| curl | CVE-2022-32221 | 严重 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | dpkg | CVE-2022-1664 | 严重 | 1.19.7 | 1.19.8 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | dpkg-dev | CVE-2022-1664 | 严重 | 1.19.7 | 1.19.8 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | git | CVE-2022-23521 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u7 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2022-41903 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u7 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2024-32002 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: Recursive clones RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2022-23521 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u7 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-41903 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u7 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2024-32002 | 严重 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: Recursive clones RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | krb5-multidev | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libbluetooth-dev | CVE-2021-43400 | 严重 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: use-after-free in gatt-database.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43400 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-04 23:15 修改: 2022-11-07 17:10 | 
                            
                            
                                | libbluetooth3 | CVE-2021-43400 | 严重 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: use-after-free in gatt-database.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43400 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-04 23:15 修改: 2022-11-07 17:10 | 
                            
                            
                                | libc-bin | CVE-2021-33574 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: mq_notify does not handle separately allocated thread attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-05-25 22:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libc-bin | CVE-2021-35942 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc-bin | CVE-2022-23218 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libc-bin | CVE-2022-23219 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libc-dev-bin | CVE-2021-33574 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: mq_notify does not handle separately allocated thread attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-25 22:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libc-dev-bin | CVE-2021-35942 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc-dev-bin | CVE-2022-23218 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libc-dev-bin | CVE-2022-23219 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libc6 | CVE-2021-33574 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: mq_notify does not handle separately allocated thread attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-05-25 22:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libc6 | CVE-2021-35942 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc6 | CVE-2022-23218 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libc6 | CVE-2022-23219 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libc6-dev | CVE-2021-33574 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: mq_notify does not handle separately allocated thread attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-25 22:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libc6-dev | CVE-2021-35942 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc6-dev | CVE-2022-23218 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libc6-dev | CVE-2022-23219 | 严重 | 2.28-10 | 2.28-10+deb10u2 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32221 | 严重 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-32221 | 严重 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-32221 | 严重 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libdb5.3 | CVE-2019-8457 | 严重 | 5.3.28+dfsg1-0.5 |  | sqlite: heap out-of-bound read in function rtreenode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libdb5.3-dev | CVE-2019-8457 | 严重 | 5.3.28+dfsg1-0.5 |  | sqlite: heap out-of-bound read in function rtreenode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libdpkg-perl | CVE-2022-1664 | 严重 | 1.19.7 | 1.19.8 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | libexpat1 | CVE-2022-22822 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in addBinding in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29 | 
                            
                            
                                | libexpat1 | CVE-2022-22823 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in build_model in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1 | CVE-2022-22824 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in defineAttribute in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1 | CVE-2022-23852 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in function XML_GetBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44 | 
                            
                            
                                | libexpat1 | CVE-2022-25235 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2022-25236 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2022-25315 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Integer overflow in storeRawNames() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2024-45491 | 严重 | 2.2.6-2+deb10u1 |  | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libexpat1 | CVE-2024-45492 | 严重 | 2.2.6-2+deb10u1 |  | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22822 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in addBinding in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22823 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in build_model in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22824 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in defineAttribute in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1-dev | CVE-2022-23852 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in function XML_GetBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-25235 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-25236 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-25315 | 严重 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Integer overflow in storeRawNames() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2024-45491 | 严重 | 2.2.6-2+deb10u1 |  | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libexpat1-dev | CVE-2024-45492 | 严重 | 2.2.6-2+deb10u1 |  | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libfreetype6 | CVE-2022-27404 | 严重 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | FreeType: Buffer overflow in sfnt_init_face 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6-dev | CVE-2022-27404 | 严重 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | FreeType: Buffer overflow in sfnt_init_face 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libgssrpc4 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libk5crypto3 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkdb5-9 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkrb5-3 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkrb5-dev | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkrb5support0 | CVE-2024-37371 | 严重 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libksba8 | CVE-2022-3515 | 严重 | 1.3.5-2 | 1.3.5-2+deb10u1 | libksba: integer overflow may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libksba8 | CVE-2022-47629 | 严重 | 1.3.5-2 | 1.3.5-2+deb10u2 | libksba: integer overflow to code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | libldap-2.4-2 | CVE-2022-29155 | 严重 | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 | openldap: OpenLDAP SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-04 20:15 修改: 2022-10-06 15:56 | 
                            
                            
                                | libldap-common | CVE-2022-29155 | 严重 | 2.4.47+dfsg-3+deb10u6 | 2.4.47+dfsg-3+deb10u7 | openldap: OpenLDAP SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-04 20:15 修改: 2022-10-06 15:56 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-1586 | 严重 | 10.32-5 | 10.32-5+deb10u1 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1586 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-1587 | 严重 | 10.32-5 | 10.32-5+deb10u1 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1587 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-3177 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-01-19 06:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-48565 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-3177 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-01-19 06:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-48565 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-37454 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u4 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-48565 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-37454 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u4 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-48565 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libsqlite3-0 | CVE-2020-35527 | 严重 | 3.27.2-3+deb10u1 | 3.27.2-3+deb10u2 | sqlite: Out of bounds access during table rename 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35527 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-09-01 18:15 修改: 2022-12-08 22:29 | 
                            
                            
                                | libsqlite3-dev | CVE-2020-35527 | 严重 | 3.27.2-3+deb10u1 | 3.27.2-3+deb10u2 | sqlite: Out of bounds access during table rename 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35527 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 18:15 修改: 2022-12-08 22:29 | 
                            
                            
                                | libssl-dev | CVE-2021-3711 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u7 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-1292 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u2 | openssl: c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libssl-dev | CVE-2022-2068 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u3 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libssl1.1 | CVE-2021-3711 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u7 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-1292 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u2 | openssl: c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libssl1.1 | CVE-2022-2068 | 严重 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u3 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtasn1-6 | CVE-2021-46848 | 严重 | 4.13-3 | 4.13-3+deb10u1 | libtasn1: Out-of-bound access in ETYPE_OK 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libtasn1-6-dev | CVE-2021-46848 | 严重 | 4.13-3 | 4.13-3+deb10u1 | libtasn1: Out-of-bound access in ETYPE_OK 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2023-25775 | 严重 | 4.19.194-3 | 4.19.304-1 | kernel: irdma: Improper access control 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-11 03:15 修改: 2024-01-11 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47685 | 严重 | 4.19.194-3 |  | kernel: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47685 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | openssh-client | CVE-2023-38408 | 严重 | 1:7.9p1-10+deb10u2 | 1:7.9p1-10+deb10u3 | openssh: Remote code execution in ssh-agent PKCS#11 support 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38408 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-07-20 03:15 修改: 2024-10-15 19:35 | 
                            
                            
                                | python2.7 | CVE-2021-3177 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-01-19 06:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | python2.7 | CVE-2022-48565 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | python2.7-minimal | CVE-2021-3177 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-01-19 06:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | python2.7-minimal | CVE-2022-48565 | 严重 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | python3.7 | CVE-2022-37454 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u4 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.7 | CVE-2022-48565 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | python3.7-minimal | CVE-2022-37454 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u4 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.7-minimal | CVE-2022-48565 | 严重 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: XML External Entity in XML processing plistlib module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | wget | CVE-2024-38428 | 严重 | 1.20.1-1.1 |  | wget: Misinterpretation of input may lead to improper behavior 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-16 03:15 修改: 2024-10-28 21:35 | 
                            
                            
                                | zlib1g | CVE-2022-37434 | 严重 | 1:1.2.11.dfsg-1 | 1:1.2.11.dfsg-1+deb10u2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | zlib1g | CVE-2023-45853 | 严重 | 1:1.2.11.dfsg-1 |  | zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-10-14 02:15 修改: 2024-12-20 17:41 | 
                            
                            
                                | zlib1g-dev | CVE-2022-37434 | 严重 | 1:1.2.11.dfsg-1 | 1:1.2.11.dfsg-1+deb10u2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | zlib1g-dev | CVE-2023-45853 | 严重 | 1:1.2.11.dfsg-1 |  | zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-14 02:15 修改: 2024-12-20 17:41 | 
                            
                            
                                | libbluetooth-dev | CVE-2019-8922 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: heap-based buffer overflow via crafted request 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8922 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-29 08:15 修改: 2022-11-07 19:01 | 
                            
                            
                                | libbluetooth-dev | CVE-2020-27153 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | bluez: double free in gatttool client disconnect callback handler in src/shared/att.c could lead to DoS or RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27153 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2020-10-15 03:15 修改: 2022-04-05 15:59 | 
                            
                            
                                | libbluetooth-dev | CVE-2022-0204 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: heap-based buffer overflow in the implementation of the gatt protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0204 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-03-10 17:44 修改: 2023-06-26 18:57 | 
                            
                            
                                | libbluetooth-dev | CVE-2022-39176 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: BlueZ allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39176 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-09-02 04:15 修改: 2022-11-07 14:37 | 
                            
                            
                                | libbluetooth-dev | CVE-2022-39177 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: BlueZ allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39177 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-09-02 04:15 修改: 2022-11-07 14:34 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-27349 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u5 | BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27349 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 02:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-44431 | 高危 | 5.50-1.2~deb10u1 |  | bluez: AVRCP stack-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44431 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:15 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-50229 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50229 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-50230 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50230 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-51596 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51596 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | curl | CVE-2024-2398 | 高危 | 7.64.0-4+deb10u2 |  | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | libbluetooth3 | CVE-2019-8922 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: heap-based buffer overflow via crafted request 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8922 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-29 08:15 修改: 2022-11-07 19:01 | 
                            
                            
                                | libbluetooth3 | CVE-2020-27153 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | bluez: double free in gatttool client disconnect callback handler in src/shared/att.c could lead to DoS or RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27153 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2020-10-15 03:15 修改: 2022-04-05 15:59 | 
                            
                            
                                | libbluetooth3 | CVE-2022-0204 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: heap-based buffer overflow in the implementation of the gatt protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0204 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-03-10 17:44 修改: 2023-06-26 18:57 | 
                            
                            
                                | libbluetooth3 | CVE-2022-39176 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: BlueZ allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39176 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-09-02 04:15 修改: 2022-11-07 14:37 | 
                            
                            
                                | libbluetooth3 | CVE-2022-39177 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: BlueZ allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39177 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2022-09-02 04:15 修改: 2022-11-07 14:34 | 
                            
                            
                                | libbluetooth3 | CVE-2023-27349 | 高危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u5 | BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27349 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 02:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libbluetooth3 | CVE-2023-44431 | 高危 | 5.50-1.2~deb10u1 |  | bluez: AVRCP stack-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44431 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:15 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth3 | CVE-2023-50229 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50229 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth3 | CVE-2023-50230 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50230 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth3 | CVE-2023-51596 | 高危 | 5.50-1.2~deb10u1 |  | bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51596 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | curl | CVE-2024-6197 | 高危 | 7.64.0-4+deb10u2 |  | curl: freeing stack buffer in utf8asn1str 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-24 08:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | comerr-dev | CVE-2022-1304 | 高危 | 2.1-1.44.5-1+deb10u3 |  | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | cpp-8 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | e2fsprogs | CVE-2022-1304 | 高危 | 1.44.5-1+deb10u3 |  | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libc-bin | CVE-2020-1751 | 高危 | 2.28-10 |  | glibc: array overflow in backtrace functions for powerpc 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc-bin | CVE-2020-1752 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: use-after-free in glob() function when expanding ~user 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-30 17:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc-bin | CVE-2020-6096 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc-bin | CVE-2021-3326 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc-bin | CVE-2021-3999 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc-bin | CVE-2024-2961 | 高危 | 2.28-10 | 2.28-10+deb10u3 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-bin | CVE-2024-33599 | 高危 | 2.28-10 | 2.28-10+deb10u4 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | fdisk | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | g++-8 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | g++-8 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | gcc-8 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libc-dev-bin | CVE-2020-1751 | 高危 | 2.28-10 |  | glibc: array overflow in backtrace functions for powerpc 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc-dev-bin | CVE-2020-1752 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: use-after-free in glob() function when expanding ~user 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-30 17:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc-dev-bin | CVE-2020-6096 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc-dev-bin | CVE-2021-3326 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc-dev-bin | CVE-2021-3999 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc-dev-bin | CVE-2024-2961 | 高危 | 2.28-10 | 2.28-10+deb10u3 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-dev-bin | CVE-2024-33599 | 高危 | 2.28-10 | 2.28-10+deb10u4 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | gcc-8 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | gcc-8-base | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | gcc-8-base | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | gir1.2-gdkpixbuf-2.0 | CVE-2022-48622 | 高危 | 2.38.1+dfsg-1 |  | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libc6 | CVE-2020-1751 | 高危 | 2.28-10 |  | glibc: array overflow in backtrace functions for powerpc 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc6 | CVE-2020-1752 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: use-after-free in glob() function when expanding ~user 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-30 17:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc6 | CVE-2020-6096 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc6 | CVE-2021-3326 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc6 | CVE-2021-3999 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc6 | CVE-2024-2961 | 高危 | 2.28-10 | 2.28-10+deb10u3 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2024-33599 | 高危 | 2.28-10 | 2.28-10+deb10u4 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | cpp-8 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | bsdutils | CVE-2024-28085 | 高危 | 1:2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | curl | CVE-2021-22946 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | git | CVE-2019-1387 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: Remote code execution in recursive clones with nested submodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libc6-dev | CVE-2020-1751 | 高危 | 2.28-10 |  | glibc: array overflow in backtrace functions for powerpc 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc6-dev | CVE-2020-1752 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: use-after-free in glob() function when expanding ~user 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-30 17:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libc6-dev | CVE-2020-6096 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc6-dev | CVE-2021-3326 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc6-dev | CVE-2021-3999 | 高危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc6-dev | CVE-2024-2961 | 高危 | 2.28-10 | 2.28-10+deb10u3 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6-dev | CVE-2024-33599 | 高危 | 2.28-10 | 2.28-10+deb10u4 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libcc1-0 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libcc1-0 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libcom-err2 | CVE-2022-1304 | 高危 | 1.44.5-1+deb10u3 |  | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | git | CVE-2021-21300 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u4 | git: remote code execution during clone operation on case-insensitive filesystems 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21300 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22946 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-22576 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27781 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27782 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27533 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27534 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u9 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-2398 | 高危 | 7.64.0-4+deb10u2 |  | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-6197 | 高危 | 7.64.0-4+deb10u2 |  | curl: freeing stack buffer in utf8asn1str 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-07-24 08:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | git | CVE-2021-40330 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u4 | git: unexpected cross-protocol requests via a repository path containing a newline character 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40330 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-08-31 04:15 修改: 2022-11-07 18:37 | 
                            
                            
                                | libcurl4 | CVE-2021-22946 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4 | CVE-2022-22576 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-27781 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2022-27782 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2023-27533 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27534 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u9 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2024-2398 | 高危 | 7.64.0-4+deb10u2 |  | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | libcurl4 | CVE-2024-6197 | 高危 | 7.64.0-4+deb10u2 |  | curl: freeing stack buffer in utf8asn1str 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-24 08:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | git | CVE-2022-24765 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22946 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-22576 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-27781 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-27782 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-27533 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-27534 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u9 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-2398 | 高危 | 7.64.0-4+deb10u2 |  | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-6197 | 高危 | 7.64.0-4+deb10u2 |  | curl: freeing stack buffer in utf8asn1str 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-24 08:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | git | CVE-2022-29187 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | git | CVE-2022-39260 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21598 | 高危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unw ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-22 18:02 | 
                            
                            
                                | libde265-0 | CVE-2021-36409 | 高危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36409 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 23:15 修改: 2023-02-16 03:11 | 
                            
                            
                                | libde265-0 | CVE-2022-47655 | 高危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_q ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-05 16:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2022-47664 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qp ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-03 15:15 修改: 2023-03-10 19:20 | 
                            
                            
                                | libde265-0 | CVE-2022-47665 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-03 15:15 修改: 2023-03-10 19:22 | 
                            
                            
                                | libde265-0 | CVE-2023-25221 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vuln ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25221 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:23 | 
                            
                            
                                | libde265-0 | CVE-2023-27103 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u5 | Libde265 v1.0.11 was discovered to contain a heap buffer overflow via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27103 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-15 15:15 修改: 2023-11-30 19:15 | 
                            
                            
                                | libde265-0 | CVE-2023-43887 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u5 | Libde265 v1.0.12 was discovered to contain multiple buffer overflows v ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-22 18:15 修改: 2023-11-30 19:15 | 
                            
                            
                                | libde265-0 | CVE-2023-49465 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u6 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49465 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-07 20:15 修改: 2023-12-30 21:15 | 
                            
                            
                                | libde265-0 | CVE-2023-49467 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u6 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49467 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-07 20:15 修改: 2023-12-30 21:15 | 
                            
                            
                                | libde265-0 | CVE-2023-49468 | 高危 | 1.0.3-1+b1 | 1.0.11-0+deb10u6 | Libde265 v1.0.14 was discovered to contain a global buffer overflow vu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49468 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-07 20:15 修改: 2024-08-28 17:35 | 
                            
                            
                                | libdjvulibre-dev | CVE-2019-18804 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU:: ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-07 06:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-32490 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds wri ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-32491 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-32492 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds rea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:39 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-32493 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overfl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-3500 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:41 | 
                            
                            
                                | libdjvulibre-text | CVE-2019-18804 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU:: ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-07 06:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-32490 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds wri ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-32491 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-32492 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds rea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:39 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-32493 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overfl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-3500 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:41 | 
                            
                            
                                | libdjvulibre21 | CVE-2019-18804 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU:: ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-07 06:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-32490 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds wri ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-32491 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-32492 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds rea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:39 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-32493 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overfl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-12-21 15:01 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-3500 | 高危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-24 19:15 修改: 2022-03-09 21:41 | 
                            
                            
                                | git | CVE-2023-23946 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u8 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2023-25652 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2023-29007 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2024-32004 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: RCE while cloning local repos 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2024-32465 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: additional local RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | curl | CVE-2022-22576 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27781 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | curl | CVE-2022-27782 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | git-man | CVE-2019-1387 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: Remote code execution in recursive clones with nested submodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2021-21300 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u4 | git: remote code execution during clone operation on case-insensitive filesystems 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21300 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libexpat1 | CVE-2021-45960 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Large number of prefixed XML attributes on a single tag can crash libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08 | 
                            
                            
                                | libexpat1 | CVE-2021-46143 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in doProlog in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11 | 
                            
                            
                                | libexpat1 | CVE-2022-22825 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in lookup in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1 | CVE-2022-22826 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in nextScaffoldPart in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44 | 
                            
                            
                                | libexpat1 | CVE-2022-22827 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in storeAtts in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52 | 
                            
                            
                                | libexpat1 | CVE-2022-23990 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: integer overflow in the doProlog function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2022-25314 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Integer overflow in copyString() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2022-40674 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u5 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libexpat1 | CVE-2022-43680 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u6 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | libexpat1 | CVE-2023-52425 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u7 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libexpat1 | CVE-2024-45490 | 高危 | 2.2.6-2+deb10u1 |  | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | git-man | CVE-2021-40330 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u4 | git: unexpected cross-protocol requests via a repository path containing a newline character 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40330 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-08-31 04:15 修改: 2022-11-07 18:37 | 
                            
