-02-27 22:00
|
| linux-libc-dev |
CVE-2024-26772 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26772
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:16
|
| linux-libc-dev |
CVE-2024-26773 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26773
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-18 16:47
|
| linux-libc-dev |
CVE-2024-26777 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fbdev: sis: Error out if pixclock equals zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26777
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-02-27 14:36
|
| linux-libc-dev |
CVE-2024-26778 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fbdev: savage: Error out if pixclock equals zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26778
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-02-27 14:36
|
| linux-libc-dev |
CVE-2024-26779 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: mac80211: fix race condition on enabling fast-xmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26779
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:15
|
| linux-libc-dev |
CVE-2024-26801 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26801
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-04 09:15 修改: 2024-12-20 15:52
|
| linux-libc-dev |
CVE-2024-26805 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26805
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-04 09:15 修改: 2025-02-27 14:36
|
| linux-libc-dev |
CVE-2024-26816 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: x86, relocs: Ignore relocations in .notes section
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26816
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-10 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26817 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: amdkfd: use calloc instead of kzalloc to avoid integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26817
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-13 12:15 修改: 2025-11-04 19:17
|
| linux-libc-dev |
CVE-2024-26820 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26820
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26825 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nfc: nci: free rx_data_reassembly skb on NCI device cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26825
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 10:15 修改: 2025-03-27 20:56
|
| linux-libc-dev |
CVE-2024-26839 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: IB/hfi1: Fix a memleak in init_credit_return
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26839
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 10:15 修改: 2025-01-14 14:56
|
| linux-libc-dev |
CVE-2024-26840 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: cachefiles: fix memory leak in cachefiles_add_cache()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26840
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 10:15 修改: 2025-01-07 17:13
|
| linux-libc-dev |
CVE-2024-26845 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: target: core: Add TMF to tmr_list handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26845
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 10:15 修改: 2026-01-05 11:16
|
| linux-libc-dev |
CVE-2024-26851 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26857 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: geneve: make sure to pull inner header in geneve_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26857
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2025-03-21 15:03
|
| linux-libc-dev |
CVE-2024-26859 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/bnx2x: Prevent access to a freed page in page_pool
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26859
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26863 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: hsr: Fix uninit-value access in hsr_get_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26863
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26874 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26874
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2025-03-04 15:53
|
| linux-libc-dev |
CVE-2024-26875 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: pvrusb2: fix uaf in pvr2_context_set_notify
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26875
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26878 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: quota: Fix potential NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26878
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26880 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: dm: call the resume method on internal suspend
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26880
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26889 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: hci_core: Fix possible buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26889
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26894 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26894
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 13:16
|
| linux-libc-dev |
CVE-2024-26901 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26901
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26903 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26903
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26917 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26917
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-17 16:15 修改: 2025-02-03 16:18
|
| linux-libc-dev |
CVE-2024-26922 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26922
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-23 13:15 修改: 2025-12-23 19:08
|
| linux-libc-dev |
CVE-2024-26923 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: af_unix: Fix garbage collector racing against connect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26923
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-25 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26931 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: qla2xxx: Fix command flush on cable pull
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26931
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-03-04 16:07
|
| linux-libc-dev |
CVE-2024-26966 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26966
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:50
|
| linux-libc-dev |
CVE-2024-26969 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26969
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:58
|
| linux-libc-dev |
CVE-2024-26973 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fat: fix uninitialized field in nostale filehandles
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26973
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26976 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26976
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-04-08 18:53