                            
                                | git-man | CVE-2022-24765 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-29187 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | git-man | CVE-2022-39260 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-23946 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u8 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-25652 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2023-29007 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2024-32004 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: RCE while cloning local repos 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2024-32465 | 高危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: additional local RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libexpat1-dev | CVE-2021-45960 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Large number of prefixed XML attributes on a single tag can crash libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08 | 
                            
                            
                                | libexpat1-dev | CVE-2021-46143 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in doProlog in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22825 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in lookup in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22826 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in nextScaffoldPart in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-22827 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: Integer overflow in storeAtts in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52 | 
                            
                            
                                | libexpat1-dev | CVE-2022-23990 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 | expat: integer overflow in the doProlog function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-25314 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Integer overflow in copyString() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2022-40674 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u5 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libexpat1-dev | CVE-2022-43680 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u6 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | libexpat1-dev | CVE-2023-52425 | 高危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u7 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libexpat1-dev | CVE-2024-45490 | 高危 | 2.2.6-2+deb10u1 |  | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | libext2fs2 | CVE-2022-1304 | 高危 | 1.44.5-1+deb10u3 |  | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libfdisk1 | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | gzip | CVE-2022-1271 | 高危 | 1.9-3 | 1.9-3+deb10u1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | libfreetype6 | CVE-2022-27405 | 高危 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | FreeType: Segmentation violation via FNT_Size_Request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6 | CVE-2022-27406 | 高危 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | Freetype: Segmentation violation via FT_Request_Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | imagemagick | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libfreetype6-dev | CVE-2022-27405 | 高危 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | FreeType: Segmentation violation via FNT_Size_Request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6-dev | CVE-2022-27406 | 高危 | 2.9.1-3+deb10u2 | 2.9.1-3+deb10u3 | Freetype: Segmentation violation via FT_Request_Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfribidi0 | CVE-2022-25308 | 高危 | 1.0.5-3.1+deb10u1 | 1.0.5-3.1+deb10u2 | fribidi: Stack based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25308 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libgcc-8-dev | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libgcc-8-dev | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libgcc1 | CVE-2018-12886 | 高危 | 1:8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libgcc1 | CVE-2019-15847 | 高危 | 1:8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libgcrypt20 | CVE-2021-33560 | 高危 | 1.8.4-5+deb10u1 |  | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libgd3 | CVE-2017-6363 | 高危 | 2.2.5-5.2 |  | In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap- ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6363 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2020-02-27 05:15 修改: 2024-08-05 16:15 | 
                            
                            
                                | libgd3 | CVE-2018-14553 | 高危 | 2.2.5-5.2 | 2.2.5-5.2+deb10u1 | gd: NULL pointer dereference in gdImageClone 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14553 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2020-02-11 13:15 修改: 2024-04-07 01:17 | 
                            
                            
                                | libgdk-pixbuf2.0-0 | CVE-2022-48622 | 高危 | 2.38.1+dfsg-1 |  | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libgdk-pixbuf2.0-bin | CVE-2022-48622 | 高危 | 2.38.1+dfsg-1 |  | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libgdk-pixbuf2.0-common | CVE-2022-48622 | 高危 | 2.38.1+dfsg-1 |  | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libgdk-pixbuf2.0-dev | CVE-2022-48622 | 高危 | 2.38.1+dfsg-1 |  | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-29499 | 高危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2024-52533 | 高危 | 2.58.3-2+deb10u3 |  | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-29499 | 高危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2024-52533 | 高危 | 2.58.3-2+deb10u3 |  | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-29499 | 高危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2024-52533 | 高危 | 2.58.3-2+deb10u3 |  | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2023-29499 | 高危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2024-52533 | 高危 | 2.58.3-2+deb10u3 |  | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2023-29499 | 高危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2024-52533 | 高危 | 2.58.3-2+deb10u3 |  | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libgmp-dev | CVE-2021-43618 | 高危 | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | libgmp10 | CVE-2021-43618 | 高危 | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | libgmpxx4ldbl | CVE-2021-43618 | 高危 | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | libgnutls-dane0 | CVE-2022-2509 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutls-dane0 | CVE-2023-0361 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u10 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutls-dane0 | CVE-2024-0553 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u12 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2022-2509 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2023-0361 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u10 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2024-0553 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u12 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutls28-dev | CVE-2022-2509 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutls28-dev | CVE-2023-0361 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u10 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutls28-dev | CVE-2024-0553 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u12 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutls30 | CVE-2022-2509 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutls30 | CVE-2023-0361 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u10 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutls30 | CVE-2024-0553 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u12 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutlsxx28 | CVE-2022-2509 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutlsxx28 | CVE-2023-0361 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u10 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutlsxx28 | CVE-2024-0553 | 高危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u12 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgomp1 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libgomp1 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | imagemagick | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libgssrpc4 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libgssrpc4 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssrpc4 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | libharfbuzz0b | CVE-2023-25193 | 高危 | 2.3.1-1 |  | harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-04 20:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libheif1 | CVE-2020-19498 | 高危 | 1.3.2-2~deb10u1 |  | Floating point exception in function Fraction in libheif 1.4.0, allows ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19498 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 18:15 修改: 2021-07-30 15:27 | 
                            
                            
                                | libheif1 | CVE-2020-19499 | 高危 | 1.3.2-2~deb10u1 |  | An issue was discovered in heif::Box_iref::get_references in libheif 1 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 18:15 修改: 2021-07-30 15:12 | 
                            
                            
                                | libheif1 | CVE-2020-23109 | 高危 | 1.3.2-2~deb10u1 |  | Buffer overflow vulnerability in function convert_colorspace in heif_c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-23109 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-03 17:15 修改: 2021-11-05 16:52 | 
                            
                            
                                | libheif1 | CVE-2023-0996 | 高危 | 1.3.2-2~deb10u1 |  | There is a vulnerability in the strided image data parsing code in the ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-24 04:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | libidn2-0 | CVE-2019-12290 | 高危 | 2.0.5-1+deb10u1 |  | GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specifi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12290 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-10-22 16:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libidn2-dev | CVE-2019-12290 | 高危 | 2.0.5-1+deb10u1 |  | GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specifi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12290 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-22 16:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libitm1 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libitm1 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | imagemagick | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libk5crypto3 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libk5crypto3 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libk5crypto3 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkdb5-9 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkdb5-9 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkdb5-9 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libkrb5-3 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkrb5-3 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-3 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkrb5-dev | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkrb5-dev | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-dev | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkrb5support0 | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkrb5support0 | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5support0 | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | imagemagick | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libldap-2.4-2 | CVE-2023-2953 | 高危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: null pointer dereference in  ber_memalloc_x  function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libldap-common | CVE-2023-2953 | 高危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: null pointer dereference in  ber_memalloc_x  function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46 | 
                            
                            
                                | liblsan0 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | liblsan0 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | liblzma-dev | CVE-2022-1271 | 高危 | 5.2.4-1 | 5.2.4-1+deb10u1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | liblzma5 | CVE-2022-1271 | 高危 | 5.2.4-1 | 5.2.4-1+deb10u1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libmariadb-dev | CVE-2021-2389 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46669 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2022-24048 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev | CVE-2022-24050 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of validating the existence of an object prior to performing operations on the object 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev | CVE-2022-24051 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev | CVE-2022-24052 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: CONNECT storage engine heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27376 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in Item_args::walk_arg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27377 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison when complex conversion is involved in blob 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27378 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in create_tmp_table::finalize 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27379 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in component arg_comparator::compare_real_fixed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27380 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at my_decimal::operator= 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27381 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Field::set_default via specially crafted SQL statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27383 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27384 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash via component Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27386 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27387 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failures in decimal_bin_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27445 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in compare_order_elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27447 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in Binary_string::free_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27448 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash in multi-update and implicit grouping 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27449 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_func.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27452 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_cmpfunc.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb-dev | CVE-2022-27456 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32083 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-25 19:48 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32084 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault via the component sub_select 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32085 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32087 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_args::walk_args 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32088 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:27 | 
                            
                            
                                | libmariadb-dev | CVE-2022-32091 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in JOIN_CACHE::free or in copy_fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-2389 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46669 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-24048 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-24050 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of validating the existence of an object prior to performing operations on the object 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-24051 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-24052 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: CONNECT storage engine heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27376 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in Item_args::walk_arg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27377 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison when complex conversion is involved in blob 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27378 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in create_tmp_table::finalize 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27379 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in component arg_comparator::compare_real_fixed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27380 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at my_decimal::operator= 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27381 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Field::set_default via specially crafted SQL statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27383 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27384 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash via component Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27386 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27387 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failures in decimal_bin_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27445 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in compare_order_elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27447 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in Binary_string::free_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27448 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash in multi-update and implicit grouping 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27449 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_func.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27452 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_cmpfunc.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-27456 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32083 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-25 19:48 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32084 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault via the component sub_select 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32085 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32087 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_args::walk_args 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32088 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:27 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-32091 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in JOIN_CACHE::free or in copy_fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmariadb3 | CVE-2021-2389 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libmariadb3 | CVE-2021-46669 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2022-24048 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb3 | CVE-2022-24050 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of validating the existence of an object prior to performing operations on the object 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb3 | CVE-2022-24051 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb3 | CVE-2022-24052 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: CONNECT storage engine heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libmariadb3 | CVE-2022-27376 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in Item_args::walk_arg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb3 | CVE-2022-27377 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison when complex conversion is involved in blob 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08 | 
                            
                            
                                | libmariadb3 | CVE-2022-27378 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in create_tmp_table::finalize 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17 | 
                            
                            
                                | libmariadb3 | CVE-2022-27379 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in component arg_comparator::compare_real_fixed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19 | 
                            
                            
                                | libmariadb3 | CVE-2022-27380 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at my_decimal::operator= 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32 | 
                            
                            
                                | libmariadb3 | CVE-2022-27381 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Field::set_default via specially crafted SQL statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27 | 
                            
                            
                                | libmariadb3 | CVE-2022-27383 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | libmariadb3 | CVE-2022-27384 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash via component Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb3 | CVE-2022-27386 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | libmariadb3 | CVE-2022-27387 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failures in decimal_bin_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22 | 
                            
                            
                                | libmariadb3 | CVE-2022-27445 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in compare_order_elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb3 | CVE-2022-27447 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in Binary_string::free_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12 | 
                            
                            
                                | libmariadb3 | CVE-2022-27448 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash in multi-update and implicit grouping 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15 | 
                            
                            
                                | libmariadb3 | CVE-2022-27449 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_func.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59 | 
                            
                            
                                | libmariadb3 | CVE-2022-27452 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_cmpfunc.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | libmariadb3 | CVE-2022-27456 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09 | 
                            
                            
                                | libmariadb3 | CVE-2022-32083 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-25 19:48 | 
                            
                            
                                | libmariadb3 | CVE-2022-32084 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault via the component sub_select 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmariadb3 | CVE-2022-32085 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb3 | CVE-2022-32087 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_args::walk_args 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | libmariadb3 | CVE-2022-32088 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:27 | 
                            
                            
                                | libmariadb3 | CVE-2022-32091 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in JOIN_CACHE::free or in copy_fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libmount-dev | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libmount1 | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libmpx2 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libmpx2 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libncurses-dev | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncurses-dev | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncurses-dev | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncurses5-dev | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncurses5-dev | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncurses5-dev | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncurses6 | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncurses6 | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncurses6 | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncursesw5-dev | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncursesw5-dev | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncursesw5-dev | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncursesw6 | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncursesw6 | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncursesw6 | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libnghttp2-14 | CVE-2020-11080 | 高危 | 1.36.0-2+deb10u1 | 1.36.0-2+deb10u2 | nghttp2: overly large SETTINGS frames can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11080 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2020-06-03 23:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | libnghttp2-14 | CVE-2023-44487 | 高危 | 1.36.0-2+deb10u1 | 1.36.0-2+deb10u2 | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20298 | 高危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory in B44Compressor 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20298 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2022-12-13 02:24 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20299 | 高危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Null-dereference READ in Imf_2_5::Header::operator 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20299 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-12-13 01:59 | 
                            
                            
                                | libopenexr23 | CVE-2021-20298 | 高危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory in B44Compressor 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20298 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2022-12-13 02:24 | 
                            
                            
                                | libopenexr23 | CVE-2021-20299 | 高危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Null-dereference READ in Imf_2_5::Header::operator 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20299 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-12-13 01:59 | 
                            
                            
                                | libopenjp2-7 | CVE-2021-3575 | 高危 | 2.3.0-2+deb10u2 |  | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3575 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2023-02-12 23:41 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2021-3575 | 高危 | 2.3.0-2+deb10u2 |  | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3575 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2023-02-12 23:41 | 
                            
                            
                                | libpam-modules | CVE-2024-10963 | 高危 | 1.3.1-5 |  | pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15 | 
                            
                            
                                | libpam-modules-bin | CVE-2024-10963 | 高危 | 1.3.1-5 |  | pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15 | 
                            
                            
                                | libpam-runtime | CVE-2024-10963 | 高危 | 1.3.1-5 |  | pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15 | 
                            
                            
                                | libpam0g | CVE-2024-10963 | 高危 | 1.3.1-5 |  | pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libpcre2-8-0 | CVE-2019-20454 | 高危 | 10.32-5 | 10.32-5+deb10u1 | pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20454 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2020-02-14 14:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libperl5.28 | CVE-2020-16156 | 高危 | 5.28.1-6+deb10u1 |  | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libperl5.28 | CVE-2023-31484 | 高危 | 5.28.1-6+deb10u1 |  | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | libpixman-1-0 | CVE-2022-44638 | 高危 | 0.36.0-1 | 0.36.0-1+deb10u1 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44638 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-03 06:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpixman-1-dev | CVE-2022-44638 | 高危 | 0.36.0-1 | 0.36.0-1+deb10u1 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44638 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-03 06:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpq-dev | CVE-2021-23214 | 高危 | 11.12-0+deb10u1 | 11.14-0+deb10u1 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpq-dev | CVE-2022-1552 | 高危 | 11.12-0+deb10u1 | 11.16-0+deb10u1 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpq-dev | CVE-2022-2625 | 高危 | 11.12-0+deb10u1 | 11.17-0+deb10u1 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | libpq-dev | CVE-2023-2454 | 高危 | 11.12-0+deb10u1 | 11.20-0+deb10u1 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq-dev | CVE-2023-39417 | 高危 | 11.12-0+deb10u1 | 11.21-0+deb10u2 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | libpq-dev | CVE-2023-5869 | 高危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Buffer overrun from integer overflow in array modification 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libpq-dev | CVE-2024-0985 | 高危 | 11.12-0+deb10u1 | 11.22-0+deb10u2 | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-08 13:15 修改: 2024-12-20 13:15 | 
                            
                            
                                | libpq5 | CVE-2021-23214 | 高危 | 11.12-0+deb10u1 | 11.14-0+deb10u1 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpq5 | CVE-2022-1552 | 高危 | 11.12-0+deb10u1 | 11.16-0+deb10u1 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpq5 | CVE-2022-2625 | 高危 | 11.12-0+deb10u1 | 11.17-0+deb10u1 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | libpq5 | CVE-2023-2454 | 高危 | 11.12-0+deb10u1 | 11.20-0+deb10u1 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq5 | CVE-2023-39417 | 高危 | 11.12-0+deb10u1 | 11.21-0+deb10u2 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | libpq5 | CVE-2023-5869 | 高危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Buffer overrun from integer overflow in array modification 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libpq5 | CVE-2024-0985 | 高危 | 11.12-0+deb10u1 | 11.22-0+deb10u2 | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-08 13:15 修改: 2024-12-20 13:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2015-20107 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython2.7-minimal | CVE-2019-20907 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: infinite loop in the tarfile module via crafted TAR archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-07-13 13:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | libpython2.7-minimal | CVE-2020-10735 | 高危 | 2.7.16-2+deb10u1 |  | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2020-26116 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CRLF injection via HTTP request method in httplib/http.client 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-09-27 04:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-3737 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-0391 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-45061 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-48560 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2023-24329 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython2.7-minimal | CVE-2024-6232 | 高危 | 2.7.16-2+deb10u1 |  | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2015-20107 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2019-20907 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: infinite loop in the tarfile module via crafted TAR archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-07-13 13:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2020-10735 | 高危 | 2.7.16-2+deb10u1 |  | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2020-26116 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CRLF injection via HTTP request method in httplib/http.client 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-09-27 04:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-3737 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-0391 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-45061 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-48560 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2023-24329 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2024-6232 | 高危 | 2.7.16-2+deb10u1 |  | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2015-20107 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython3.7-minimal | CVE-2020-10735 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-3737 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-0391 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-42919 | 高危 | 3.7.3-2+deb10u3 |  | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-45061 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-48560 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2023-24329 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.7-minimal | CVE-2023-6597 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2015-20107 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2020-10735 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-3737 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-0391 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-42919 | 高危 | 3.7.3-2+deb10u3 |  | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-45061 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-48560 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2023-24329 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2023-6597 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libquadmath0 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libquadmath0 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libsasl2-2 | CVE-2022-24407 | 高危 | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libsasl2-modules-db | CVE-2022-24407 | 高危 | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libsmartcols1 | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2019-19603 | 高危 | 3.27.2-3+deb10u1 |  | sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19603 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2019-12-09 19:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libsqlite3-0 | CVE-2020-35525 | 高危 | 3.27.2-3+deb10u1 | 3.27.2-3+deb10u2 | sqlite: Null pointer derreference in src/select.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35525 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-09-01 18:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2023-7104 | 高危 | 3.27.2-3+deb10u1 |  | sqlite: heap-buffer-overflow at sessionfuzz 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | libsqlite3-dev | CVE-2019-19603 | 高危 | 3.27.2-3+deb10u1 |  | sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19603 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-09 19:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libsqlite3-dev | CVE-2020-35525 | 高危 | 3.27.2-3+deb10u1 | 3.27.2-3+deb10u2 | sqlite: Null pointer derreference in src/select.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35525 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 18:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libsqlite3-dev | CVE-2023-7104 | 高危 | 3.27.2-3+deb10u1 |  | sqlite: heap-buffer-overflow at sessionfuzz 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34 | 
                            