|
| linux-libc-dev |
CVE-2024-26984 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nouveau: fix instmem race condition around ptr stores
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26984
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-26993 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26993
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26994 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: speakup: Avoid crash on very long word
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26994
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:49
|
| linux-libc-dev |
CVE-2024-26997 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: usb: dwc2: host: Fix dereference issue in DDMA completion flow.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26997
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:46
|
| linux-libc-dev |
CVE-2024-26999 |
中危 |
4.19.194-2 |
|
kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26999
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-27001 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: comedi: vmk80xx: fix incomplete endpoint checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27001
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2025-12-23 00:44
|
| linux-libc-dev |
CVE-2024-27013 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tun: limit printing rate when illegal packet received by tun dev
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27013
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 06:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27028 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27028
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2025-04-08 18:42
|
| linux-libc-dev |
CVE-2024-27046 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nfp: flower: handle acti_netdevs allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27046
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2024-12-23 18:19
|
| linux-libc-dev |
CVE-2024-27059 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27059
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27074 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: go7007: fix a memleak in go7007_load_encoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27074
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:31
|
| linux-libc-dev |
CVE-2024-27077 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27077
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27078 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: v4l2-tpg: fix some memleaks in tpg_alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27078
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27388 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: SUNRPC: fix some memleaks in gssx_dec_option_array
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27388
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-01 13:15 修改: 2025-01-14 14:56
|
| linux-libc-dev |
CVE-2024-27399 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-14 15:12 修改: 2026-01-22 20:37
|
| linux-libc-dev |
CVE-2024-27405 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27405
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2025-04-08 15:53
|
| linux-libc-dev |
CVE-2024-27410 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: nl80211: reject iftype change with mesh ID change
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27410
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2025-12-17 19:42
|
| linux-libc-dev |
CVE-2024-27412 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: power: supply: bq27xxx-i2c: Do not free non existing IRQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27412
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2025-12-17 19:39
|
| linux-libc-dev |
CVE-2024-27413 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: efi/capsule-loader: fix incorrect allocation size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27413
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2025-12-17 19:39
|
| linux-libc-dev |
CVE-2024-27416 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27416
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2025-12-17 19:38
|
| linux-libc-dev |
CVE-2024-27419 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netrom: Fix data-races around sysctl_net_busy_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27419
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 12:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-27436 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27436
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 13:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-31076 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31076
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-33621 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33621
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35806 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: soc: fsl: qbman: Always disable interrupts when taking cgr_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35806
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-01-10 18:11
|
| linux-libc-dev |
CVE-2024-35807 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: fix corruption during on-line resize
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35807
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35809 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: PCI/PM: Drain runtime-idle callbacks before driver removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35809
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-23 18:29
|
| linux-libc-dev |
CVE-2024-35811 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35811
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35815 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35815
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35819 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: soc: fsl: qbman: Use raw spinlock for cgr_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35819
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-17 19:26
|
| linux-libc-dev |
CVE-2024-35821 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ubifs: Set page uptodate in the correct place
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35821
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-23 18:29
|
| linux-libc-dev |
CVE-2024-35822 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: usb: udc: remove warning when queue disabled ep
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35822
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-17 19:24
|
| linux-libc-dev |
CVE-2024-35823 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: vt: fix unicode buffer corruption when deleting characters
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35823