                            
                                | libss2 | CVE-2022-1304 | 高危 | 1.44.5-1+deb10u3 |  | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libssh2-1 | CVE-2019-13115 | 高危 | 1.8.0-2.1 | 1.8.0-2.1+deb10u1 | libssh2: integer overflow in kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c leads to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13115 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2019-07-16 18:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libssh2-1 | CVE-2019-17498 | 高危 | 1.8.0-2.1 | 1.8.0-2.1+deb10u1 | libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17498 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2019-10-21 22:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libssh2-1 | CVE-2020-22218 | 高危 | 1.8.0-2.1 | 1.8.0-2.1+deb10u1 | libssh2: use-of-uninitialized-value in _libssh2_transport_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22218 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-19667 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Stack buffer overflow in XPM coder could result in a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-20 16:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27752 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27766 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libssl-dev | CVE-2021-3712 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u7 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-0778 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u8 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-4450 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0215 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0286 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0464 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-29599 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Shell injection via PDF password could result in arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20309 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20312 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3712 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u7 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-0778 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u8 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4450 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0215 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0286 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0464 | 高危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libstdc++-8-dev | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libstdc++-8-dev | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libstdc++6 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libstdc++6 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libsvn1 | CVE-2022-24070 | 高危 | 1.10.4-1+deb10u2 | 1.10.4-1+deb10u3 | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24070 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libsystemd0 | CVE-2019-3843 | 高危 | 241-7~deb10u8 |  | systemd: services with DynamicUser can create SUID/SGID binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libsystemd0 | CVE-2019-3844 | 高危 | 241-7~deb10u8 |  | systemd: services with DynamicUser can get new privileges and create SGID binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libsystemd0 | CVE-2023-26604 | 高危 | 241-7~deb10u8 | 241-7~deb10u9 | systemd: privilege escalation via the less pager 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libsystemd0 | CVE-2023-50387 | 高危 | 241-7~deb10u8 |  | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-50868 | 高危 | 241-7~deb10u8 |  | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20313 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-40211 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:22 | 
                            
                            
                                | libtiff-dev | CVE-2022-0891 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: heap buffer overflow in extractImageSection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-3970 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-13 08:15 修改: 2023-11-17 19:04 | 
                            
                            
                                | libtiff-dev | CVE-2023-25434 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 20:15 修改: 2023-06-23 16:25 | 
                            
                            
                                | libtiff-dev | CVE-2023-52355 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-05-17 17:37 | 
                            
                            
                                | libtiff-dev | CVE-2023-52356 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: Segment fault in libtiff  in TIFFReadRGBATileExt() leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-09-16 20:15 | 
                            
                            
                                | libtiff-dev | CVE-2024-7006 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in tif_dirinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 13:38 修改: 2024-11-06 10:15 | 
                            
                            
                                | libtiff5 | CVE-2022-0891 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: heap buffer overflow in extractImageSection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-3970 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-13 08:15 修改: 2023-11-17 19:04 | 
                            
                            
                                | libtiff5 | CVE-2023-25434 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 20:15 修改: 2023-06-23 16:25 | 
                            
                            
                                | libtiff5 | CVE-2023-52355 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-05-17 17:37 | 
                            
                            
                                | libtiff5 | CVE-2023-52356 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: Segment fault in libtiff  in TIFFReadRGBATileExt() leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-09-16 20:15 | 
                            
                            
                                | libtiff5 | CVE-2024-7006 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in tif_dirinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 13:38 修改: 2024-11-06 10:15 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0891 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: heap buffer overflow in extractImageSection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3970 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-13 08:15 修改: 2023-11-17 19:04 | 
                            
                            
                                | libtiffxx5 | CVE-2023-25434 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 20:15 修改: 2023-06-23 16:25 | 
                            
                            
                                | libtiffxx5 | CVE-2023-52355 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-05-17 17:37 | 
                            
                            
                                | libtiffxx5 | CVE-2023-52356 | 高危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: Segment fault in libtiff  in TIFFReadRGBATileExt() leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 20:15 修改: 2024-09-16 20:15 | 
                            
                            
                                | libtiffxx5 | CVE-2024-7006 | 高危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in tif_dirinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 13:38 修改: 2024-11-06 10:15 | 
                            
                            
                                | libtinfo6 | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libtinfo6 | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtinfo6 | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libtsan0 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libtsan0 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libubsan1 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libubsan1 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libudev1 | CVE-2019-3843 | 高危 | 241-7~deb10u8 |  | systemd: services with DynamicUser can create SUID/SGID binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libudev1 | CVE-2019-3844 | 高危 | 241-7~deb10u8 |  | systemd: services with DynamicUser can get new privileges and create SGID binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libudev1 | CVE-2023-26604 | 高危 | 241-7~deb10u8 | 241-7~deb10u9 | systemd: privilege escalation via the less pager 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libudev1 | CVE-2023-50387 | 高危 | 241-7~deb10u8 |  | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libudev1 | CVE-2023-50868 | 高危 | 241-7~deb10u8 |  | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libunbound8 | CVE-2022-3204 | 高危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u3 | unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-26 14:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libunbound8 | CVE-2023-50387 | 高危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u4 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libunbound8 | CVE-2023-50868 | 高危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u4 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libuuid1 | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libwebp-dev | CVE-2023-1999 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u2 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebp-dev | CVE-2023-4863 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u3 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libwebp6 | CVE-2023-1999 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u2 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebp6 | CVE-2023-4863 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u3 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libwebpdemux2 | CVE-2023-1999 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u2 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebpdemux2 | CVE-2023-4863 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u3 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libwebpmux3 | CVE-2023-1999 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u2 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebpmux3 | CVE-2023-4863 | 高危 | 0.6.1-2+deb10u1 | 0.6.1-2+deb10u3 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libx11-6 | CVE-2023-3138 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u3 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-6 | CVE-2023-43787 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-data | CVE-2023-3138 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u3 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-data | CVE-2023-43787 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-dev | CVE-2023-3138 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u3 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-dev | CVE-2023-43787 | 高危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libxml2 | CVE-2017-16932 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: Infinite recursion in parameter entities 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40 | 
                            
                            
                                | libxml2 | CVE-2022-2309 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | lxml: NULL Pointer Dereference in lxml 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2 | CVE-2022-23308 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 | libxml2: Use-after-free of ID and IDREF attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23308 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-26 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libxml2 | CVE-2022-40303 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u5 | libxml2: integer overflows with XML_PARSE_HUGE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2022-40304 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u5 | libxml2: dict corruption caused by entity reference cycles 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2024-25062 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | libxml2-dev | CVE-2017-16932 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: Infinite recursion in parameter entities 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40 | 
                            
                            
                                | libxml2-dev | CVE-2022-2309 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | lxml: NULL Pointer Dereference in lxml 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2-dev | CVE-2022-23308 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 | libxml2: Use-after-free of ID and IDREF attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23308 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-26 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libxml2-dev | CVE-2022-40303 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u5 | libxml2: integer overflows with XML_PARSE_HUGE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2-dev | CVE-2022-40304 | 高危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u5 | libxml2: dict corruption caused by entity reference cycles 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2-dev | CVE-2024-25062 | 高危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | libxpm4 | CVE-2022-44617 | 高危 | 1:3.5.12-1 | 1:3.5.12-1+deb10u1 | libXpm: Runaway loop on width of 0 and enormous height 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44617 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-02-06 23:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libxpm4 | CVE-2022-46285 | 高危 | 1:3.5.12-1 | 1:3.5.12-1+deb10u1 | libXpm: Infinite loop on unclosed comments 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46285 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libxpm4 | CVE-2022-4883 | 高危 | 1:3.5.12-1 | 1:3.5.12-1+deb10u1 | libXpm: compression commands depend on $PATH 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4883 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libxslt1-dev | CVE-2019-5815 | 高危 | 1.1.32-2.2~deb10u1 | 1.1.32-2.2~deb10u2 | chromium-browser: Heap buffer overflow in Blink 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-11 01:15 修改: 2023-11-07 03:12 | 
                            
                            
                                | libxslt1-dev | CVE-2021-30560 | 高危 | 1.1.32-2.2~deb10u1 | 1.1.32-2.2~deb10u2 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-03 19:15 修改: 2024-03-27 14:45 | 
                            
                            
                                | libxslt1.1 | CVE-2019-5815 | 高危 | 1.1.32-2.2~deb10u1 | 1.1.32-2.2~deb10u2 | chromium-browser: Heap buffer overflow in Blink 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-11 01:15 修改: 2023-11-07 03:12 | 
                            
                            
                                | libxslt1.1 | CVE-2021-30560 | 高危 | 1.1.32-2.2~deb10u1 | 1.1.32-2.2~deb10u2 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-03 19:15 修改: 2024-03-27 14:45 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-28463 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28463 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-08 23:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-32545 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | linux-libc-dev | CVE-2013-7445 | 高危 | 4.19.194-3 |  | kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2015-10-16 01:59 修改: 2015-10-16 16:22 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19449 | 高危 | 4.19.194-3 |  | kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-08 02:15 修改: 2020-01-03 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19814 | 高危 | 4.19.194-3 |  | kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19814 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-17 06:15 修改: 2020-01-03 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-25162 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: use after free in i2c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25162 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2020-12362 | 高危 | 4.19.194-3 |  | kernel: Integer overflow in Intel(R) Graphics Drivers 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12362 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-17 14:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-16119 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: DCCP CCID structure use-after-free may lead to DoS or code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-14 01:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36385 | 高危 | 4.19.194-3 |  | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36385 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-07 12:15 修改: 2022-10-25 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20322 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-22543 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22543 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-26 11:15 修改: 2024-05-29 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-22600 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: double free in packet_set_ring() in net/packet/af_packet.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-26 14:15 修改: 2023-06-26 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33631 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: ext4: kernel bug in ext4_write_inline_data_end() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33631 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-18 15:15 修改: 2024-02-03 03:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3444 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: bpf verifier incorrect mod32 truncation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-23 18:15 修改: 2021-12-02 19:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3493 | 高危 | 4.19.194-3 |  | kernel: overlayfs file system caps privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-17 05:15 修改: 2023-07-07 19:10 | 
                            