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35825 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: usb: gadget: ncm: Fix handling of zero block length packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35825
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-17 19:23
|
| linux-libc-dev |
CVE-2024-35828 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35828
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35830 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: media: tc358743: register v4l2 async device only after successful setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35830
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-12-17 19:23
|
| linux-libc-dev |
CVE-2024-35835 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/mlx5e: fix a double-free in arfs_create_groups
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35835
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-17 14:15 修改: 2025-04-07 19:05
|
| linux-libc-dev |
CVE-2024-35877 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: x86/mm/pat: fix VM_PAT handling in COW mappings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35877
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35888 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: erspan: make sure erspan_base_hdr is present in skb->head
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35888
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35893 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/sched: act_skbmod: prevent kernel-infoleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35893
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35898 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35898
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35902 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/rds: fix possible cp null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35902
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35910 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tcp: properly terminate timers for kernel sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35910
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35915 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35915
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 09:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35922 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fbmon: prevent division by zero in fb_videomode_from_videomode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35922
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35925 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: block: prevent division by zero in blk_rq_stat_sum()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35925
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35930 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35930
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35933 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35933
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35936 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35936
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35944 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35944
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35947 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: dyndbg: fix old BUG_ON in >control parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35947
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 12:15 修改: 2025-04-04 14:23
|
| linux-libc-dev |
CVE-2024-35955 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: kprobes: Fix possible use-after-free issue on kprobe registration
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35955
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35960 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/mlx5: Properly link new fs rules into the tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35960
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35969 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35969
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35973 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: geneve: fix header validation in geneve[6]_xmit_skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35973
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35978 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: Bluetooth: Fix memory leak in hci_req_sync_complete()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35978
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35982 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: batman-adv: Avoid infinite loop trying to resize local TT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35982
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35984 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: i2c: smbus: fix NULL function pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35984
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-35997 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35997
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36004 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36004
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-20 10:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36014 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/arm/malidp: fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36014
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-29 07:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-36016 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36016
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-29 19:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-36017 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36017
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 13:15 修改: 2025-12-17 03:31
|
| linux-libc-dev |
CVE-2024-36020 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: i40e: fix vf may be used uninitialized in this function warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36020
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 15:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36286 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36286
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36288 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36288
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 12:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36902 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36902
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36905 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36905
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36919 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36919
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:03
|
| linux-libc-dev |
CVE-2024-36933 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36933
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:03
|
| linux-libc-dev |