                            
                                | linux-libc-dev | CVE-2021-35039 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: allows loading unsigned kernel modules via init_module syscall 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-07 01:15 修改: 2023-05-16 10:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3600 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: eBPF 32-bit source register truncation on div/mod 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-08 19:15 修改: 2024-09-04 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3612 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3612 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-09 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3640 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: use-after-free vulnerability in function sco_sock_sendmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-03 23:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3653 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: SVM nested virtualization issue in KVM (AVIC support) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3653 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-29 20:15 修改: 2023-05-16 10:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3656 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 19:15 修改: 2023-01-19 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3743 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 16:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3752 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: possible use-after-free in bluetooth module 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 19:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-37576 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: powerpc: KVM guest OS users can cause host OS memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-26 22:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3760 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: nfc: Use-After-Free vulnerability of ndev->rf_conn_info object 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 19:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38160 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-07 04:15 修改: 2024-08-27 19:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38207 | 高危 | 4.19.194-3 |  | kernel: buffer overflow in drivers/net/ethernet/xilinx/ll_temac_main.c by sending heavy network traffic for about ten minutes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38207 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-08 20:15 修改: 2021-10-18 12:23 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38300 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: crafting anomalous machine code may lead to arbitrary Kernel code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38300 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 06:15 修改: 2023-03-01 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3847 | 高危 | 4.19.194-3 |  | kernel: low-privileged user privileges escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-01 23:15 修改: 2022-04-11 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3864 | 高危 | 4.19.194-3 |  | kernel: descendant's dumpable setting with certain SUID binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-02-12 23:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39685 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: USB gadget buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39685 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-03-23 16:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39686 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: race condition in the Android binder driver could lead to incorrect security checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39698 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: use-after-free in the file polling implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-03-23 17:21 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39713 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: race condition in the network scheduling subsystem could lead to an use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39713 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 15:15 修改: 2022-10-18 20:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4037 | 高危 | 4.19.194-3 |  | kernel: security regression for CVE-2018-13405 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-12-08 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-40490 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-03 01:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4083 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: fget: check that the fd still exists after getting a ref to it 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-18 17:15 修改: 2023-10-06 18:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-41864 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-02 00:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4197 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: cgroup: Use open-time creds and namespace for migration perm checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-23 20:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42008 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: slab out-of-bounds write in decode_data() in drivers/net/hamradio/6pack.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-05 00:15 修改: 2023-05-12 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4202 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: Race condition in nci_request() leads to use after free while the device is getting removed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4202 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42252 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: memory overwrite in the kernel with potential privileges execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-11 19:15 修改: 2021-12-03 03:07 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4439 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4439 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-09-18 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-44733 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: use-after-free in the TEE subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-22 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45469 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: out-of-bounds memory access in __f2fs_setxattr() in fs/f2fs/xattr.c when an inode has an invalid last xattr entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-23 19:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45485 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: information leak in the IPv6 implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45485 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-25 02:15 修改: 2023-02-24 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46936 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: net: fix use-after-free in tw_timer_handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 19:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46984 | 高危 | 4.19.194-3 |  | kernel: kyber: fix out of bounds access when preempted 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 15:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47049 | 高危 | 4.19.194-3 |  | kernel: Drivers: hv: vmbus: Use after free in __vmbus_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47049 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-09 19:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47061 | 高危 | 4.19.194-3 |  | kernel: KVM: use-after-free while destroy I/O bus devices on unregister failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 23:15 修改: 2024-12-10 16:55 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47063 | 高危 | 4.19.194-3 |  | kernel: drm: bridge/panel: UAF while Cleanup connector on bridge detach 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 23:15 修改: 2024-12-10 16:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47103 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: inet: fully convert sk->sk_rx_dst to RCU rules 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47103 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47110 | 高危 | 4.19.194-3 |  | kernel: x86/kvm: Disable kvmclock on all CPUs on shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47110 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47194 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-19 19:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47198 | 高危 | 4.19.194-3 |  | kernel: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47235 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: ethernet: fix potential use-after-free in ec_bhf_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47239 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: usb: fix possible use-after-free in smsc75xx_bind 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47240 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: qrtr: fix OOB Read in qrtr_endpoint_post 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47243 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: sch_cake: Fix out of bounds when parsing TCP options and header 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47245 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: netfilter: synproxy: Fix out of bounds when parsing TCP options 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47254 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: gfs2: Fix use-after-free in gfs2_glock_shrink_scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47254 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47280 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: drm: Fix use-after-free read in drm_getunique() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47280 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47281 | 高危 | 4.19.194-3 |  | kernel: ALSA: seq: Fix race of snd_seq_timer_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47288 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47288 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-23 16:45 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47301 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: igb: Fix use-after-free error during reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47301 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 20:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47309 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: validate lwtstate->data before returning from skb_tunnel_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 18:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47310 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: ti: fix UAF in tlan_remove_one 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47311 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: net: qcom/emac: fix UAF in emac_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47321 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47321 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:51 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47328 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: scsi: iscsi: Fix conn use after free during resets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47328 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:52 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47334 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: misc/libmasm/module: Fix two use after free in ibmasm_init_one 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47334 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:25 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47342 | 高危 | 4.19.194-3 |  | kernel: ext4: fix possible UAF when remounting r/o a mmp-protected file system 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47342 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47355 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: atm: nicstar: Fix possible use-after-free in nicstar_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47357 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: atm: iphase: fix possible use-after-free in ia_module_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47357 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47358 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: staging: greybus: uart: fix tty use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47361 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: mcb: fix error handling in mcb_alloc_bus() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47361 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47372 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: net: macb: fix use after free on rmmod 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47372 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 17:57 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47379 | 高危 | 4.19.194-3 |  | kernel: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-23 20:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47388 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: mac80211: fix use-after-free in CCMP/GCMP RX 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47388 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 20:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47404 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47404 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47466 | 高危 | 4.19.194-3 |  | kernel: mm, slub: fix potential memoryleak in kmem_cache_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47466 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47467 | 高危 | 4.19.194-3 |  | kernel: kunit: fix reference count leak in kfree_at_end 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47467 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-11-05 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47493 | 高危 | 4.19.194-3 |  | kernel: ocfs2: fix race between searching chunks and release journal_head from buffer_head 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47520 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: can: pch_can: pch_can_rx_normal: fix use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47520 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47521 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: can: sja1000: fix use after free in ems_pcmcia_add_card() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47541 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47571 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47571 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47576 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47589 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: igbvf: fix double free in `igbvf_probe` 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 03:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47598 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: sch_cake: do not call cake_destroy() from cake_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47600 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: dm btree remove: fix use after free in rebalance_children() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47609 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47609 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-30 21:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47624 | 高危 | 4.19.194-3 |  | kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0330 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: possible privileges escalation due to missing TLB flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0330 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2022-12-07 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0435 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-02-14 19:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0492 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: cgroups v1 release_agent feature may allow privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-03 19:15 修改: 2023-12-07 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0850 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: information leak in copy_page_to_iter() in iov_iter.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-10-05 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1011 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-18 18:15 修改: 2022-10-12 13:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1012 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1012 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-05 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1048 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: race condition in snd_pcm_hw_free leading to use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-29 16:15 修改: 2024-01-21 02:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1199 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: Null pointer dereference and use after free in ax25_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1199 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1353 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: kernel info leak issue in pfkey_register 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1353 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-29 16:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1419 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: a concurrency use-after-free in vgem_gem_dumb_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1419 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2022-12-09 18:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1652 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: A concurrency use-after-free in floppy disk device driver. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1652 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2023-03-01 20:16 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1678 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: improper update of sock reference in TCP pacing can lead to memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1679 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-16 18:15 修改: 2024-01-19 17:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1729 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: race condition in perf_event_open leads to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1729 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2023-08-04 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1734 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from user-space 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1734 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-18 17:15 修改: 2022-10-14 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20141 | 高危 | 4.19.194-3 | 4.19.208-1 | kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 14:15 修改: 2024-02-02 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20368 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20368 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-11 15:15 修改: 2022-09-06 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20421 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: use after free in binder_inc_ref_for_node in drivers/android/binder.c due 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20421 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-11 20:15 修改: 2022-12-03 02:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20422 | 高危 | 4.19.194-3 | 4.19.260-1 | In emulation_proc_handler of armv8_deprecated.c, there is a possible w ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20422 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-11 20:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20566 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: possible use after free due to improper locking in l2cap_chan_put of l2cap_core 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-16 16:15 修改: 2022-12-20 21:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-22942 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: failing usercopy allows for use-after-free exploitation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-13 09:15 修改: 2023-12-18 17:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23036 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23036 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23037 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23038 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23038 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23039 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23040 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23040 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23041 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23041 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23042 | 高危 | 4.19.194-3 | 4.19.235-1 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24958 | 高危 | 4.19.194-3 | 4.19.235-1 | kernel: use-after-free in dev->buf release in drivers/usb/gadget/legacy/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 06:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2586 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-08 18:15 修改: 2024-06-27 01:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2588 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-08 18:15 修改: 2024-08-22 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26365 | 高危 | 4.19.194-3 | 4.19.260-1 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26365 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2639 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2639 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2024-02-02 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26490 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-06 04:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-27223 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index is not validated 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27223 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-16 00:15 修改: 2024-02-08 20:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-27666 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: buffer overflow in IPsec ESP transformation code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-23 06:15 修改: 2023-02-01 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28390 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28390 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29581 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29581 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-17 17:15 修改: 2023-06-28 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2964 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: memory corruption in AX88179_178A based USB ethernet device. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 15:15 修改: 2023-01-20 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2977 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: use-after-free Read in put_device (/dev/vtpmx) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-14 21:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2978 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: use-after-free in nilfs_mdt_destroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3028 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: race condition in xfrm_probe_algs can lead to OOB read/write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-30594 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30594 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-12 05:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3176 | 高危 | 4.19.194-3 |  | kernel: use-after-free in io_uring for POLLFREE notification with Signalfd_poll() and binder_poll() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-16 14:15 修改: 2023-04-11 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3202 | 高危 | 4.19.194-3 | 4.19.249-1 | Kernel: jfs: Null Pointer Deference in jfs_evict_inode leads to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3202 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-14 15:15 修改: 2023-10-05 14:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-32250 | 高危 | 4.19.194-3 | 4.19.249-2 | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3239 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: media: em28xx: initialize refcount before kref_get 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-19 20:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33740 | 高危 | 4.19.194-3 | 4.19.260-1 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33741 | 高危 | 4.19.194-3 | 4.19.260-1 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33742 | 高危 | 4.19.194-3 | 4.19.260-1 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3424 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: Use after Free in gru_set_context_option leading to kernel panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-06 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3545 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: nfp: use-after-free in area_cache_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-17 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3564 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-17 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3565 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: use-after-free in l1oip timer handlers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-17 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3566 | 高危 | 4.19.194-3 |  | kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-17 19:15 修改: 2022-10-20 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3635 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: use after in tst_timer in drivers/atm/idt77252.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3635 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 11:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3640 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 15:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3649 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3649 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 20:15 修改: 2024-01-26 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36946 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-27 20:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-39189 | 高危 | 4.19.194-3 |  | kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-02 05:15 修改: 2023-10-20 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4095 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: Use-after-Free/Double-Free bug in read_bbreg_hdl in drivers/staging/rtl8712/rtl8712_cmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-22 15:15 修改: 2023-06-07 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41858 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-17 18:15 修改: 2023-10-05 14:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42896 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 15:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4378 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-05 16:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | linux-libc-dev | CVE-2022-43945 | 高危 | 4.19.194-3 |  | kernel: nfsd buffer overflow by RPC message over TCP with garbage data 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-04 19:15 修改: 2023-03-08 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45934 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-27 04:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4744 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: tun: avoid double free in tun_free_netdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 21:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47518 | 高危 | 4.19.194-3 |  | kernel: a heap-based buffer overflow in drivers/net/wireless/microchip/wilc1000/cfg80211.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47518 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-18 06:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47519 | 高危 | 4.19.194-3 |  | kernel: an out-of-bounds write in drivers/net/wireless/microchip/wilc1000/cfg80211.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47519 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-18 06:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47520 | 高危 | 4.19.194-3 |  | kernel: an out-of-bounds read in drivers/net/wireless/microchip/wilc1000/hif.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47520 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-18 06:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47521 | 高危 | 4.19.194-3 |  | kernel: a heap-based buffer overflow in drivers/net/wireless/microchip/wilc1000/cfg80211.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-18 06:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48626 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: moxart: fix potential use-after-free on remove path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48626 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:27 修改: 2024-08-27 18:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48670 | 高危 | 4.19.194-3 |  | kernel: peci: cpu: Fix use-after-free in adev_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48670 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48672 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48674 | 高危 | 4.19.194-3 |  | kernel: erofs: fix pcluster use-after-free on UP platforms 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-11-21 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48695 | 高危 | 4.19.194-3 | 4.19.260-1 | kernel: scsi: mpt3sas: Fix use-after-free warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 18:15 修改: 2024-12-26 20:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48732 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: drm/nouveau: fix off by one in BIOS boundary checking 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-08-19 17:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48733 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix use-after-free after failure to create a snapshot 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48735 | 高危 | 4.19.194-3 |  | kernel: ALSA: hda: Fix UAF of leds class devs at unbinding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-08-19 16:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48740 | 高危 | 4.19.194-3 |  | kernel: selinux: fix double free of cond_list on error paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-08-19 17:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48742 | 高危 | 4.19.194-3 | 4.19.232-1 | kernel: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-08-20 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48778 | 高危 | 4.19.194-3 |  | kernel: mtd: rawnand: gpmi: don't leak PM reference in error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48778 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48779 | 高危 | 4.19.194-3 |  | kernel: net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48779 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 18:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48782 | 高危 | 4.19.194-3 |  | kernel: mctp: fix use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48783 | 高危 | 4.19.194-3 |  | kernel: net: dsa: lantiq_gswip: fix use after free in gswip_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48783 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48787 | 高危 | 4.19.194-3 |  | kernel: iwlwifi: fix use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48787 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48788 | 高危 | 4.19.194-3 |  | kernel: nvme-rdma: fix possible use-after-free in transport error_recovery work 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48788 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48789 | 高危 | 4.19.194-3 |  | kernel: nvme-tcp: fix possible use-after-free in transport error_recovery work 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48789 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 20:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48790 | 高危 | 4.19.194-3 |  | kernel: nvme: fix a possible use-after-free in controller reset during load 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48790 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 20:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48791 | 高危 | 4.19.194-3 |  | kernel: scsi: pm8001: Fix use-after-free for aborted TMF sas_task 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48792 | 高危 | 4.19.194-3 |  | kernel: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48792 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48796 | 高危 | 4.19.194-3 |  | kernel: iommu: Fix potential use-after-free during probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 20:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48805 | 高危 | 4.19.194-3 |  | kernel: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48820 | 高危 | 4.19.194-3 |  | kernel: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48820 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-09-09 18:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48822 | 高危 | 4.19.194-3 |  | kernel: usb: f_fs: Fix use-after-free for epfile 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48834 | 高危 | 4.19.194-3 |  | kernel: usb: usbtmc: Fix bug in pipe direction for control transfers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48834 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-19 18:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48837 | 高危 | 4.19.194-3 |  | kernel: usb: gadget: rndis: prevent integer overflow in rndis_set_response() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48837 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-18 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48847 | 高危 | 4.19.194-3 |  | kernel: watch_queue: Fix filter limit check 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 17:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48848 | 高危 | 4.19.194-3 |  | kernel: tracing/osnoise: Do not unregister events twice 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48848 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 16:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48851 | 高危 | 4.19.194-3 |  | kernel: staging: gdm724x: fix use after free in gdm_lte_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48854 | 高危 | 4.19.194-3 |  | kernel: net: arc_emac: Fix use after free in arc_mdio_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48855 | 高危 | 4.19.194-3 |  | kernel: sctp: fix kernel-infoleak for SCTP sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48858 | 高危 | 4.19.194-3 |  | kernel: net/mlx5: Fix a race on command flush flow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48866 | 高危 | 4.19.194-3 |  | kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48867 | 高危 | 4.19.194-3 |  | kernel: dmaengine: idxd: Prevent use after free on completion memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48871 | 高危 | 4.19.194-3 |  | kernel: tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48872 | 高危 | 4.19.194-3 |  | kernel: misc: fastrpc: Fix use-after-free race condition for maps 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48872 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48873 | 高危 | 4.19.194-3 |  | kernel: misc: fastrpc: Don't remove map on creater_process and device_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48873 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48874 | 高危 | 4.19.194-3 |  | kernel: misc: fastrpc: Fix use-after-free and race in fastrpc_map_find 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48874 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48878 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: hci_qca: Fix driver shutdown on closed serdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48878 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48881 | 高危 | 4.19.194-3 |  | kernel: platform/x86/amd: Fix refcount leak in amd_pmc_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48881 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48892 | 高危 | 4.19.194-3 |  | kernel: sched/core: Fix use-after-free bug in dup_user_cpus_ptr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48892 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48912 | 高危 | 4.19.194-3 |  | kernel: netfilter: fix use-after-free in __nf_register_net_hook() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48913 | 高危 | 4.19.194-3 |  | kernel: blktrace: fix use after free for struct blk_trace 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48919 | 高危 | 4.19.194-3 |  | kernel: cifs: fix double free race when mount fails in cifs_get_root() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48925 | 高危 | 4.19.194-3 |  | kernel: RDMA/cma: Do not change route.addr.src_addr outside state checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48925 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-23 02:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48926 | 高危 | 4.19.194-3 |  | kernel: usb: gadget: rndis: add spinlock for rndis response list 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48926 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48927 | 高危 | 4.19.194-3 |  | kernel: iio: adc: tsc2046: fix memory corruption by preventing array overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48927 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48943 | 高危 | 4.19.194-3 |  | kernel: KVM: x86/mmu: make apf token non-zero to fix bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48943 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 18:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48948 | 高危 | 4.19.194-3 |  | kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48950 | 高危 | 4.19.194-3 |  | kernel: perf: Fix perf_pending_task() UaF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48951 | 高危 | 4.19.194-3 |  | kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48954 | 高危 | 4.19.194-3 |  | kernel: s390/qeth: fix use-after-free in hsci 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:57 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48956 | 高危 | 4.19.194-3 |  | kernel: ipv6: avoid use-after-free in ip6_fragment() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48956 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48960 | 高危 | 4.19.194-3 |  | kernel: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48962 | 高危 | 4.19.194-3 |  | kernel: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48962 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48964 | 高危 | 4.19.194-3 |  | kernel: ravb: Fix potential use-after-free in ravb_rx_gbeth() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48966 | 高危 | 4.19.194-3 |  | kernel: net: mvneta: Prevent out of bounds read in mvneta_config_rss() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48967 | 高危 | 4.19.194-3 |  | kernel: NFC: nci: Bounds check struct nfc_target arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48967 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48980 | 高危 | 4.19.194-3 |  | kernel: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48980 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48981 | 高危 | 4.19.194-3 |  | kernel: drm/shmem-helper: Remove errant put in error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48988 | 高危 | 4.19.194-3 |  | kernel: memcg: fix possible use-after-free in memcg_write_event_control() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:20 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48990 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix use-after-free during gpu recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 16:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48991 | 高危 | 4.19.194-3 |  | kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48991 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48998 | 高危 | 4.19.194-3 |  | kernel: powerpc/bpf/32: Fix Oops on tail call tests 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48999 | 高危 | 4.19.194-3 |  | kernel: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-31 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49001 | 高危 | 4.19.194-3 |  | kernel: riscv: fix race when vmap stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-30 18:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49006 | 高危 | 4.19.194-3 |  | kernel: tracing: Free buffers when a used dynamic event is removed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49014 | 高危 | 4.19.194-3 |  | kernel: net: tun: Fix use-after-free in tun_detach() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49015 | 高危 | 4.19.194-3 |  | kernel: net: hsr: Fix potential use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49017 | 高危 | 4.19.194-3 |  | kernel: tipc: re-fetch skb cb after tipc_msg_validate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49017 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49022 | 高危 | 4.19.194-3 |  | kernel: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49023 | 高危 | 4.19.194-3 |  | kernel: wifi: cfg80211: fix buffer overflow in elem comparison 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49025 | 高危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix use-after-free when reverting termination table 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49026 | 高危 | 4.19.194-3 |  | kernel: e100: Fix possible use after free in e100_xmit_prepare 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49026 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49029 | 高危 | 4.19.194-3 |  | kernel: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49030 | 高危 | 4.19.194-3 |  | kernel: libbpf: Handle size overflow for ringbuf mmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49030 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49031 | 高危 | 4.19.194-3 |  | kernel: iio: health: afe4403: Fix oob read in afe4403_read_raw 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49031 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49032 | 高危 | 4.19.194-3 |  | kernel: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0030 | 高危 | 4.19.194-3 |  | kernel: Use after Free in nvkm_vmm_pfn_map 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0030 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-08 23:15 修改: 2023-04-13 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0045 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: Bypassing Spectre-BTI User Space Mitigations 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-25 23:15 修改: 2023-08-11 19:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0266 | 高危 | 4.19.194-3 | 4.19.282-1 | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0266 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-30 14:15 修改: 2023-08-29 17:59 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0386 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: FUSE filesystem low-privileged user privileges escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-22 21:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0461 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: net/ulp: use-after-free in listening ULP sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-28 15:15 修改: 2023-06-06 19:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1077 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Type confusion in pick_next_rt_entity() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2024-01-12 17:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1078 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: Heap OOB Write in rds_rm_zerocopy_callback() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-11-05 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1118 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-02 18:15 修改: 2023-07-06 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1281 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-22 14:15 修改: 2023-06-26 16:57 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1380 | 高危 | 4.19.194-3 | 4.19.289-1 | Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-12-08 20:45 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1670 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: use after free bug in xirc2ps_detach 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1670 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 23:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1829 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1829 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-12 12:15 修改: 2023-10-05 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1838 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-05 19:15 修改: 2024-02-15 15:56 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1989 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Use after free bug in btsdio_remove due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1989 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-11 21:15 修改: 2024-08-26 13:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2007 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: DPT I2O controller TOCTOU information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 23:15 修改: 2024-02-01 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2023-20938 | 高危 | 4.19.194-3 |  | In binder_transaction_buffer_release of binder.c, there is a possible  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-28 17:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2124 | 高危 | 4.19.194-3 |  | kernel: OOB access in the Linux kernel's XFS subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2124 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-15 22:15 修改: 2024-02-01 01:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-21255 | 高危 | 4.19.194-3 |  | In multiple functions of binder.c, there is a possible memory corrupti ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-21255 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-13 00:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23559 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23559 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-13 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28466 | 高危 | 4.19.194-3 |  | kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28466 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-16 00:15 修改: 2023-11-09 13:57 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3090 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: ipvlan: out-of-bounds write caused by unclear skb->cb 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 20:15 修改: 2024-06-26 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3111 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: Use after free in prepare_to_relocate in fs/btrfs/relocation.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3111 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-05 21:15 修改: 2023-11-07 04:17 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3141 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: Use after free bug in r592_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-09 20:15 修改: 2023-11-07 04:17 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31436 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: out-of-bounds write in qfq_change_class function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31436 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-28 02:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-32233 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-08 20:15 修改: 2023-09-28 19:07 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3268 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: out-of-bounds access in relay_file_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-16 19:15 修改: 2023-11-07 04:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3390 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3390 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 21:15 修改: 2024-03-27 14:11 | 
                            
                            
                                | linux-libc-dev | CVE-2023-34319 | 高危 | 4.19.194-3 | 4.19.304-1 | xen: buffer overrun in netback due to unusual packet (XSA-432) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34319 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-22 14:15 修改: 2024-06-26 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35001 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-05 19:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3567 | 高危 | 4.19.194-3 | 4.19.282-1 | kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 16:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35788 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35788 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-16 21:15 修改: 2024-06-26 15:55 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35823 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-18 22:15 修改: 2023-11-07 04:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35824 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-18 22:15 修改: 2023-11-07 04:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35827 | 高危 | 4.19.194-3 |  | kernel: ravb: race condition leading to use-after-free in ravb_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-18 22:15 修改: 2024-01-11 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-35828 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: renesas_usb3: race condition leading to use-after-free in renesas_usb3_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-18 22:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3609 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3609 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-21 21:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3611 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-21 21:15 修改: 2024-08-22 20:25 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3776 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-21 21:15 修改: 2024-08-22 20:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3812 | 高危 | 4.19.194-3 | 4.19.269-1 | kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 16:15 修改: 2024-04-25 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39179 | 高危 | 4.19.194-3 |  | kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39179 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-18 10:15 修改: 2024-11-18 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39197 | 高危 | 4.19.194-3 |  | kernel: DCCP: conntrack out-of-bounds read in nf_conntrack_dccp_packet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 03:15 修改: 2024-08-27 19:31 | 
                            