CVE-2024-36941 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: nl80211: don't free NULL coalescing rule
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36941
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2025-05-20 15:16
|
| linux-libc-dev |
CVE-2024-36946 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: phonet: fix rtm_phonet_notify() skb allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36946
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-01-22 20:03
|
| linux-libc-dev |
CVE-2024-36950 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36950
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2025-12-17 03:29
|
| linux-libc-dev |
CVE-2024-36954 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tipc: fix a possible memleak in tipc_buf_append
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36954
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2025-01-14 16:27
|
| linux-libc-dev |
CVE-2024-36959 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36959
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-30 16:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-36964 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: fs/9p: only translate RWX permissions for plain 9P2000
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36964
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-03 08:15 修改: 2025-12-17 03:28
|
| linux-libc-dev |
CVE-2024-37356 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37356
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38549 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38549
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38558 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38558
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38559 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: scsi: qedf: Ensure the copied buf is NUL terminated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38559
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38565 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: ar5523: enable proper endpoint verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38565
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38567 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: wifi: carl9170: add a proper sanity check for endpoints
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38567
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38579 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: crypto: bcm - Fix pointer arithmetic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38579
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38582 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: nilfs2: fix potential hang in nilfs_detach_log_writer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38582
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38587 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38587
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38589 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: netrom: fix possible dead-lock in nr_rt_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38589
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38596 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38596
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38598 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: md: fix resync softlockup when bitmap size is less than array size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38598
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38601 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ring-buffer: Fix a race between readers and resize checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38601
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38607 |
中危 |
4.19.194-2 |
|
kernel: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38607
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-10-03 15:24
|
| linux-libc-dev |
CVE-2024-38612 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ipv6: sr: fix invalid unregister error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38612
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-38613 |
中危 |
4.19.194-2 |
|
kernel: m68k: Fix spinlock race in kernel thread creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38613
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-09-17 17:06
|
| linux-libc-dev |
CVE-2024-38618 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ALSA: timer: Set lower bound of start tick time
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38618
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38633 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: serial: max3100: Update uart_driver_registered on driver removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38633
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38634 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: serial: max3100: Lock port->lock when calling uart_handle_cts_change()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38634
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38637 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: greybus: lights: check return of get_channel_from_mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38637
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-38661 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: s390/ap: Fix crash in AP internal function modify_bitmap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38661
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-25 15:15 修改: 2024-11-21 09:26
|
| linux-libc-dev |
CVE-2024-38780 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38780
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-21 12:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-39276 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39276
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-25 15:15 修改: 2025-03-24 17:28
|
| linux-libc-dev |
CVE-2024-39292 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: um: Add winch to winch_handlers before registering winch IRQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39292
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-24 14:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-39301 |
中危 |
4.19.194-2 |
4.19.316-1 |
kernel: net/9p: fix uninit-value in p9_client_rpc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39301
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-06-25 15:15 修改: 2024-11-21 09:27
|
| login |
CVE-2023-4641 |
中危 |
1:4.5-1.1 |
|
shadow-utils: possible password leak during passwd(1) change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-27 16:15 修改: 2025-11-03 20:16
|
| mount |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| mount |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| curl |
CVE-2022-32208 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-07 13:15 修改: 2025-05-05 17:18
|
| libc6 |
CVE-2016-10228 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv program can hang when invoked with the -c option
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2017-03-02 01:59 修改: 2026-05-13 00:24
|
| libc6 |
CVE-2019-25013 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-01-04 18:15 修改: 2025-06-09 16:15
|
| ncurses-base |
CVE-2020-19189 |
中危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u4 |
ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:09
|
| ncurses-base |
CVE-2023-50495 |
中危 |
6.1+20181013-2+deb10u2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| libtinfo6 |
CVE-2020-19189 |
中危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u4 |
ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:09
|
| libtinfo6 |
CVE-2023-50495 |
中危 |
6.1+20181013-2+deb10u2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| libgcrypt20 |
CVE-2019-13627 |
中危 |
1.8.4-5+deb10u1 |
|
libgcrypt: ECDSA timing attack allowing private key leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-09-25 15:15 修改: 2024-11-21 04:25
|
| ncurses-bin |
CVE-2020-19189 |
中危 |
6.1+20181013-2+deb10u2 |
6.1+20181013-2+deb10u4 |
ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-08-22 19:16 修改: 2024-11-21 05:09
|
| ncurses-bin |
CVE-2023-50495 |
中危 |
6.1+20181013-2+deb10u2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| libc6 |
CVE-2020-10029 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-03-04 15:15 修改: 2024-11-21 04:54
|
| libglib2.0-0 |
CVE-2021-3800 |
中危 |
2.58.3-2+deb10u3 |
2.58.3-2+deb10u4 |
glib2: Possible privilege escalation thourgh pkexec and aliases
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-23 16:15 修改: 2024-11-21 06:22
|
| openssh-client |
CVE-2023-48795 |
中危 |
1:7.9p1-10+deb10u2 |
1:7.9p1-10+deb10u4 |
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-12-18 16:15 修改: 2026-05-12 11:16
|
| openssh-client |
CVE-2023-51385 |
中危 |
1:7.9p1-10+deb10u2 |
1:7.9p1-10+deb10u4 |
openssh: potential command injection via shell metacharacters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51385
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-12-18 19:15 修改: 2026-05-12 12:16
|
| libglib2.0-0 |
CVE-2023-32611 |
中危 |
2.58.3-2+deb10u3 |
2.58.3-2+deb10u5 |
glib: g_variant_byteswap() can take a long time with some non-normal inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-14 20:15 修改: 2024-11-21 08:03
|
| libglib2.0-0 |
CVE-2023-32665 |
中危 |
2.58.3-2+deb10u3 |
2.58.3-2+deb10u5 |
glib: GVariant deserialisation does not match spec for non-normal data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-14 20:15 修改: 2024-11-21 08:03
|
| libc6 |
CVE-2020-27618 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-02-26 23:15 修改: 2025-06-09 16:15
|
| libc6 |
CVE-2023-4806 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-09-18 17:15 修改: 2026-05-12 11:16
|
| libc6 |
CVE-2023-4813 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-09-12 22:15 修改: 2025-09-26 12:15
|
| libc6 |
CVE-2024-33600 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libudev1 |
CVE-2021-33910 |
中危 |
241-7~deb10u7 |
241-7~deb10u8 |
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33910
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-20 19:15 修改: 2025-06-09 16:15
|
| libudev1 |
CVE-2021-3997 |
中危 |
241-7~deb10u7 |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-23 20:15 修改: 2024-11-21 06:23
|
| libudev1 |
CVE-2022-3821 |
中危 |
241-7~deb10u7 |
241-7~deb10u10 |
systemd: buffer overrun in format_timespan() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-11-08 22:15 修改: 2025-05-02 18:15
|
| openssl |
CVE-2021-4160 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1d-0+deb10u8 |
openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4160
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-01-28 22:15 修改: 2024-11-21 06:37
|
| openssl |
CVE-2022-2097 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-07-05 11:15 修改: 2024-11-21 07:00
|
| openssl |
CVE-2022-4304 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u4 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| openssl |
CVE-2023-0465 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-28 15:15 修改: 2025-02-18 21:15
|
| openssl |
CVE-2023-0466 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-28 15:15 修改: 2025-02-19 18:15
|
| openssl |
CVE-2023-2650 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u5 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-30 14:15 修改: 2025-03-19 16:15
|
| openssl |
CVE-2023-3446 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u6 |
openssl: Excessive time spent checking DH keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-07-19 12:15 修改: 2025-04-23 17:16
|
| openssl |
CVE-2023-3817 |
中危 |
1.1.1d-0+deb10u6 |
1.1.1n-0+deb10u6 |
OpenSSL: Excessive time spent checking DH q parameter value
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-07-31 16:15 修改: 2025-05-05 16:15
|
| openssl |
CVE-2023-5678 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-11-06 16:15 修改: 2026-05-12 11:16
|
| openssl |
CVE-2024-0727 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-01-26 09:15 修改: 2026-05-12 12:16
|
| openssl |
CVE-2024-4741 |
中危 |
1.1.1d-0+deb10u6 |
|
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-11-13 11:15 修改: 2026-04-15 00:35
|
| passwd |
CVE-2023-4641 |
中危 |
1:4.5-1.1 |
|
shadow-utils: possible password leak during passwd(1) change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-27 16:15 修改: 2025-11-03 20:16
|
| libudev1 |
CVE-2022-4415 |
中危 |
241-7~deb10u7 |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-01-11 15:15 修改: 2025-11-03 20:15
|
| libudev1 |
CVE-2023-7008 |
中危 |
241-7~deb10u7 |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-12-23 13:15 修改: 2025-11-04 17:15
|
| libuuid1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libuuid1 |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| libgnutls30 |
CVE-2021-4209 |
中危 |
3.6.7-4+deb10u7 |
3.6.7-4+deb10u9 |
GnuTLS: Null pointer dereference in MD_UPDATE
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2022-08-24 16:15 修改: 2024-11-21 06:37
|
| libgnutls30 |
CVE-2023-5981 |
中危 |
3.6.7-4+deb10u7 |
3.6.7-4+deb10u11 |
gnutls: timing side-channel in the RSA-PSK authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-11-28 12:15 修改: 2026-03-25 20:01
|
| libc6 |
CVE-2024-33601 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libc6 |
CVE-2024-33602 |
中危 |
2.28-10 |
2.28-10+deb10u4 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-05-06 20:15 修改: 2026-05-12 12:16
|
| libblkid1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libblkid1 |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| libgssapi-krb5-2 |
CVE-2021-37750 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u3 |
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-23 05:15 修改: 2024-11-21 06:15
|
| libgssapi-krb5-2 |
CVE-2023-36054 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u6 |
krb5: Denial of service through freeing uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-08-07 19:15 修改: 2024-11-21 08:09
|