                            
                                | linux-libc-dev | CVE-2023-40283 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40283 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-14 03:15 修改: 2024-08-26 16:08 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4206 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-02-15 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4207 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4207 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-02-05 19:55 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4208 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4208 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-02-15 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4244 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-42753 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: netfilter: potential slab-out-of-bound access due to integer underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-25 21:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4387 | 高危 | 4.19.194-3 | 4.19.249-1 | kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-16 19:15 修改: 2024-12-15 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-45871 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: IGB driver inadequate buffer size for frames larger than MTU 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-15 01:15 修改: 2024-08-27 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4622 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use after free in unix_stream_sendpage 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4623 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net/sched: sch_hfsc UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-06 14:15 修改: 2024-08-26 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2023-46838 | 高危 | 4.19.194-3 | 4.19.316-1 | Transmit requests in Xen's virtual network protocol can consist of mul ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-29 11:15 修改: 2024-08-27 19:25 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4921 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in sch_qfq network scheduler 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 20:15 修改: 2024-08-26 16:06 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51042 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 11:15 修改: 2024-10-03 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51043 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 11:15 修改: 2024-08-29 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51779 | 高危 | 4.19.194-3 |  | kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51779 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:42 修改: 2024-08-29 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51780 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in net/atm/ioctl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51780 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-11 19:15 修改: 2024-04-19 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51781 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in net/appletalk/ddp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51781 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-11 19:15 修改: 2024-01-18 19:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-51782 | 高危 | 4.19.194-3 | 4.19.304-1 | An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl i ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-11 19:15 修改: 2024-01-18 19:31 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52340 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52340 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 02:15 修改: 2024-07-08 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52434 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential OOBs in smb2_parse_contexts() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-20 18:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52436 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: f2fs: explicitly null-terminate the xattr list 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52436 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-20 21:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52439 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: uio: Fix use-after-free in uio_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52439 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-20 21:15 修改: 2024-12-27 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52444 | 高危 | 4.19.194-3 | 4.19.316-1 | In the Linux kernel, the following vulnerability has been resolved:  f ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52445 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: pvrusb2: fix use after free on context disconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52451 | 高危 | 4.19.194-3 |  | kernel: powerpc: Fix access beyond end of drmem array 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52451 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52464 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52464 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-23 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52469 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: use-after-free in kv_parse_power_table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:27 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52474 | 高危 | 4.19.194-3 |  | kernel: non-PAGE_SIZE-end multi-iovec user SDMA requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52474 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52475 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in powermate_config_complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-12-09 18:47 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52480 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix race condition between session lookup and expire 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52480 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-02-29 13:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52491 | 高危 | 4.19.194-3 |  | kernel: media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-12-12 17:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52502 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52502 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-05 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52504 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: x86/alternatives: Disable KASAN in apply_alternatives() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52504 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:05 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52507 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: nfc: nci: assert requested protocol is valid 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52509 | 高危 | 4.19.194-3 |  | kernel: ravb: Fix use-after-free issue in ravb_tx_timeout_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52510 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: ieee802154: ca8210: Fix a potential UAF in ca8210_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52510 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:11 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52515 | 高危 | 4.19.194-3 |  | kernel: RDMA/srp: Do not call scsi_done() from srp_abort() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52515 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:41 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52530 | 高危 | 4.19.194-3 |  | kernel: wifi: mac80211: fix potential key use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:26 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52531 | 高危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: Fix a memory corruption issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52531 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:28 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52572 | 高危 | 4.19.194-3 |  | kernel: cifs: use-after-free in cifs_demultiplex_thread() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52572 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:22 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52578 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: net: bridge: data races indata-races in br_handle_frame_finish() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52578 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 17:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52588 | 高危 | 4.19.194-3 |  | kernel: f2fs: fix to tag gcing flag on page during block migration 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-03-06 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52590 | 高危 | 4.19.194-3 |  | kernel: ocfs2: Avoid touching renamed directory if parent does not change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-03-06 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52594 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52594 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 15:10 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52599 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: jfs: fix array-index-out-of-bounds in diNewExt 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52600 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: jfs: fix uaf in jfs_evict_inode 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52603 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: UBSAN: array-index-out-of-bounds in dtSplitRoot 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52603 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:36 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52604 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: FS:JFS:UBSAN: array-index-out-of-bounds in dbAdjTree 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 17:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52606 | 高危 | 4.19.194-3 |  | kernel: powerpc/lib: Validate size for vector operations 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52614 | 高危 | 4.19.194-3 |  | kernel: PM / devfreq: Fix buffer overflow in trans_stat_show 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52614 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-12-12 15:20 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52628 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52628 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-28 08:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52640 | 高危 | 4.19.194-3 |  | kernel: fs/ntfs3: Fix oob in ntfs_listxattr 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52751 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix use-after-free in smb2_query_info_compound() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52752 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52755 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix slab out of bounds write in smb_inherit_dacl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-08-01 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52760 | 高危 | 4.19.194-3 |  | kernel: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52799 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52812 | 高危 | 4.19.194-3 |  | kernel: drm/amd: check num of link levels when update pcie param 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:09 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52818 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52818 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:08 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52827 | 高危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52840 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-31 19:48 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52885 | 高危 | 4.19.194-3 |  | kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52885 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-14 08:15 修改: 2024-08-21 17:03 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52906 | 高危 | 4.19.194-3 |  | kernel: net/sched: act_mpls: Fix warning during failed attribute validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:21 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52921 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-5717 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5717 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-25 18:17 修改: 2024-08-27 15:21 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6040 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6040 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-12 02:15 修改: 2024-08-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6270 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: AoE: improper reference count leads to use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6270 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-04 17:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6356 | 高危 | 4.19.194-3 |  | kernel: NULL pointer dereference in nvmet_tcp_build_iovec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-07 21:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6535 | 高危 | 4.19.194-3 |  | kernel: NULL pointer dereference in nvmet_tcp_execute_request 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6535 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-07 21:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6536 | 高危 | 4.19.194-3 |  | kernel: NULL pointer dereference in __nvmet_req_complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6536 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-07 21:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6606 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Out-Of-Bounds Read vulnerability in smbCalcSize 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-08 17:15 修改: 2024-10-25 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6931 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-19 14:15 修改: 2024-02-01 18:51 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6932 | 高危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free in IPv4 IGMP 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-19 14:15 修改: 2024-02-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0565 | 高危 | 4.19.194-3 |  | kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-15 20:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0775 | 高危 | 4.19.194-3 | 4.19.289-1 | kernel: use-after-free while changing the mount option in __ext4_remount leading 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-22 13:15 修改: 2024-01-29 19:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-1086 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-31 13:15 修改: 2024-08-14 19:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-21803 | 高危 | 4.19.194-3 |  | kernel: bluetooth: use-after-free vulnerability in af_bluetooth.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-30 08:15 修改: 2024-02-08 01:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-23307 | 高危 | 4.19.194-3 |  | kernel: Integer Overflow in raid5_cache_count 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23307 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 07:15 修改: 2024-01-31 20:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-25742 | 高危 | 4.19.194-3 |  | hw: amd: Instruction raise #VC exception at exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 22:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-25743 | 高危 | 4.19.194-3 |  | hw: amd: Instruction raise #VC exception at exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-15 18:15 修改: 2024-08-15 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26597 | 高危 | 4.19.194-3 | 4.19.316-1 | In the Linux kernel, the following vulnerability has been resolved:  n ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-23 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26598 | 高危 | 4.19.194-3 |  | kernel: kvm: Avoid potential UAF in LPI translation cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-23 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26622 | 高危 | 4.19.194-3 |  | kernel: tomoyo: fix UAF write bug in tomoyo_write_control() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 07:15 修改: 2024-12-11 17:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26625 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: llc: call sock_orphan() at release time 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26625 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26668 | 高危 | 4.19.194-3 |  | kernel: netfilter: nft_limit: reject configurations that cause integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26791 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: btrfs: dev-replace: properly validate device names 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-12-20 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26793 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26793 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-12-20 15:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26852 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26882 | 高危 | 4.19.194-3 |  | kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26882 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-12-20 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26883 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: bpf: Fix stackmap overflow check on 32-bit arches 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26883 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26884 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: bpf: Fix hashtab overflow check on 32-bit arches 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26884 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26898 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26907 | 高危 | 4.19.194-3 |  | kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26913 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-04-29 19:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26923 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: af_unix: Fix garbage collector racing against connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-25 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26929 | 高危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Fix double free of fcport 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-08-08 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26930 | 高危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26930 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-23 19:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26933 | 高危 | 4.19.194-3 |  | kernel: USB: core: Fix deadlock in port "disable" sysfs attribute 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-23 19:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26934 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: USB: core: Fix deadlock in usb_deauthorize_interface() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26952 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix potencial out-of-bounds when buffer offset is invalid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26958 | 高危 | 4.19.194-3 |  | kernel: nfs: fix UAF in direct writes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26961 | 高危 | 4.19.194-3 |  | kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26974 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: crypto: qat - resolve race condition during AER recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 14:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26981 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix OOB in nilfs_set_de_type 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 20:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26996 | 高危 | 4.19.194-3 |  | kernel: usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27020 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27024 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: net/rds: fix WARNING in rds_conn_connect_if_down 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27043 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: media: edia: dvbdev: fix a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27397 | 高危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: use timestamp to check for set element timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-08-19 05:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35847 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: irqchip/gic-v3-its: Prevent double free on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-12-30 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35861 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 14:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35862 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 15:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35863 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in is_valid_oplock_break() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 14:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35864 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 14:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35866 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in cifs_dump_full_key() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35867 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in cifs_stats_proc_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35868 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in cifs_stats_proc_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35887 | 高危 | 4.19.194-3 |  | kernel: ax25: fix use-after-free bugs caused by ax25_ds_del_timer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-31 18:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35896 | 高危 | 4.19.194-3 |  | kernel: netfilter: validate user input for expected length 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35929 | 高危 | 4.19.194-3 |  | kernel: rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-12-30 19:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36013 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-23 07:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36883 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: net: fix out-of-bounds access in ops_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36883 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36886 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: TIPC message reassembly use-after-free remote code execution vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36904 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36946 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: phonet: fix rtm_phonet_notify() skb allocation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36960 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/vmwgfx: Fix invalid reads in fence signaled events 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-03 08:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36971 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: net: kernel: UAF in network route management 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36971 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-10 09:15 修改: 2024-08-08 14:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38381 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: nfc: nci: Fix uninit-value in nci_rx_work 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38538 | 高危 | 4.19.194-3 |  | kernel: net: bridge: xmit: make sure we have at least eth header len bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38545 | 高危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix UAF for cq async event 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38552 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/amd/display: Fix potential index out of bounds in color transformation function 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 19:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38570 | 高危 | 4.19.194-3 |  | kernel: gfs2: Fix potential glock use-after-free on unmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38570 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-01 20:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38581 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu/mes: fix use-after-free issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38581 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-01 20:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38583 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix use-after-free of timer for log writer thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38583 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-01 19:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38588 | 高危 | 4.19.194-3 |  | kernel: ftrace: Fix possible use-after-free issue in ftrace_location() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38627 | 高危 | 4.19.194-3 | 4.19.316-1 | kernel: stm class: Fix a double free in stm_register_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38630 | 高危 | 4.19.194-3 |  | kernel: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39471 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: add error handle to avoid out-of-bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39471 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-09-03 18:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39479 | 高危 | 4.19.194-3 |  | kernel: drm/i915/hwmon: Get rid of devm 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39480 | 高危 | 4.19.194-3 |  | kernel: kdb: Fix buffer overflow during tab-complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39480 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-08-21 08:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39486 | 高危 | 4.19.194-3 |  | kernel: drm/drm_file: Fix pid refcounting race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39486 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-06 10:15 修改: 2024-08-22 13:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39487 | 高危 | 4.19.194-3 |  | kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39487 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-09 10:15 修改: 2024-08-21 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39494 | 高危 | 4.19.194-3 |  | kernel: ima: Fix use-after-free on a dentry's dname.name 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39495 | 高危 | 4.19.194-3 |  | kernel: greybus: Fix use-after-free bug in gb_interface_release due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-20 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39496 | 高危 | 4.19.194-3 |  | kernel: btrfs: zoned: fix use-after-free due to race with dev replace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-24 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39508 | 高危 | 4.19.194-3 |  | kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39508 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39510 | 高危 | 4.19.194-3 |  | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39510 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40899 | 高危 | 4.19.194-3 |  | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40899 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40902 | 高危 | 4.19.194-3 |  | kernel: jfs: xattr: fix buffer overflow for invalid xattr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-20 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40903 | 高危 | 4.19.194-3 |  | kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-24 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40906 | 高危 | 4.19.194-3 |  | kernel: net/mlx5: Always stop health timer during driver removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 14:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40909 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix a potential use-after-free in bpf_link_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 13:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40954 | 高危 | 4.19.194-3 |  | kernel: net: do not leave a dangling sk pointer, when socket creation fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40956 | 高危 | 4.19.194-3 |  | kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40956 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 18:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40958 | 高危 | 4.19.194-3 |  | kernel: netns: Make get_net_ns() handle zero refcount net 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40994 | 高危 | 4.19.194-3 |  | kernel: ptp: fix integer overflow in max_vclocks_store 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40994 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40996 | 高危 | 4.19.194-3 |  | kernel: bpf: Avoid splat in pskb_pull_reason 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41000 | 高危 | 4.19.194-3 |  | kernel: block/ioctl: prefer different overflow check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41011 | 高危 | 4.19.194-3 |  | kernel: drm/amdkfd: don't allow mapping the MMIO HDP page with large pages 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-18 07:15 修改: 2024-09-06 13:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41013 | 高危 | 4.19.194-3 |  | kernel: xfs: don't walk off the end of a directory data block 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41019 | 高危 | 4.19.194-3 |  | kernel: fs/ntfs3: Validate ff offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41029 | 高危 | 4.19.194-3 |  | kernel: nvmem: core: limit cell sysfs permissions to main attribute ones 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41039 | 高危 | 4.19.194-3 |  | kernel: firmware: cs_dsp: Fix overflow checking of wmfw header 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41040 | 高危 | 4.19.194-3 |  | kernel: net/sched: Fix UAF when resolving a clash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41040 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41046 | 高危 | 4.19.194-3 |  | kernel: net: ethernet: lantiq_etop: fix double free in detach 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41046 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-26 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41049 | 高危 | 4.19.194-3 |  | kernel: filelock: fix potential use-after-free in posix_lock_inode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41049 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-26 15:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41057 | 高危 | 4.19.194-3 |  | kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 13:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41058 | 高危 | 4.19.194-3 |  | kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-21 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41059 | 高危 | 4.19.194-3 |  | kernel: hfsplus: fix uninit-value in copy_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41059 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41061 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-21 19:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41070 | 高危 | 4.19.194-3 |  | kernel: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41071 | 高危 | 4.19.194-3 |  | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41073 | 高危 | 4.19.194-3 |  | kernel: nvme: avoid double free special payload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41087 | 高危 | 4.19.194-3 |  | kernel: ata: libata-core: Fix double free on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-08 18:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41090 | 高危 | 4.19.194-3 |  | kernel: virtio-net: tap: mlx5_core short frame denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41091 | 高危 | 4.19.194-3 |  | kernel: virtio-net: tun: mlx5_core short frame denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41092 | 高危 | 4.19.194-3 |  | kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41092 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41096 | 高危 | 4.19.194-3 |  | kernel: PCI/MSI: Fix UAF in msi_capability_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-09-08 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42072 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix may_goto with negative offset. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42072 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42093 | 高危 | 4.19.194-3 |  | kernel: net/dpaa2: Avoid explicit cpumask var allocation on stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42093 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-08-26 15:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42094 | 高危 | 4.19.194-3 |  | kernel: net/iucv: Avoid explicit cpumask var allocation on stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42094 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-08-27 14:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42104 | 高危 | 4.19.194-3 |  | kernel: nilfs2: add missing check for inode numbers on directory entries 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42104 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-27 14:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42108 | 高危 | 4.19.194-3 |  | kernel: net: rswitch: Avoid use-after-free in rswitch_poll() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42108 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42132 | 高危 | 4.19.194-3 |  | kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42132 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42136 | 高危 | 4.19.194-3 |  | kernel: cdrom: rearrange last_media_change check to avoid unintentional overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42136 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-16 13:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42138 | 高危 | 4.19.194-3 |  | kernel: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42147 | 高危 | 4.19.194-3 |  | kernel: crypto: hisilicon/debugfs - Fix debugfs uninit process issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42147 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42148 | 高危 | 4.19.194-3 |  | kernel: bnx2x: Fix multiple UBSAN array-index-out-of-bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42148 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-05 17:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42159 | 高危 | 4.19.194-3 |  | kernel: scsi: mpi3mr: Sanitise num_phys 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-02 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42160 | 高危 | 4.19.194-3 |  | kernel: f2fs: check validation of fault attrs in f2fs_build_fault_attr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-02 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42162 | 高危 | 4.19.194-3 |  | kernel: gve: Account for stopped queues when reading NIC stats 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42162 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-05 20:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42225 | 高危 | 4.19.194-3 |  | kernel: wifi: mt76: replace skb_put with skb_put_zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42225 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42228 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42271 | 高危 | 4.19.194-3 |  | kernel: net/iucv: fix use after free in iucv_sock_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42271 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42280 | 高危 | 4.19.194-3 |  | kernel: mISDN: Fix a use after free in hfcmulti_tx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42280 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-10 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42284 | 高危 | 4.19.194-3 |  | kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42285 | 高危 | 4.19.194-3 |  | kernel: RDMA/iwcm: Fix a use-after-free related to destroying CM IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42293 | 高危 | 4.19.194-3 |  | kernel: arm64: mm: Fix lockless walks with static and dynamic page-table folding 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42293 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42301 | 高危 | 4.19.194-3 |  | kernel: dev/parport: fix the array out-of-bounds risk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42301 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42302 | 高危 | 4.19.194-3 |  | kernel: PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42302 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42305 | 高危 | 4.19.194-3 |  | kernel: ext4: check dot and dotdot of dx_root before making dir indexed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42305 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42313 | 高危 | 4.19.194-3 |  | kernel: media: venus: fix use after free in vdec_close 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42314 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix extent map use-after-free when adding pages to compressed bio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42314 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43825 | 高危 | 4.19.194-3 |  | kernel: iio: Fix the sorting functionality in iio_gts_build_avail_time_table 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-30 13:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43839 | 高危 | 4.19.194-3 |  | kernel: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43839 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-30 21:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43842 | 高危 | 4.19.194-3 |  | kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43842 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-30 13:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43843 | 高危 | 4.19.194-3 |  | kernel: riscv, bpf: Fix out-of-bounds issue when preparing trampoline image 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-29 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43847 | 高危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix invalid memory access while processing fragmented packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-25 19:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43852 | 高危 | 4.19.194-3 |  | kernel: hwmon: (ltc2991) re-order conditions to fix off by one bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-20 19:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43858 | 高危 | 4.19.194-3 |  | kernel: jfs: Fix array-index-out-of-bounds in diFree 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 17:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43873 | 高危 | 4.19.194-3 |  | kernel: vhost/vsock: always initialize seqpacket_allow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43873 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43882 | 高危 | 4.19.194-3 |  | kernel: exec: Fix ToCToU between perm check and set-uid/gid usage 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43882 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-12-10 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43883 | 高危 | 4.19.194-3 |  | kernel: usb: vhci-hcd: Do not drop references before new references are gained 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43883 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-23 13:15 修改: 2024-08-23 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43888 | 高危 | 4.19.194-3 |  | kernel: mm: list_lru: fix UAF for memory cgroup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43888 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43900 | 高危 | 4.19.194-3 |  | kernel: media: xc2028: avoid use-after-free in load_firmware_cb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44932 | 高危 | 4.19.194-3 |  | kernel: idpf: fix UAFs when destroying the queues 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44934 | 高危 | 4.19.194-3 |  | kernel: net: bridge: mcast: wait for previous gc cycles when removing port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44940 | 高危 | 4.19.194-3 |  | kernel: fou: remove warn in gue_gro_receive on unsupported protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 12:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44941 | 高危 | 4.19.194-3 |  | kernel: f2fs: fix to cover read extent cache access with lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 12:15 修改: 2024-09-12 20:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44942 | 高危 | 4.19.194-3 |  | kernel: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 12:15 修改: 2024-08-27 16:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44945 | 高危 | 4.19.194-3 |  | kernel: netfilter: nfnetlink: Initialise extack before use in ACKs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-31 07:15 修改: 2024-09-17 11:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44949 | 高危 | 4.19.194-3 |  | kernel: parisc: fix a possible DMA corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44951 | 高危 | 4.19.194-3 |  | kernel: serial: sc16is7xx: fix TX fifo corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-09 14:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44964 | 高危 | 4.19.194-3 |  | kernel: idpf: fix memory leaks and crashes while performing a soft reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44967 | 高危 | 4.19.194-3 |  | kernel: drm/mgag200: Bind I2C lifetime to DRM device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44967 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 18:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44974 | 高危 | 4.19.194-3 |  | kernel: mptcp: pm: avoid possible UaF when selecting endp 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44977 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: Validate TA binary size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44978 | 高危 | 4.19.194-3 |  | kernel: drm/xe: Free job before xe_exec_queue_put 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-10 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44983 | 高危 | 4.19.194-3 |  | kernel: netfilter: flowtable: validate vlan header 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44983 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-10 16:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44985 | 高危 | 4.19.194-3 |  | kernel: ipv6: prevent possible UAF in ip6_xmit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44986 | 高危 | 4.19.194-3 |  | kernel: ipv6: fix possible UAF in ip6_finish_output2() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44986 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44987 | 高危 | 4.19.194-3 |  | kernel: ipv6: prevent UAF in ip6_send_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44993 | 高危 | 4.19.194-3 |  | kernel: drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()` 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44993 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44997 | 高危 | 4.19.194-3 |  | kernel: net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44998 | 高危 | 4.19.194-3 |  | kernel: atm: idt77252: prevent use after free in dequeue_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44999 | 高危 | 4.19.194-3 |  | kernel: gtp: pull network headers in gtp_dev_xmit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45023 | 高危 | 4.19.194-3 |  | kernel: md/raid1: Fix data corruption for degraded array with slow disk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45026 | 高危 | 4.19.194-3 |  | kernel: s390/dasd: fix error recovery leading to data corruption on ESE devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45026 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46673 | 高危 | 4.19.194-3 |  | kernel: scsi: aacraid: Fix double-free on probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46674 | 高危 | 4.19.194-3 |  | kernel: usb: dwc3: st: fix probed platform device ref count on probe error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46683 | 高危 | 4.19.194-3 |  | kernel: drm/xe: prevent UAF around preempt fence 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46683 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46687 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-14 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46696 | 高危 | 4.19.194-3 |  | kernel: nfsd: fix potential UAF in nfsd4_cb_getattr_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46699 | 高危 | 4.19.194-3 |  | kernel: drm/v3d: Disable preemption while updating GPU stats 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46700 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu/mes: fix mes ring buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46722 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix mc_data out-of-bounds read warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46722 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46723 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix ucode out-of-bounds read warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46723 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46724 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46725 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix out-of-bounds write warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46725 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46731 | 高危 | 4.19.194-3 |  | kernel: drm/amd/pm: fix the Out-of-bounds read warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46731 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-26 13:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46738 | 高危 | 4.19.194-3 |  | kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46740 | 高危 | 4.19.194-3 |  | kernel: binder: fix UAF caused by offsets overwrite 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46741 | 高危 | 4.19.194-3 |  | kernel: misc: fastrpc: Fix double free of 'buf' in error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46743 | 高危 | 4.19.194-3 |  | kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46744 | 高危 | 4.19.194-3 |  | kernel: Squashfs: sanity check symbolic link size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46746 | 高危 | 4.19.194-3 |  | kernel: HID: amd_sfh: free driver_data after destroying hid device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46746 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-26 12:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46747 | 高危 | 4.19.194-3 |  | kernel: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46756 | 高危 | 4.19.194-3 |  | kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46757 | 高危 | 4.19.194-3 |  | kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46758 | 高危 | 4.19.194-3 |  | kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46759 | 高危 | 4.19.194-3 |  | kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46766 | 高危 | 4.19.194-3 |  | kernel: ice: move netif_queue_set_napi to rtnl-protected sections 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46774 | 高危 | 4.19.194-3 |  | kernel: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46782 | 高危 | 4.19.194-3 |  | kernel: ila: call nf_unregister_net_hooks() sooner 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46786 | 高危 | 4.19.194-3 |  | kernel: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46786 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-26 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46796 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix double put of @cfile in smb2_set_path_size() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46798 | 高危 | 4.19.194-3 |  | kernel: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46798 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46800 | 高危 | 4.19.194-3 |  | kernel: sch/netem: fix use after free in netem_dequeue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46804 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Add array index check for hdcp ddc access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46811 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46811 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-07 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46812 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 20:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46813 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Check link_index before accessing dc->links[] 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46814 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Check msg_id before processing transcation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46814 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46815 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 18:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46818 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Check gpio_id before used as array index 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46818 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46820 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46820 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46821 | 高危 | 4.19.194-3 |  | kernel: drm/amd/pm: Fix negative array index read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46821 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46828 | 高危 | 4.19.194-3 |  | kernel: sched: sch_cake: fix bulk flow accounting logic for host fairness 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-09-30 12:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46831 | 高危 | 4.19.194-3 |  | kernel: net: microchip: vcap: Fix use-after-free error in kunit test 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46831 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46833 | 高危 | 4.19.194-3 |  | kernel: net: hns3: void array out of bound when loop tnl_num 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46833 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46836 | 高危 | 4.19.194-3 |  | kernel: usb: gadget: aspeed_udc: validate endpoint index for ast udc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46836 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46844 | 高危 | 4.19.194-3 |  | kernel: um: line: always fill *error_out in setup_one_line() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46845 | 高危 | 4.19.194-3 |  | kernel: tracing/timerlat: Only clear timer if a kthread exists 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46849 | 高危 | 4.19.194-3 |  | kernel: ASoC: meson: axg-card: fix 'use-after-free' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46852 | 高危 | 4.19.194-3 |  | kernel: dma-buf: heaps: Fix off-by-one in CMA heap fault handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46853 | 高危 | 4.19.194-3 |  | kernel: spi: nxp-fspi: fix the KASAN report out-of-bounds bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46854 | 高危 | 4.19.194-3 |  | kernel: net: dpaa: Pad packets to ETH_ZLEN 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46858 | 高危 | 4.19.194-3 |  | kernel: mptcp: pm: Fix uaf in __timer_delete_sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46859 | 高危 | 4.19.194-3 |  | kernel: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46865 | 高危 | 4.19.194-3 |  | kernel: fou: fix initialization of grc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46871 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47659 | 高危 | 4.19.194-3 |  | kernel: smack: tcp: ipv4, fix incorrect labeling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 14:15 修改: 2024-10-23 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47670 | 高危 | 4.19.194-3 |  | kernel: ocfs2: add bounds checking to ocfs2_xattr_find_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47670 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47675 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47676 | 高危 | 4.19.194-3 |  | kernel: mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-22 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47682 | 高危 | 4.19.194-3 |  | kernel: scsi: sd: Fix off-by-one error in sd_read_block_characteristics() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47682 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 14:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47686 | 高危 | 4.19.194-3 |  | kernel: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 15:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47691 | 高危 | 4.19.194-3 |  | kernel: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 20:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47695 | 高危 | 4.19.194-3 |  | kernel: RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 21:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47696 | 高危 | 4.19.194-3 |  | kernel: RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47697 | 高危 | 4.19.194-3 |  | kernel: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47698 | 高危 | 4.19.194-3 |  | kernel: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47701 | 高危 | 4.19.194-3 |  | kernel: ext4: avoid OOB when system.data xattr changes underneath the filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47711 | 高危 | 4.19.194-3 |  | kernel: af_unix: Don't return OOB skb in manage_oob(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47718 | 高危 | 4.19.194-3 |  | kernel: wifi: rtw88: always wait for both firmware loading attempts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47718 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47719 | 高危 | 4.19.194-3 |  | kernel: iommufd: Protect against overflow of ALIGN() during iova allocation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47719 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47721 | 高危 | 4.19.194-3 |  | kernel: wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47721 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 20:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47723 | 高危 | 4.19.194-3 |  | kernel: jfs: fix out-of-bounds in dbNextAG() and diAlloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47723 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47727 | 高危 | 4.19.194-3 |  | kernel: x86/tdx: Fix "in-kernel MMIO" check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 20:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47730 | 高危 | 4.19.194-3 |  | kernel: crypto: hisilicon/qm - inject error before stopping queue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47730 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47741 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix race setting file private on concurrent lseek using same fd 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 22:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47742 | 高危 | 4.19.194-3 |  | kernel: firmware_loader: Block path traversal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47745 | 高危 | 4.19.194-3 |  | kernel: mm: call the security_mmap_file() LSM hook in remap_file_pages() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47747 | 高危 | 4.19.194-3 |  | kernel: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47748 | 高危 | 4.19.194-3 |  | kernel: vhost_vdpa: assign irq bypass producer token correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47748 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47750 | 高危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47751 | 高危 | 4.19.194-3 |  | kernel: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47757 | 高危 | 4.19.194-3 |  | kernel: nilfs2: fix potential oob read in nilfs_btree_check_delete() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49852 | 高危 | 4.19.194-3 |  | kernel: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49853 | 高危 | 4.19.194-3 |  | kernel: firmware: arm_scmi: Fix double free in OPTEE transport 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49854 | 高危 | 4.19.194-3 |  | kernel: block, bfq: fix uaf for accessing waker_bfqq after splitting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49855 | 高危 | 4.19.194-3 |  | kernel: nbd: fix race between timeout and normal completion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49860 | 高危 | 4.19.194-3 |  | kernel: ACPI: sysfs: validate return type of _STR method 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49860 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49861 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix helper writes to read-only maps 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49862 | 高危 | 4.19.194-3 |  | kernel: powercap: intel_rapl: Fix off by one in get_rpi() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49865 | 高危 | 4.19.194-3 |  | kernel: drm/xe/vm: move xa_alloc to prevent UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49869 | 高危 | 4.19.194-3 |  | kernel: btrfs: send: fix buffer overflow detection when copying path to cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49874 | 高危 | 4.19.194-3 |  | kernel: i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49874 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49876 | 高危 | 4.19.194-3 |  | kernel: drm/xe: fix UAF around queue destruction 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 19:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49880 | 高危 | 4.19.194-3 |  | kernel: ext4: fix off by one issue in alloc_flex_gd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49882 | 高危 | 4.19.194-3 |  | kernel: ext4: fix double brelse() the buffer of the extents path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49882 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49883 | 高危 | 4.19.194-3 |  | kernel: ext4: aovid use-after-free in ext4_ext_insert_extent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49883 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49884 | 高危 | 4.19.194-3 |  | kernel: ext4: fix slab-use-after-free in ext4_split_extent_at() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49884 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49889 | 高危 | 4.19.194-3 |  | kernel: ext4: avoid use-after-free in ext4_ext_show_leaf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49889 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49894 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix index out of bounds in degamma hardware format translation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49895 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49895 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49900 | 高危 | 4.19.194-3 |  | kernel: jfs: Fix uninit-value access of new_ea in ea_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49903 | 高危 | 4.19.194-3 |  | kernel: jfs: Fix uaf in dbFreeBits 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49924 | 高危 | 4.19.194-3 |  | kernel: fbdev: pxafb: Fix possible use after free in pxafb_task() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49928 | 高危 | 4.19.194-3 |  | kernel: wifi: rtw89: avoid reading out of bounds when loading TX power FW elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49930 | 高危 | 4.19.194-3 |  | kernel: wifi: ath11k: fix array out-of-bound access in SoC stats 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49930 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49931 | 高危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix array out-of-bound access in SoC stats 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49936 | 高危 | 4.19.194-3 |  | kernel: net/xen-netback: prevent UAF in xenvif_flush_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49950 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: Fix uaf in l2cap_connect 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49960 | 高危 | 4.19.194-3 |  | kernel: ext4: fix timer use-after-free on failed mount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49966 | 高危 | 4.19.194-3 |  | kernel: ocfs2: cancel dqi_sync_work before freeing oinfo 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49967 | 高危 | 4.19.194-3 |  | kernel: ext4: no need to continue when the number of entries is 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49967 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49969 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix index out of bounds in DCN30 color transformation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49981 | 高危 | 4.19.194-3 |  | kernel: media: venus: fix use after free bug in venus_remove due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49982 | 高危 | 4.19.194-3 |  | kernel: aoe: fix the potential use-after-free problem in more places 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49983 | 高危 | 4.19.194-3 |  | kernel: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49983 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-29 16:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49984 | 高危 | 4.19.194-3 |  | kernel: drm/v3d: Prevent out of bounds access in performance query extensions 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49986 | 高危 | 4.19.194-3 |  | kernel: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49986 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49989 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: fix double free issue during amdgpu module unload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49989 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 20:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49991 | 高危 | 4.19.194-3 |  | kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49991 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49992 | 高危 | 4.19.194-3 |  | kernel: drm/stm: Avoid use-after-free issues with crtc and plane 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49992 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49995 | 高危 | 4.19.194-3 |  | kernel: tipc: guard against string buffer overrun 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49995 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49996 | 高危 | 4.19.194-3 |  | kernel: cifs: Fix buffer overflow when parsing NFS reparse points 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49997 | 高危 | 4.19.194-3 |  | kernel: net: ethernet: lantiq_etop: fix memory disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50005 | 高危 | 4.19.194-3 |  | kernel: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50005 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-07 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50007 | 高危 | 4.19.194-3 |  | kernel: ALSA: asihpi: Fix potential OOB array access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50029 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50030 | 高危 | 4.19.194-3 |  | kernel: drm/xe/ct: prevent UAF in send_recv() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50030 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50033 | 高危 | 4.19.194-3 |  | kernel: slip: make slhc_remember() more robust against malicious packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50033 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50035 | 高危 | 4.19.194-3 |  | kernel: ppp: fix ppp_async_encode() illegal access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50035 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50036 | 高危 | 4.19.194-3 |  | kernel: net: do not delay dst_entries_add() in dst_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50036 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50042 | 高危 | 4.19.194-3 |  | kernel: ice: Fix increasing MSI-X on VF 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-22 17:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50043 | 高危 | 4.19.194-3 |  | kernel: nfsd: fix possible badness in FREE_STATEID 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50047 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix UAF in async decryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50047 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 22:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50055 | 高危 | 4.19.194-3 |  | kernel: driver core: bus: Fix double free in driver API bus_register() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50055 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50059 | 高危 | 4.19.194-3 |  | kernel: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50059 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50061 | 高危 | 4.19.194-3 |  | kernel: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 21:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50063 | 高危 | 4.19.194-3 |  | kernel: bpf: Prevent tail call between progs attached to different hooks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-22 17:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50066 | 高危 | 4.19.194-3 |  | kernel: mm/mremap: fix move_normal_pmd/retract_page_tables race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50066 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-23 06:15 修改: 2024-11-25 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50067 | 高危 | 4.19.194-3 |  | kernel: uprobe: avoid out-of-bounds memory access of fetching args 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50067 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-28 01:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50071 | 高危 | 4.19.194-3 |  | kernel: pinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 17:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50073 | 高危 | 4.19.194-3 |  | kernel: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50074 | 高危 | 4.19.194-3 |  | kernel: parport: Proper fix for array out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50083 | 高危 | 4.19.194-3 |  | kernel: tcp: fix mptcp DSS corruption due to large pmtu xmit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50086 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix user-after-free from session log off 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50088 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix uninitialized pointer free in add_inode_ref() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-01 16:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50106 | 高危 | 4.19.194-3 |  | kernel: nfsd: fix race between laundromat and free_stateid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50106 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50112 | 高危 | 4.19.194-3 |  | kernel: x86/lam: Disable ADDRESS_MASKING in most cases 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50112 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 20:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50114 | 高危 | 4.19.194-3 |  | kernel: KVM: arm64: Unregister redistributor for failed vCPU creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50114 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50115 | 高危 | 4.19.194-3 |  | kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50121 | 高危 | 4.19.194-3 |  | kernel: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50121 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50123 | 高危 | 4.19.194-3 |  | kernel: bpf: Add the missing BPF_LINK_TYPE invocation for sockmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50123 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 20:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50124 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: ISO: Fix UAF on iso_sock_timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50124 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50125 | 高危 | 4.19.194-3 |  | kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50125 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50126 | 高危 | 4.19.194-3 |  | kernel: net: sched: use RCU read-side critical section in taprio_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50127 | 高危 | 4.19.194-3 |  | kernel: net: sched: fix use-after-free in taprio_change() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50127 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50128 | 高危 | 4.19.194-3 |  | kernel: net: wwan: fix global oob in wwan_rtnl_policy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50128 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 19:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50129 | 高危 | 4.19.194-3 |  | kernel: net: pse-pd: Fix out of bound for loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-07 21:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50130 | 高危 | 4.19.194-3 |  | kernel: netfilter: bpf: must hold reference on net namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50130 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-07 21:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50131 | 高危 | 4.19.194-3 |  | kernel: tracing: Consider the NULL character when validating the event length 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50131 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50143 | 高危 | 4.19.194-3 |  | kernel: udf: fix uninit-value use in udf_get_fileshortad 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-15 22:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50150 | 高危 | 4.19.194-3 |  | kernel: usb: typec: altmode should keep reference to parent 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50150 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 17:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50151 | 高危 | 4.19.194-3 |  | kernel: smb: client: fix OOBs when building SMB2_IOCTL request 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 17:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50154 | 高危 | 4.19.194-3 |  | kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50154 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50155 | 高危 | 4.19.194-3 |  | kernel: netdevsim: use cond_resched() in nsim_dev_trap_report_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 14:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50158 | 高危 | 4.19.194-3 |  | kernel: RDMA/bnxt_re: Fix out of bound check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50158 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 20:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50159 | 高危 | 4.19.194-3 |  | kernel: firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-19 02:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50164 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix overloading of MEM_UNINIT's meaning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50180 | 高危 | 4.19.194-3 |  | kernel: fbdev: sisfb: Fix strbuf array overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50186 | 高危 | 4.19.194-3 |  | kernel: net: explicitly clear the sk pointer, when pf->create fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50186 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-09 23:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50193 | 高危 | 4.19.194-3 |  | kernel: x86/entry_32: Clear CPU buffers after register restore in NMI return 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50203 | 高危 | 4.19.194-3 |  | kernel: bpf, arm64: Fix address emission with tag-based KASAN enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50203 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50209 | 高危 | 4.19.194-3 |  | kernel: RDMA/bnxt_re: Add a check for memory allocation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-18 19:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50215 | 高危 | 4.19.194-3 |  | kernel: nvmet-auth: assign dh_key to NULL after kfree_sensitive 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50215 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50217 | 高危 | 4.19.194-3 |  | kernel: btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50221 | 高危 | 4.19.194-3 |  | kernel: drm/amd/pm: Vangogh: Fix kernel memory out of bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50221 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50222 | 高危 | 4.19.194-3 |  | kernel: iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 19:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50226 | 高危 | 4.19.194-3 |  | kernel: cxl/port: Fix use-after-free, permit out-of-order decoder shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50226 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50227 | 高危 | 4.19.194-3 |  | kernel: thunderbolt: Fix KASAN reported stack out-of-bounds read in tb_retimer_scan() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50227 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50230 | 高危 | 4.19.194-3 |  | kernel: nilfs2: fix kernel bug due to missing clearing of checked flag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50230 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50234 | 高危 | 4.19.194-3 |  | kernel: wifi: iwlegacy: Clear stale interrupts before resuming device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50234 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 02:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50235 | 高危 | 4.19.194-3 |  | kernel: wifi: cfg80211: clear wdev->cqm_config pointer on free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 02:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50242 | 高危 | 4.19.194-3 |  | kernel: fs/ntfs3: Additional check in ntfs_file_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50242 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50246 | 高危 | 4.19.194-3 |  | kernel: fs/ntfs3: Add rough attr alloc_size check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50247 | 高危 | 4.19.194-3 |  | kernel: fs/ntfs3: Check if more than chunk-size bytes are written 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50247 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50250 | 高危 | 4.19.194-3 |  | kernel: fsdax: dax_unshare_iter needs to copy entire blocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 17:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50257 | 高危 | 4.19.194-3 |  | kernel: netfilter: Fix use-after-free in get_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50257 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50261 | 高危 | 4.19.194-3 |  | kernel: macsec: Fix use-after-free while sending the offloading packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50261 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50262 | 高危 | 4.19.194-3 |  | kernel: bpf: Fix out-of-bounds write in trie_get_next_key() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50262 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-11 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50264 | 高危 | 4.19.194-3 |  | kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50264 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50267 | 高危 | 4.19.194-3 |  | kernel: USB: serial: io_edgeport: fix use after free in debug printk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50268 | 高危 | 4.19.194-3 |  | kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-22 22:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50269 | 高危 | 4.19.194-3 |  | kernel: usb: musb: sunxi: Fix accessing an released usb phy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-26 22:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50274 | 高危 | 4.19.194-3 |  | kernel: idpf: avoid vport access in idpf_get_link_ksettings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50274 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50275 | 高危 | 4.19.194-3 |  | kernel: arm64/sve: Discard stale CPU state when handling SVE traps 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50276 | 高危 | 4.19.194-3 |  | kernel: net: vertexcom: mse102x: Fix possible double free of TX skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50276 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50278 | 高危 | 4.19.194-3 |  | kernel: dm cache: fix potential out-of-bounds access on the first resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50278 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50279 | 高危 | 4.19.194-3 |  | kernel: dm cache: fix out-of-bounds access to the dirty bitset when resizing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50279 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50282 | 高危 | 4.19.194-3 |  | kernel: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50282 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 21:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50283 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50283 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50286 | 高危 | 4.19.194-3 |  | kernel: ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50286 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 21:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50301 | 高危 | 4.19.194-3 |  | kernel: security/keys: fix slab-out-of-bounds in key_task_permission 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50301 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53057 | 高危 | 4.19.194-3 |  | kernel: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53059 | 高危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53059 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-03 20:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53061 | 高危 | 4.19.194-3 |  | kernel: media: s5p-jpeg: prevent buffer overflows 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53062 | 高危 | 4.19.194-3 |  | kernel: media: mgb4: protect driver against spectre 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53068 | 高危 | 4.19.194-3 |  | kernel: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53082 | 高危 | 4.19.194-3 |  | kernel: virtio_net: Add hash_key_length check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53098 | 高危 | 4.19.194-3 |  | kernel: drm/xe/ufence: Prefetch ufence addr to catch bogus address 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53098 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2024-12-24 15:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53099 | 高危 | 4.19.194-3 |  | kernel: bpf: Check validity of link->type in bpf_link_show_fdinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53099 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53108 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Adjust VSDB parser for replay feature 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53108 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-12 16:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53126 | 高危 | 4.19.194-3 |  | kernel: vdpa: solidrun: Fix UB bug with devres 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 17:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53133 | 高危 | 4.19.194-3 |  | kernel: drm/amd/display: Handle dml allocation failure to avoid crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53133 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 17:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53139 | 高危 | 4.19.194-3 |  | kernel: sctp: fix possible UAF in sctp_v6_available() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53139 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 16:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53141 | 高危 | 4.19.194-3 |  | kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-06 10:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53142 | 高危 | 4.19.194-3 |  | kernel: initramfs: avoid filename buffer overrun 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-06 10:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53156 | 高危 | 4.19.194-3 |  | kernel: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53156 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53206 | 高危 | 4.19.194-3 |  | kernel: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53229 | 高危 | 4.19.194-3 |  | kernel: RDMA/rxe: Fix the qp flush warnings in req 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53229 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56642 | 高危 | 4.19.194-3 |  | kernel: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-8805 | 高危 | 4.19.194-3 |  | BlueZ HID over GATT Profile Improper Access Control Remote Code Execut ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-22 21:15 修改: 2024-12-20 18:05 | 
                            