| curl |
CVE-2022-43552 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-09 20:15 修改: 2024-11-21 07:26
|
| curl |
CVE-2023-23916 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-02-23 20:15 修改: 2025-03-12 19:15
|
| curl |
CVE-2023-27535 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| curl |
CVE-2023-27536 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-02-14 16:15
|
| curl |
CVE-2023-27538 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u6 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-03-30 20:15 修改: 2025-06-09 15:15
|
| python2.7 |
CVE-2020-8492 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-01-30 19:15 修改: 2024-11-21 05:38
|
| python2.7 |
CVE-2021-23336 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-02-15 13:15 修改: 2025-12-17 22:15
|
| python2.7 |
CVE-2021-3733 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-10 17:42 修改: 2025-11-03 22:15
|
| python2.7 |
CVE-2021-4189 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: ftplib should not use the host from the PASV response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-08-24 16:15 修改: 2025-12-17 22:15
|
| python2.7 |
CVE-2022-48566 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| python2.7 |
CVE-2023-27043 |
中危 |
2.7.16-2+deb10u1 |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-19 00:15 修改: 2026-05-12 11:16
|
| python2.7 |
CVE-2023-40217 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: TLS handshake bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-25 01:15 修改: 2025-11-03 22:16
|
| python2.7 |
CVE-2024-0450 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u4 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-03-19 16:15 修改: 2026-04-15 00:35
|
| libk5crypto3 |
CVE-2021-37750 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u3 |
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-23 05:15 修改: 2024-11-21 06:15
|
| libk5crypto3 |
CVE-2023-36054 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u6 |
krb5: Denial of service through freeing uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-08-07 19:15 修改: 2024-11-21 08:09
|
| curl |
CVE-2023-28321 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: IDN wildcard match may lead to Improper Cerificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15
|
| curl |
CVE-2023-46218 |
中危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-12-07 01:15 修改: 2026-05-12 11:16
|
| libkrb5-3 |
CVE-2021-37750 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u3 |
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-23 05:15 修改: 2024-11-21 06:15
|
| libkrb5-3 |
CVE-2023-36054 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u6 |
krb5: Denial of service through freeing uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-08-07 19:15 修改: 2024-11-21 08:09
|
| dirmngr |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2022-07-01 22:15 修改: 2024-11-21 07:10
|
| bsdutils |
CVE-2021-37600 |
中危 |
1:2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| libkrb5support0 |
CVE-2021-37750 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u3 |
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-23 05:15 修改: 2024-11-21 06:15
|
| libkrb5support0 |
CVE-2023-36054 |
中危 |
1.17-3+deb10u1 |
1.17-3+deb10u6 |
krb5: Denial of service through freeing uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-08-07 19:15 修改: 2024-11-21 08:09
|
| libc6-dev |
CVE-2016-10228 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv program can hang when invoked with the -c option
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2017-03-02 01:59 修改: 2026-05-13 00:24
|
| python2.7-minimal |
CVE-2020-8492 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2020-01-30 19:15 修改: 2024-11-21 05:38
|
| python2.7-minimal |
CVE-2021-23336 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-02-15 13:15 修改: 2025-12-17 22:15
|
| python2.7-minimal |
CVE-2021-3733 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-03-10 17:42 修改: 2025-11-03 22:15
|
| python2.7-minimal |
CVE-2021-4189 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u2 |
python: ftplib should not use the host from the PASV response
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-08-24 16:15 修改: 2025-12-17 22:15
|
| python2.7-minimal |
CVE-2022-48566 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:33
|
| python2.7-minimal |
CVE-2023-27043 |
中危 |
2.7.16-2+deb10u1 |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-19 00:15 修改: 2026-05-12 11:16
|
| python2.7-minimal |
CVE-2023-40217 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u3 |
python: TLS handshake bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-25 01:15 修改: 2025-11-03 22:16
|
| python2.7-minimal |
CVE-2024-0450 |
中危 |
2.7.16-2+deb10u1 |
2.7.16-2+deb10u4 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2024-03-19 16:15 修改: 2026-04-15 00:35
|
| libc6-dev |
CVE-2019-25013 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-01-04 18:15 修改: 2025-06-09 16:15
|
| subversion |
CVE-2021-28544 |
中危 |
1.10.4-1+deb10u2 |
1.10.4-1+deb10u3 |
subversion: SVN authz protected copyfrom paths regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28544
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-04-12 18:15 修改: 2024-11-21 05:59
|
| util-linux |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-30 14:15 修改: 2024-11-21 06:15
|
| util-linux |
CVE-2024-28085 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 19:15 修改: 2026-05-12 12:16
|
| libc6-dev |
CVE-2020-10029 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-03-04 15:15 修改: 2024-11-21 04:54
|
| wget |
CVE-2021-31879 |
中危 |
1.20.1-1.1 |
|
wget: authorization header disclosure on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-04-29 05:15 修改: 2024-11-21 06:06
|
| libc6-dev |
CVE-2020-27618 |
中危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-26 23:15 修改: 2025-06-09 16:15
|
| libc6-dev |
CVE-2023-4806 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-18 17:15 修改: 2026-05-12 11:16
|
| libc6-dev |
CVE-2023-4813 |
中危 |
2.28-10 |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-09-12 22:15 修改: 2025-09-26 12:15
|
| gnupg-utils |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| libcurl3-gnutls |
CVE-2021-22898 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-06-11 16:15 修改: 2026-04-16 14:16
|
| libcurl3-gnutls |
CVE-2021-22924 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Bad connection reuse due to flawed path name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2021-08-05 21:15 修改: 2025-06-09 15:15
|
| libcurl3-gnutls |
CVE-2022-35252 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2022-09-23 14:15 修改: 2025-05-05 17:18
|
| libcurl3-gnutls |
CVE-2023-28322 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-05-26 21:15 修改: 2026-02-13 20:16
|
| libcurl3-gnutls |
CVE-2023-38546 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-10-18 04:15 修改: 2026-05-12 11:16
|
| curl |
CVE-2023-28322 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-26 21:15 修改: 2026-02-13 20:16
|
| gpg |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| libc6-dev |
CVE-2019-19126 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-11-19 22:15 修改: 2024-11-21 04:34
|
| libc6-dev |
CVE-2021-27645 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-24 15:15 修改: 2025-06-09 15:15
|
| curl |
CVE-2023-38546 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-10-18 04:15 修改: 2026-05-12 11:16
|
| gpg-agent |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| libssl1.1 |
CVE-2024-2511 |
低危 |
1.1.1d-0+deb10u6 |
|
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-04-08 14:15 修改: 2026-05-12 12:16
|
| coreutils |
CVE-2016-2781 |
低危 |
8.30-3 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2017-02-07 15:59 修改: 2026-05-13 00:24
|
| libc6 |
CVE-2019-19126 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-11-19 22:15 修改: 2024-11-21 04:34
|
| openssl |
CVE-2024-2511 |
低危 |
1.1.1d-0+deb10u6 |
|
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2024-04-08 14:15 修改: 2026-05-12 12:16
|
| libc6 |
CVE-2021-27645 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-02-24 15:15 修改: 2025-06-09 15:15
|
| passwd |
CVE-2018-7169 |
低危 |
1:4.5-1.1 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2018-02-15 20:29 修改: 2024-11-21 04:11
|
| passwd |
CVE-2023-29383 |
低危 |
1:4.5-1.1 |
|
shadow: Improper input validation in shadow-utils package utility chfn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 22:15 修改: 2025-11-03 20:16
|
| libc-bin |
CVE-2019-19126 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-11-19 22:15 修改: 2024-11-21 04:34
|
| libprocps7 |
CVE-2023-4016 |
低危 |
2:3.3.15-2 |
|
procps: ps buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-02 05:15 修改: 2024-11-21 08:34
|
| libc-dev-bin |
CVE-2019-19126 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2019-11-19 22:15 修改: 2024-11-21 04:34
|
| libc-dev-bin |
CVE-2021-27645 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-02-24 15:15 修改: 2025-06-09 15:15
|
| libsepol1 |
CVE-2021-36084 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-01 03:15 修改: 2025-11-03 22:15
|
| libsepol1 |
CVE-2021-36085 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-01 03:15 修改: 2025-11-03 22:15
|
| procps |
CVE-2023-4016 |
低危 |
2:3.3.15-2 |
|
procps: ps buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-08-02 05:15 修改: 2024-11-21 08:34
|
| libsepol1 |
CVE-2021-36086 |
低危 |
2.8-1 |
|
libsepol: use-after-free in cil_reset_classpermission()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-01 03:15 修改: 2026-03-24 20:25
|
| linux-libc-dev |
CVE-2018-12928 |
低危 |
4.19.194-2 |
|
kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12928
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2018-06-28 14:29 修改: 2024-11-21 03:46
|
| linux-libc-dev |
CVE-2020-29374 |
低危 |
4.19.194-2 |
4.19.232-1 |
kernel: the get_user_pages implementation when used for a copy-on-write page does not properly consider the semantics of read operations and therefore can grant unintended read access
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29374
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2020-11-28 07:15 修改: 2024-11-21 05:23
|
| linux-libc-dev |
CVE-2021-3655 |
低危 |
4.19.194-2 |
4.19.208-1 |
kernel: missing size validations on inbound SCTP packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3655
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-05 21:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-38204 |
低危 |
4.19.194-2 |
4.19.208-1 |
kernel: use-after-free and panic in drivers/usb/host/max3421-hcd.c by removing a MAX-3421 USB device in certain situations
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38204
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-08 20:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-38205 |
低危 |
4.19.194-2 |
4.19.208-1 |
kernel: drivers/net/ethernet/xilinx/xilinx_emaclite.c prints the real IOMEM pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38205
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-08-08 20:15 修改: 2024-11-21 06:16
|
| linux-libc-dev |
CVE-2021-3923 |
低危 |
4.19.194-2 |
4.19.232-1 |
kernel: stack information leak in infiniband RDMA
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3923
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-27 21:15 修改: 2025-02-24 20:15
|
| linux-libc-dev |
CVE-2021-45486 |
低危 |
4.19.194-2 |
4.19.208-1 |
kernel: information leak in the IPv4 implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45486
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2021-12-25 02:15 修改: 2024-11-21 06:32
|
| linux-libc-dev |
CVE-2021-46934 |
低危 |
4.19.194-2 |
4.19.232-1 |
kernel: i2c: validate user data in compat ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46934
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| linux-libc-dev |
CVE-2022-24448 |
低危 |
4.19.194-2 |
4.19.232-1 |
kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24448
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-02-04 20:15 修改: 2024-11-21 06:50
|
| linux-libc-dev |
CVE-2022-2991 |
低危 |
4.19.194-2 |
4.19.249-1 |
kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2991
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-08-25 18:15 修改: 2024-11-21 07:02
|
| linux-libc-dev |
CVE-2022-32296 |
低危 |
4.19.194-2 |
4.19.249-2 |
kernel: insufficient TCP source port randomness leads to client identification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32296
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-05 22:15 修改: 2024-11-21 07:06
|
| linux-libc-dev |
CVE-2022-32981 |
低危 |
4.19.194-2 |
4.19.249-1 |
kernel: Linux kernel for powerpc 32-bit buffer overflow in ptrace PEEKUSER/POKEUSER
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32981
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-10 20:15 修改: 2024-11-21 07:07
|
| linux-libc-dev |
CVE-2022-33981 |
低危 |
4.19.194-2 |
4.19.249-2 |
kernel: use-after-free in floppy driver may lead to a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33981
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-06-18 16:15 修改: 2025-05-05 17:18
|
| linux-libc-dev |
CVE-2022-3521 |
低危 |
4.19.194-2 |
4.19.269-1 |
kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3521
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-16 10:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-3629 |
低危 |
4.19.194-2 |
4.19.260-1 |
kernel: memory leak in the function vsock_connect of Virtual Socket Protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3629
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-10-21 06:15 修改: 2024-11-21 07:19
|
| linux-libc-dev |
CVE-2022-45886 |
低危 |
4.19.194-2 |
4.19.289-1 |
kernel: use-after-free due to race condition occurring in dvb_net.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45886
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-25 04:15 修改: 2024-11-21 07:29
|
| linux-libc-dev |
CVE-2022-45887 |
低危 |
4.19.194-2 |
4.19.289-1 |
kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45887