                            
                                | mariadb-common | CVE-2021-2389 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | mariadb-common | CVE-2021-46669 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2022-24048 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | mariadb-common | CVE-2022-24050 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of validating the existence of an object prior to performing operations on the object 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | mariadb-common | CVE-2022-24051 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | mariadb-common | CVE-2022-24052 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: CONNECT storage engine heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | mariadb-common | CVE-2022-27376 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in Item_args::walk_arg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | mariadb-common | CVE-2022-27377 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison when complex conversion is involved in blob 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08 | 
                            
                            
                                | mariadb-common | CVE-2022-27378 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in create_tmp_table::finalize 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17 | 
                            
                            
                                | mariadb-common | CVE-2022-27379 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in component arg_comparator::compare_real_fixed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19 | 
                            
                            
                                | mariadb-common | CVE-2022-27380 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at my_decimal::operator= 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32 | 
                            
                            
                                | mariadb-common | CVE-2022-27381 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Field::set_default via specially crafted SQL statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27 | 
                            
                            
                                | mariadb-common | CVE-2022-27383 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28 | 
                            
                            
                                | mariadb-common | CVE-2022-27384 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash via component Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | mariadb-common | CVE-2022-27386 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26 | 
                            
                            
                                | mariadb-common | CVE-2022-27387 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failures in decimal_bin_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22 | 
                            
                            
                                | mariadb-common | CVE-2022-27445 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in compare_order_elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | mariadb-common | CVE-2022-27447 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: use-after-poison in Binary_string::free_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12 | 
                            
                            
                                | mariadb-common | CVE-2022-27448 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: crash in multi-update and implicit grouping 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15 | 
                            
                            
                                | mariadb-common | CVE-2022-27449 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_func.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59 | 
                            
                            
                                | mariadb-common | CVE-2022-27452 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in sql/item_cmpfunc.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33 | 
                            
                            
                                | mariadb-common | CVE-2022-27456 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09 | 
                            
                            
                                | mariadb-common | CVE-2022-32083 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash at Item_subselect::init_expr_cache_tracker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-25 19:48 | 
                            
                            
                                | mariadb-common | CVE-2022-32084 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault via the component sub_select 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | mariadb-common | CVE-2022-32085 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | mariadb-common | CVE-2022-32087 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in Item_args::walk_args 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:26 | 
                            
                            
                                | mariadb-common | CVE-2022-32088 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2022-10-26 22:27 | 
                            
                            
                                | mariadb-common | CVE-2022-32091 | 高危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: server crash in JOIN_CACHE::free or in copy_fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | mount | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | ncurses-base | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | ncurses-base | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | ncurses-base | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | ncurses-bin | CVE-2021-39537 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | ncurses-bin | CVE-2022-29458 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u3 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | ncurses-bin | CVE-2023-29491 | 高危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-32546 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | openssh-client | CVE-2021-41617 | 高危 | 1:7.9p1-10+deb10u2 | 1:7.9p1-10+deb10u4 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-client | CVE-2024-6387 | 高危 | 1:7.9p1-10+deb10u2 |  | openssh: regreSSHion - race condition in SSH allows RCE/DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6387 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-07-01 13:15 修改: 2024-09-14 03:15 | 
                            
                            
                                | perl | CVE-2020-16156 | 高危 | 5.28.1-6+deb10u1 |  | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl | CVE-2023-31484 | 高危 | 5.28.1-6+deb10u1 |  | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-base | CVE-2020-16156 | 高危 | 5.28.1-6+deb10u1 |  | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-base | CVE-2023-31484 | 高危 | 5.28.1-6+deb10u1 |  | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-modules-5.28 | CVE-2020-16156 | 高危 | 5.28.1-6+deb10u1 |  | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-modules-5.28 | CVE-2023-31484 | 高危 | 5.28.1-6+deb10u1 |  | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-32547 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: load of misaligned address at MagickCore/property.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-16 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-48541 | 高危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u7 | ImageMagick: memory leak in identify -help 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-03-15 17:26 | 
                            
                            
                                | python2.7 | CVE-2015-20107 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python2.7 | CVE-2019-20907 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: infinite loop in the tarfile module via crafted TAR archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-07-13 13:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | python2.7 | CVE-2020-10735 | 高危 | 2.7.16-2+deb10u1 |  | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7 | CVE-2020-26116 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CRLF injection via HTTP request method in httplib/http.client 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-09-27 04:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | python2.7 | CVE-2021-3737 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python2.7 | CVE-2022-0391 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python2.7 | CVE-2022-45061 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python2.7 | CVE-2022-48560 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | python2.7 | CVE-2023-24329 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python2.7 | CVE-2024-6232 | 高危 | 2.7.16-2+deb10u1 |  | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | curl | CVE-2023-27533 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | krb5-multidev | CVE-2021-36222 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u2 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | python2.7-minimal | CVE-2015-20107 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python2.7-minimal | CVE-2019-20907 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: infinite loop in the tarfile module via crafted TAR archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20907 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-07-13 13:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | python2.7-minimal | CVE-2020-10735 | 高危 | 2.7.16-2+deb10u1 |  | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7-minimal | CVE-2020-26116 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CRLF injection via HTTP request method in httplib/http.client 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-09-27 04:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | python2.7-minimal | CVE-2021-3737 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python2.7-minimal | CVE-2022-0391 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python2.7-minimal | CVE-2022-45061 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python2.7-minimal | CVE-2022-48560 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | python2.7-minimal | CVE-2023-24329 | 高危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python2.7-minimal | CVE-2024-6232 | 高危 | 2.7.16-2+deb10u1 |  | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | krb5-multidev | CVE-2022-42898 | 高危 | 1.17-3+deb10u1 | 1.17-3+deb10u5 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | krb5-multidev | CVE-2024-37370 | 高危 | 1.17-3+deb10u1 |  | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | python3.7 | CVE-2015-20107 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3.7 | CVE-2020-10735 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7 | CVE-2021-3737 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.7 | CVE-2022-0391 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python3.7 | CVE-2022-42919 | 高危 | 3.7.3-2+deb10u3 |  | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | python3.7 | CVE-2022-45061 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.7 | CVE-2022-48560 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | python3.7 | CVE-2023-24329 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python3.7 | CVE-2023-6597 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libasan5 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libasan5 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | python3.7-minimal | CVE-2015-20107 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3.7-minimal | CVE-2020-10735 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7-minimal | CVE-2021-3737 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.7-minimal | CVE-2022-0391 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python3.7-minimal | CVE-2022-42919 | 高危 | 3.7.3-2+deb10u3 |  | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | python3.7-minimal | CVE-2022-45061 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.7-minimal | CVE-2022-48560 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: use after free in heappushpop() of heapq module 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-08 03:15 | 
                            
                            
                                | python3.7-minimal | CVE-2023-24329 | 高危 | 3.7.3-2+deb10u3 |  | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python3.7-minimal | CVE-2023-6597 | 高危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | subversion | CVE-2022-24070 | 高危 | 1.10.4-1+deb10u2 | 1.10.4-1+deb10u3 | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24070 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | util-linux | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | uuid-dev | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libatomic1 | CVE-2018-12886 | 高危 | 8.3.0-6 |  | gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | xz-utils | CVE-2022-1271 | 高危 | 5.2.4-1 | 5.2.4-1+deb10u1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | libatomic1 | CVE-2019-15847 | 高危 | 8.3.0-6 |  | gcc: POWER9 "DARN" RNG intrinsic produces repeated output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38 | 
                            
                            
                                | libblkid-dev | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | zlib1g | CVE-2018-25032 | 高危 | 1:1.2.11.dfsg-1 | 1:1.2.11.dfsg-1+deb10u1 | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56 | 
                            
                            
                                | libblkid1 | CVE-2024-28085 | 高危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | curl | CVE-2023-27534 | 高危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u9 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | zlib1g-dev | CVE-2018-25032 | 高危 | 1:1.2.11.dfsg-1 | 1:1.2.11.dfsg-1+deb10u1 | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56 | 
                            
                            
                                | libtiff5 | CVE-2023-40745 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: integer overflow in tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-09-16 17:15 | 
                            
                            
                                | libtiff5 | CVE-2023-41175 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: potential integer overflow in raw2tiff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41175 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-12-04 08:15 | 
                            
                            
                                | libtiff5 | CVE-2023-6277 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Out-of-memory in TIFFOpen via a craft file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-24 19:15 修改: 2024-09-17 01:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libtiffxx5 | CVE-2020-19143 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u3 | libtiff: buffer overflow in TIFFVGetField() in libtiff/tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-09 15:15 修改: 2021-11-30 19:38 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0561 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0561 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0562 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0562 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0865 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: reachable assertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0907 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: NULL Pointer Dereference in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0909 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Divide By Zero error in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-0924 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Out-of-bounds Read error in tiffcp 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiffxx5 | CVE-2022-1354 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1354 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:50 | 
                            
                            
                                | libtiffxx5 | CVE-2022-1355 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: stack-buffer-overflow in tiffcp.c in main() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:52 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2056 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2057 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2058 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiffxx5 | CVE-2022-22844 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-11-16 19:07 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2867 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2868 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2869 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiffxx5 | CVE-2022-34526 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34526 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-29 23:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3570 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap Buffer overflows in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3570 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:02 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3597 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:04 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3598 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:05 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3599 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:06 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3626 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3626 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:06 | 
                            
                            
                                | libtiffxx5 | CVE-2022-3627 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:07 | 
                            
                            
                                | libtiffxx5 | CVE-2022-40090 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: infinite loop via a crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:13 | 
                            
                            
                                | libtiffxx5 | CVE-2022-4645 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | libtiffxx5 | CVE-2022-48281 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u6 | libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-23 03:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0795 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0795 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0796 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0797 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0797 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0798 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0798 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0799 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0800 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0801 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0802 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0803 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiffxx5 | CVE-2023-0804 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01 | 
                            
                            
                                | libtiffxx5 | CVE-2023-25433 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25433 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-25435 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: tiffcrop: heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-21 20:15 修改: 2024-12-06 20:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-26965 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 21:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-26966 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow in uv_encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-2908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: null pointer dereference in tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-30 22:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | libtiffxx5 | CVE-2023-30086 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Heap buffer overflow in tiffcp() at tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-09 16:15 修改: 2023-06-16 15:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-30774 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2024-01-09 02:51 | 
                            
                            
                                | libtiffxx5 | CVE-2023-3316 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: tiffcrop: null pointer dereference in TIFFClose() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3316 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-19 12:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-3576 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: memory leak in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-04 19:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-3618 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: segmentation fault in Fax3Encode in libtiff/tif_fax3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-12 15:15 修改: 2024-03-23 11:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-40745 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: integer overflow in tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-09-16 17:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-41175 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: potential integer overflow in raw2tiff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41175 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-12-04 08:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-6277 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Out-of-memory in TIFFOpen via a craft file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-24 19:15 修改: 2024-09-17 01:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | iproute2 | CVE-2019-20795 | 中危 | 4.20.0-2+deb10u1 |  | iproute: use-after-free in get_netnsid_from_name in ip/ipnetns.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20795 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-05-09 21:15 修改: 2020-09-10 17:50 | 
                            
                            
                                | curl | CVE-2022-27776 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libtinfo6 | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libtinfo6 | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | fdisk | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | curl | CVE-2022-32206 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22947 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-27774 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-27776 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-32206 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-32208 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-43552 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-23916 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libudev1 | CVE-2021-3997 | 中危 | 241-7~deb10u8 |  | systemd: Uncontrolled recursion in systemd-tmpfiles when removing files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | libudev1 | CVE-2022-3821 | 中危 | 241-7~deb10u8 | 241-7~deb10u10 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libudev1 | CVE-2022-4415 | 中危 | 241-7~deb10u8 |  | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libudev1 | CVE-2023-7008 | 中危 | 241-7~deb10u8 |  | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-27535 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libunbound8 | CVE-2020-28935 | 中危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u3 | unbound: symbolic link traversal when writing PID file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-07 22:15 修改: 2023-03-29 15:15 | 
                            
                            
                                | libunbound8 | CVE-2022-30698 | 中危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u3 | unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 15:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libunbound8 | CVE-2022-30699 | 中危 | 1.9.0-2+deb10u2 | 1.9.0-2+deb10u3 | unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-01 15:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libunbound8 | CVE-2024-8508 | 中危 | 1.9.0-2+deb10u2 |  | unbound: Unbounded name compression could lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8508 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-03 17:15 修改: 2024-12-17 19:28 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libuuid1 | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libx11-6 | CVE-2023-43785 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-6 | CVE-2023-43786 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libx11-data | CVE-2023-43785 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-data | CVE-2023-43786 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libx11-dev | CVE-2023-43785 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-dev | CVE-2023-43786 | 中危 | 2:1.6.7-1+deb10u2 | 2:1.6.7-1+deb10u4 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-27536 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libxml2 | CVE-2016-3709 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: Incorrect server side include parsing can lead to XSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39 | 
                            
                            
                                | libxml2 | CVE-2016-9318 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: XML External Entity vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15 | 
                            
                            
                                | libxml2 | CVE-2022-29824 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u4 | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2 | CVE-2023-28484 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u6 | libxml2: NULL dereference in xmlSchemaFixupComplexType 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 21:15 修改: 2024-02-01 17:15 | 
                            
                            
                                | libxml2 | CVE-2023-29469 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u6 | libxml2: Hashing of empty dict strings isn't deterministic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 21:15 修改: 2023-06-01 14:15 | 
                            
                            
                                | libxml2 | CVE-2023-39615 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: crafted xml can cause global buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15 | 
                            
                            
                                | libxml2 | CVE-2023-45322 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: use-after-free in xmlUnlinkNode() in tree.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-27538 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-28321 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-46218 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-11053 | 中危 | 7.64.0-4+deb10u2 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-6874 | 中危 | 7.64.0-4+deb10u2 |  | curl: macidn punycode buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-7264 | 中危 | 7.64.0-4+deb10u2 |  | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | libxml2-dev | CVE-2016-3709 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: Incorrect server side include parsing can lead to XSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39 | 
                            
                            
                                | libxml2-dev | CVE-2016-9318 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: XML External Entity vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15 | 
                            
                            
                                | libxml2-dev | CVE-2022-29824 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u4 | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2-dev | CVE-2023-28484 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u6 | libxml2: NULL dereference in xmlSchemaFixupComplexType 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 21:15 修改: 2024-02-01 17:15 | 
                            
                            
                                | libxml2-dev | CVE-2023-29469 | 中危 | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u6 | libxml2: Hashing of empty dict strings isn't deterministic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 21:15 修改: 2023-06-01 14:15 | 
                            
                            
                                | libxml2-dev | CVE-2023-39615 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: crafted xml can cause global buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15 | 
                            
                            
                                | libxml2-dev | CVE-2023-45322 | 中危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: use-after-free in xmlUnlinkNode() in tree.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-8096 | 中危 | 7.64.0-4+deb10u2 |  | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-9681 | 中危 | 7.64.0-4+deb10u2 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | git | CVE-2022-39253 | 中危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libxpm4 | CVE-2023-43788 | 中危 | 1:3.5.12-1 | 1:3.5.12-1+deb10u2 | libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43788 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libxpm4 | CVE-2023-43789 | 中危 | 1:3.5.12-1 | 1:3.5.12-1+deb10u2 | libXpm: out of bounds read on XPM with corrupted colormap 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43789 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-10-12 12:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | krb5-multidev | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | krb5-multidev | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libapr1 | CVE-2023-49582 | 中危 | 1.6.5-1+b1 |  | APR: Lax permissions in Apache Portable Runtime shared memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49582 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-26 14:15 修改: 2024-08-27 16:04 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libaprutil1 | CVE-2022-25147 | 中危 | 1.6.1-4 | 1.6.1-4+deb10u1 | apr-util: out-of-bounds writes in the apr_base64 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25147 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-01-31 16:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | git | CVE-2023-22490 | 中危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u8 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | curl | CVE-2022-32208 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-43552 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | curl | CVE-2023-23916 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | curl | CVE-2023-27535 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libblkid-dev | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | curl | CVE-2023-27536 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libblkid1 | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21595 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow in the mc_luma functio ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21595 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21596 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-22 18:02 | 
                            
                            
                                | libde265-0 | CVE-2020-21597 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma funct ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-22 18:02 | 
                            
                            
                                | libde265-0 | CVE-2020-21599 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-16 03:05 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21600 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21601 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallb ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21602 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21603 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fa ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21603 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21604 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21605 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a segmentation fault in the apply_sao_interna ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2020-21606 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-16 22:15 修改: 2023-02-11 13:15 | 
                            