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-25 04:15 修改: 2025-04-25 20:15
|
| linux-libc-dev |
CVE-2022-45919 |
低危 |
4.19.194-2 |
4.19.289-1 |
kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45919
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2022-11-27 02:15 修改: 2024-11-21 07:29
|
| linux-libc-dev |
CVE-2023-1513 |
低危 |
4.19.194-2 |
4.19.282-1 |
kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2023-03-23 21:15 修改: 2025-02-25 20:15
|
| linux-libc-dev |
CVE-2023-52620 |
低危 |
4.19.194-2 |
4.19.316-1 |
kernel: netfilter: nf_tables: disallow timeout for anonymous sets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52620
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-03-21 11:15 修改: 2026-05-12 12:16
|
| linux-libc-dev |
CVE-2024-26764 |
低危 |
4.19.194-2 |
4.19.316-1 |
kernel: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26764
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-04-03 17:15 修改: 2025-03-18 16:36
|
| linux-libc-dev |
CVE-2024-35935 |
低危 |
4.19.194-2 |
4.19.316-1 |
kernel: btrfs: send: handle path ref underflow in header iterate_inode_ref()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35935
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-19 11:15 修改: 2026-05-12 12:16
|
| libsepol1 |
CVE-2021-36087 |
低危 |
2.8-1 |
|
libsepol: heap-based buffer overflow in ebitmap_match_any()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-07-01 03:15 修改: 2025-11-03 22:15
|
| login |
CVE-2018-7169 |
低危 |
1:4.5-1.1 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2018-02-15 20:29 修改: 2024-11-21 04:11
|
| login |
CVE-2023-29383 |
低危 |
1:4.5-1.1 |
|
shadow: Improper input validation in shadow-utils package utility chfn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2023-04-14 22:15 修改: 2025-11-03 20:16
|
| libc-bin |
CVE-2021-27645 |
低危 |
2.28-10 |
2.28-10+deb10u2 |
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2021-02-24 15:15 修改: 2025-06-09 15:15
|
| gpg-wks-client |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| git |
CVE-2023-25815 |
低危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: malicious placement of crafted messages when git was compiled with runtime prefix
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 20:15 修改: 2025-11-04 17:15
|
| gpg-wks-server |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| dirmngr |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| gpgconf |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| git-man |
CVE-2023-25815 |
低危 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u9 |
git: malicious placement of crafted messages when git was compiled with runtime prefix
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 2023-04-25 20:15 修改: 2025-11-04 17:15
|
| gpgsm |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| liblz4-1 |
CVE-2019-17543 |
低危 |
1.8.3-1+deb10u1 |
|
lz4: heap-based buffer overflow in LZ4_write32
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17543
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2019-10-14 02:15 修改: 2024-11-21 04:32
|
| libcurl4 |
CVE-2021-22898 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-06-11 16:15 修改: 2026-04-16 14:16
|
| libcurl4 |
CVE-2021-22924 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Bad connection reuse due to flawed path name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-05 21:15 修改: 2025-06-09 15:15
|
| libglib2.0-0 |
CVE-2024-34397 |
低危 |
2.58.3-2+deb10u3 |
2.58.3-2+deb10u6 |
glib2: Signal subscription vulnerabilities
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397
镜像层: sha256:8632362867171f7fe778e731335d44d4e6c7019896dfcf569346bafc6b6a08dc
发布日期: 2024-05-07 18:15 修改: 2026-05-12 12:16
|
| libcurl4 |
CVE-2022-35252 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-09-23 14:15 修改: 2025-05-05 17:18
|
| libcurl4 |
CVE-2023-28322 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u8 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-05-26 21:15 修改: 2026-02-13 20:16
|
| tar |
CVE-2023-39804 |
低危 |
1.30+dfsg-6 |
1.30+dfsg-6+deb10u1 |
tar: Incorrectly handled extension attributes in PAX archives can lead to a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2024-03-27 04:15 修改: 2025-11-04 19:15
|
| libcurl4 |
CVE-2023-38546 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u7 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2023-10-18 04:15 修改: 2026-05-12 11:16
|
| curl |
CVE-2021-22898 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-06-11 16:15 修改: 2026-04-16 14:16
|
| gpgv |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| gnupg |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| curl |
CVE-2021-22924 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u3 |
curl: Bad connection reuse due to flawed path name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2021-08-05 21:15 修改: 2025-06-09 15:15
|
| gnupg-l10n |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:fe6a4fdbedc0cbc560437fa700b3b034114e31a264f0818d0d32ed2ee6cbe7a3
发布日期: 2020-03-20 16:15 修改: 2024-11-21 04:27
|
| curl |
CVE-2022-35252 |
低危 |
7.64.0-4+deb10u2 |
7.64.0-4+deb10u4 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:e4d0e810d54a9c47e3dface412b0b88045d156b18809a2e0bbfb0fc8a45d8127
发布日期: 2022-09-23 14:15 修改: 2025-05-05 17:18
|
| tzdata |
DLA-3366-1 |
未知 |
2021a-0+deb10u1 |
2021a-0+deb10u10 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| tzdata |
DLA-3412-1 |
未知 |
2021a-0+deb10u1 |
2021a-0+deb10u11 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| tzdata |
DLA-3684-1 |
未知 |
2021a-0+deb10u1 |
2021a-0+deb10u12 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| tzdata |
DLA-3788-1 |
未知 |
2021a-0+deb10u1 |
2024a-0+deb10u1 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| git-man |
DLA-3239-2 |
未知 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u6 |
git - regression update
漏洞详情:
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| debian-archive-keyring |
DLA-3482-1 |
未知 |
2019.1+deb10u1 |
2019.1+deb10u2 |
debian-archive-keyring - security update
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libexpat1 |
DSA-5085-2 |
未知 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u4 |
expat - regression update
漏洞详情:
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| git |
DLA-3239-2 |
未知 |
1:2.20.1-2+deb10u3 |
1:2.20.1-2+deb10u6 |
git - regression update
漏洞详情:
镜像层: sha256:7095af798ace32173839a61cbf101048434e1065185c0f29cc888e67158d990b
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libbz2-1.0 |
DLA-3112-1 |
未知 |
1.0.6-9.2~deb10u1 |
1.0.6-9.2~deb10u2 |
bzip2 - bugfix update
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| tzdata |
DLA-3134-1 |
未知 |
2021a-0+deb10u1 |
2021a-0+deb10u7 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| tzdata |
DLA-3161-1 |
未知 |
2021a-0+deb10u1 |
2021a-0+deb10u8 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:4e006334a6fdea37622f72b21eb75fe1484fc4f20ce8b8526187d6f7bd90a6fe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|