                            
                                | libde265-0 | CVE-2021-35452 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35452 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 22:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | libde265-0 | CVE-2021-36408 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36408 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 23:15 修改: 2023-02-16 03:10 | 
                            
                            
                                | libde265-0 | CVE-2021-36410 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36410 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 23:15 修改: 2023-02-16 03:12 | 
                            
                            
                                | libde265-0 | CVE-2021-36411 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u1 | An issue has been found in libde265 v1.0.8 due to incorrect access con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36411 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 23:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | libde265-0 | CVE-2022-43235 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:17 | 
                            
                            
                                | libde265-0 | CVE-2022-43236 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:18 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libde265-0 | CVE-2022-43237 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43237 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:18 | 
                            
                            
                                | libde265-0 | CVE-2022-43238 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43238 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:23 | 
                            
                            
                                | libde265-0 | CVE-2022-43239 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:23 | 
                            
                            
                                | libde265-0 | CVE-2022-43240 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:24 | 
                            
                            
                                | libde265-0 | CVE-2022-43241 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:24 | 
                            
                            
                                | libde265-0 | CVE-2022-43242 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43242 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43243 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43244 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43245 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a segmentation violation via ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43248 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43248 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43249 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43249 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43250 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libde265-0 | CVE-2022-43252 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:25 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-dev | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickcore-dev | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-dev | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libde265-0 | CVE-2022-43253 | 中危 | 1.0.3-1+b1 | 1.0.3-1+deb10u3 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43253 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-02 14:15 修改: 2023-02-27 15:26 | 
                            
                            
                                | libde265-0 | CVE-2023-24751 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 02:35 | 
                            
                            
                                | libde265-0 | CVE-2023-24752 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:14 | 
                            
                            
                                | libde265-0 | CVE-2023-24754 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:17 | 
                            
                            
                                | libde265-0 | CVE-2023-24755 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:18 | 
                            
                            
                                | libde265-0 | CVE-2023-24756 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:19 | 
                            
                            
                                | libde265-0 | CVE-2023-24757 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:20 | 
                            
                            
                                | libde265-0 | CVE-2023-24758 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u4 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:22 | 
                            
                            
                                | libde265-0 | CVE-2023-27102 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u5 | Libde265 v1.0.11 was discovered to contain a segmentation violation vi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27102 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-15 15:15 修改: 2023-11-30 19:15 | 
                            
                            
                                | libde265-0 | CVE-2023-47471 | 中危 | 1.0.3-1+b1 | 1.0.11-0+deb10u5 | Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47471 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-16 04:15 修改: 2023-11-30 19:15 | 
                            
                            
                                | libde265-0 | CVE-2023-51792 | 中危 | 1.0.3-1+b1 |  | Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attac ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51792 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libde265-0 | CVE-2024-38949 | 中危 | 1.0.3-1+b1 |  | Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-26 20:15 修改: 2024-07-08 14:18 | 
                            
                            
                                | libde265-0 | CVE-2024-38950 | 中危 | 1.0.3-1+b1 |  | Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-26 20:15 修改: 2024-08-12 18:35 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | imagemagick | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libdjvulibre-dev | CVE-2019-15142 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-dev | CVE-2019-15143 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the bitmap reader component allows attackers to c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-dev | CVE-2019-15144 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYP ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-dev | CVE-2019-15145 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-3630 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::D ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-30 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-46310 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libdjvulibre-dev | CVE-2021-46312 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | imagemagick | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2019-8921 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: information leak in service_attr_req() in sdpd-request.c via a crafted CSTATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8921 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-29 08:15 修改: 2022-11-07 17:26 | 
                            
                            
                                | libdjvulibre-text | CVE-2019-15142 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-text | CVE-2019-15143 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the bitmap reader component allows attackers to c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-text | CVE-2019-15144 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYP ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-text | CVE-2019-15145 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-3630 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::D ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-30 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-46310 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libdjvulibre-text | CVE-2021-46312 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2020-26558 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | bluez: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26558 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-05-24 18:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libbluetooth-dev | CVE-2021-0129 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | kernel: Improper access control in BlueZ may allow information disclosure vulnerability. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0129 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-06-09 20:15 修改: 2022-10-29 02:49 | 
                            
                            
                                | libbluetooth-dev | CVE-2021-41229 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: memory leak in the SDP protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41229 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-12 23:15 修改: 2022-11-07 17:25 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-45866 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u4 | bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45866 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2023-12-08 06:15 修改: 2024-12-12 14:33 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-51580 | 中危 | 5.50-1.2~deb10u1 |  | bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51580 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-51589 | 中危 | 5.50-1.2~deb10u1 |  | bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51589 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libdjvulibre21 | CVE-2019-15142 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre21 | CVE-2019-15143 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the bitmap reader component allows attackers to c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre21 | CVE-2019-15144 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYP ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre21 | CVE-2019-15145 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-18 19:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-3630 | 中危 | 3.5.27.1-10 | 3.5.27.1-10+deb10u1 | An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::D ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-30 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-46310 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libdjvulibre21 | CVE-2021-46312 | 中危 | 3.5.27.1-10 |  | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-06-10 18:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-dev | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libmagickwand-dev | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickwand-dev | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-51592 | 中危 | 5.50-1.2~deb10u1 |  | bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51592 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libelf1 | CVE-2020-21047 | 中危 | 0.176-1.1 | 0.176-1.1+deb10u1 | The libcpu component which is used by libasm of elfutils version 0.177 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21047 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | imagemagick | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | imagemagick | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | imagemagick | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | imagemagick | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | imagemagick | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libbluetooth3 | CVE-2019-8921 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: information leak in service_attr_req() in sdpd-request.c via a crafted CSTATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8921 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-29 08:15 修改: 2022-11-07 17:26 | 
                            
                            
                                | libbluetooth3 | CVE-2020-26558 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | bluez: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26558 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-05-24 18:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libbluetooth3 | CVE-2021-0129 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u2 | kernel: Improper access control in BlueZ may allow information disclosure vulnerability. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0129 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-06-09 20:15 修改: 2022-10-29 02:49 | 
                            
                            
                                | libbluetooth3 | CVE-2021-41229 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u3 | bluez: memory leak in the SDP protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41229 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-11-12 23:15 修改: 2022-11-07 17:25 | 
                            
                            
                                | libbluetooth3 | CVE-2023-45866 | 中危 | 5.50-1.2~deb10u1 | 5.50-1.2~deb10u4 | bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45866 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2023-12-08 06:15 修改: 2024-12-12 14:33 | 
                            
                            
                                | libbluetooth3 | CVE-2023-51580 | 中危 | 5.50-1.2~deb10u1 |  | bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51580 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth3 | CVE-2023-51589 | 中危 | 5.50-1.2~deb10u1 |  | bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51589 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libbluetooth3 | CVE-2023-51592 | 中危 | 5.50-1.2~deb10u1 |  | bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51592 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | curl | CVE-2023-27538 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libexpat1 | CVE-2022-25313 | 中危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Stack exhaustion in doctype parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1 | CVE-2024-50602 | 中危 | 2.2.6-2+deb10u1 |  | libexpat: expat: DoS via XML_ResumeParser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35 | 
                            
                            
                                | gir1.2-rsvg-2.0 | CVE-2019-20446 | 中危 | 2.44.10-2.1 | 2.44.10-2.1+deb10u1 | librsvg: Resource exhaustion via crafted SVG file with nested patterns 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | curl | CVE-2023-28321 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | curl | CVE-2023-46218 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | curl | CVE-2024-11053 | 中危 | 7.64.0-4+deb10u2 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libmariadb-dev | CVE-2021-35604 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-20 11:17 修改: 2023-11-07 03:36 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46657 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46657 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46658 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: save_window_function_values triggers an abort during IN subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46659 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash executing query with VIEW, aggregate and subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46661 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46662 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:49 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46663 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46664 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46665 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46666 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:57 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46667 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Integer overflow in sql_lex.cc integer leading to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2021-46668 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev | CVE-2022-21427 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21427 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-19 21:15 修改: 2022-10-27 13:57 | 
                            
                            
                                | libmariadb-dev | CVE-2022-31621 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-10-30 14:35 | 
                            
                            
                                | libmariadb-dev | CVE-2022-31622 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-03 08:15 | 
                            
                            
                                | libmariadb-dev | CVE-2022-31623 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-12 13:38 | 
                            
                            
                                | libmariadb-dev | CVE-2022-31624 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | libmariadb-dev | CVE-2022-38791 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: compress_write() fails to release mutex on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-27 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libmariadb-dev | CVE-2022-47015 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u1 | mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-20 19:15 修改: 2024-06-06 19:45 | 
                            
                            
                                | libmariadb-dev | CVE-2023-22084 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u2 | mysql: InnoDB unspecified vulnerability (CPU Oct 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-17 22:15 修改: 2024-01-27 09:15 | 
                            
                            
                                | libmariadb-dev | CVE-2024-21096 | 中危 | 1:10.3.29-0+deb10u1 |  | mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-16 22:15 修改: 2024-12-06 21:35 | 
                            
                            
                                | curl | CVE-2024-6874 | 中危 | 7.64.0-4+deb10u2 |  | curl: macidn punycode buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27 | 
                            
                            
                                | curl | CVE-2024-7264 | 中危 | 7.64.0-4+deb10u2 |  | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | curl | CVE-2024-8096 | 中危 | 7.64.0-4+deb10u2 |  | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | curl | CVE-2024-9681 | 中危 | 7.64.0-4+deb10u2 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | git-man | CVE-2022-39253 | 中危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u5 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | git-man | CVE-2023-22490 | 中危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u8 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | libc-bin | CVE-2016-10228 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc-bin | CVE-2019-25013 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libc-bin | CVE-2020-10029 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-03-04 15:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | libc-bin | CVE-2020-27618 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libc-bin | CVE-2023-4806 | 中危 | 2.28-10 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-bin | CVE-2023-4813 | 中危 | 2.28-10 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-bin | CVE-2024-33600 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-bin | CVE-2024-33601 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-bin | CVE-2024-33602 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | gnupg | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libexpat1-dev | CVE-2022-25313 | 中危 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 | expat: Stack exhaustion in doctype parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libexpat1-dev | CVE-2024-50602 | 中危 | 2.2.6-2+deb10u1 |  | libexpat: expat: DoS via XML_ResumeParser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35 | 
                            
                            
                                | gnupg-l10n | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libfdisk1 | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-35604 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-20 11:17 修改: 2023-11-07 03:36 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46657 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46657 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46658 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: save_window_function_values triggers an abort during IN subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46659 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash executing query with VIEW, aggregate and subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46661 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46662 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:49 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46663 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46664 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46665 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46666 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:57 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46667 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Integer overflow in sql_lex.cc integer leading to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-46668 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-21427 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21427 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-19 21:15 修改: 2022-10-27 13:57 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-31621 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-10-30 14:35 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-31622 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-03 08:15 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-31623 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-12 13:38 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-31624 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-38791 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: compress_write() fails to release mutex on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-27 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2022-47015 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u1 | mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-20 19:15 修改: 2024-06-06 19:45 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2023-22084 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u2 | mysql: InnoDB unspecified vulnerability (CPU Oct 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-17 22:15 修改: 2024-01-27 09:15 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2024-21096 | 中危 | 1:10.3.29-0+deb10u1 |  | mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-16 22:15 修改: 2024-12-06 21:35 | 
                            
                            
                                | libfribidi0 | CVE-2022-25309 | 中危 | 1.0.5-3.1+deb10u1 | 1.0.5-3.1+deb10u2 | fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libfribidi0 | CVE-2022-25310 | 中危 | 1.0.5-3.1+deb10u1 | 1.0.5-3.1+deb10u2 | fribidi: SEGV in fribidi_remove_bidi_marks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-06 18:15 修改: 2023-06-23 17:50 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libc-dev-bin | CVE-2016-10228 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc-dev-bin | CVE-2019-25013 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libc-dev-bin | CVE-2020-10029 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-03-04 15:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | libc-dev-bin | CVE-2020-27618 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libgcrypt20 | CVE-2019-13627 | 中危 | 1.8.4-5+deb10u1 |  | libgcrypt: ECDSA timing attack allowing private key leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-09-25 15:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | libgcrypt20 | CVE-2024-2236 | 中危 | 1.8.4-5+deb10u1 |  | libgcrypt: vulnerable to Marvin Attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15 | 
                            
                            
                                | libc-dev-bin | CVE-2023-4806 | 中危 | 2.28-10 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-dev-bin | CVE-2023-4813 | 中危 | 2.28-10 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libgd3 | CVE-2021-38115 | 中危 | 2.2.5-5.2 | 2.2.5-5.2+deb10u1 | read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) thr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38115 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2021-08-04 21:15 修改: 2024-04-07 01:17 | 
                            
                            
                                | libgd3 | CVE-2021-40812 | 中危 | 2.2.5-5.2 | 2.2.5-5.2+deb10u1 | The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40812 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2021-09-08 21:15 修改: 2024-10-29 14:35 | 
                            
                            
                                | libc-dev-bin | CVE-2024-33600 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-dev-bin | CVE-2024-33601 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-dev-bin | CVE-2024-33602 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2021-3800 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u4 | glib2: Possible privilege escalation thourgh pkexec and aliases 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-04-25 15:42 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-32611 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-32665 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2021-3800 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u4 | glib2: Possible privilege escalation thourgh pkexec and aliases 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-04-25 15:42 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-32611 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-32665 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmariadb3 | CVE-2021-35604 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-20 11:17 修改: 2023-11-07 03:36 | 
                            
                            
                                | libmariadb3 | CVE-2021-46657 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46657 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb3 | CVE-2021-46658 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: save_window_function_values triggers an abort during IN subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | libmariadb3 | CVE-2021-46659 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash executing query with VIEW, aggregate and subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46661 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46662 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:49 | 
                            
                            
                                | libmariadb3 | CVE-2021-46663 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46664 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46665 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46666 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:57 | 
                            
                            
                                | libmariadb3 | CVE-2021-46667 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Integer overflow in sql_lex.cc integer leading to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2021-46668 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libmariadb3 | CVE-2022-21427 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21427 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-19 21:15 修改: 2022-10-27 13:57 | 
                            
                            
                                | libmariadb3 | CVE-2022-31621 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-10-30 14:35 | 
                            
                            
                                | libmariadb3 | CVE-2022-31622 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-03 08:15 | 
                            
                            
                                | libmariadb3 | CVE-2022-31623 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-12 13:38 | 
                            
                            
                                | libmariadb3 | CVE-2022-31624 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | libmariadb3 | CVE-2022-38791 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: compress_write() fails to release mutex on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-27 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libmariadb3 | CVE-2022-47015 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u1 | mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-20 19:15 修改: 2024-06-06 19:45 | 
                            
                            
                                | libmariadb3 | CVE-2023-22084 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u2 | mysql: InnoDB unspecified vulnerability (CPU Oct 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-17 22:15 修改: 2024-01-27 09:15 | 
                            
                            
                                | libmariadb3 | CVE-2024-21096 | 中危 | 1:10.3.29-0+deb10u1 |  | mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-16 22:15 修改: 2024-12-06 21:35 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmount-dev | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libglib2.0-data | CVE-2021-3800 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u4 | glib2: Possible privilege escalation thourgh pkexec and aliases 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-04-25 15:42 | 
                            
                            
                                | libmount1 | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-32611 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-32665 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libglib2.0-dev | CVE-2021-3800 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u4 | glib2: Possible privilege escalation thourgh pkexec and aliases 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-04-25 15:42 | 
                            
                            
                                | libncurses-dev | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libncurses-dev | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2023-32611 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2023-32665 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libncurses5-dev | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libncurses5-dev | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2021-3800 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u4 | glib2: Possible privilege escalation thourgh pkexec and aliases 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-04-25 15:42 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2023-32611 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libncurses6 | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libncurses6 | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2023-32665 | 中危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u5 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | libc6 | CVE-2016-10228 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc6 | CVE-2019-25013 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libncursesw5-dev | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libncursesw5-dev | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libc6 | CVE-2020-10029 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-03-04 15:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | libc6 | CVE-2020-27618 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libc6 | CVE-2023-4806 | 中危 | 2.28-10 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libncursesw6 | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | libncursesw6 | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libc6 | CVE-2023-4813 | 中危 | 2.28-10 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libgnutls-dane0 | CVE-2021-4209 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libnghttp2-14 | CVE-2024-28182 | 中危 | 1.36.0-2+deb10u1 | 1.36.0-2+deb10u3 | nghttp2: CONTINUATION frames DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-04-04 15:15 修改: 2024-05-01 18:15 | 
                            
                            
                                | libgnutls-dane0 | CVE-2023-5981 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u11 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libc6 | CVE-2024-33600 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libopenexr-dev | CVE-2020-16587 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A heap-based buffer overflow in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-02 18:53 | 
                            
                            
                                | libopenexr-dev | CVE-2020-16588 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A Null Pointer Deference in generatePreview in makePreview.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-03 23:52 | 
                            
                            
                                | libopenexr-dev | CVE-2020-16589 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-02 18:54 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20296 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Segv on unknown address in Imf_2_5::hufUncompress - Null Pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-01 14:15 修改: 2022-12-13 01:56 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20300 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::hufUncompress 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20300 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2022-12-13 02:22 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20302 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Floating-point-exception in Imf_2_5::precalculateTileInfot 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20302 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2022-12-13 02:22 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20303 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libopenexr-dev | CVE-2021-23215 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23215 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libopenexr-dev | CVE-2021-26260 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26260 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3474 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Undefined-shift in Imf_2_5::FastHufDecoder::FastHufDecoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3474 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-03 23:52 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3475 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::calculateNumTiles 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-03 23:53 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3476 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Undefined-shift in Imf_2_5::unpack14 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-02 17:03 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3477 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3478 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory in ScanLineInputFile 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3478 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2022-12-13 01:57 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3479 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory caused by allocation of a very large buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2022-12-13 01:56 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3598 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-06 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3605 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap buffer overflow in the rleUncompress function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3933 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr-dev | CVE-2021-3941 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr-dev | CVE-2021-45942 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-01 01:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libc6 | CVE-2024-33601 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2024-33602 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libopenexr23 | CVE-2020-16587 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A heap-based buffer overflow in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-02 18:53 | 
                            
                            
                                | libopenexr23 | CVE-2020-16588 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A Null Pointer Deference in generatePreview in makePreview.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-03 23:52 | 
                            
                            
                                | libopenexr23 | CVE-2020-16589 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: A heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp could result in a DOS via a crafted EXR file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-02-02 18:54 | 
                            
                            
                                | libopenexr23 | CVE-2021-20296 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Segv on unknown address in Imf_2_5::hufUncompress - Null Pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-01 14:15 修改: 2022-12-13 01:56 | 
                            
                            
                                | libopenexr23 | CVE-2021-20300 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::hufUncompress 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20300 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2022-12-13 02:22 | 
                            
                            
                                | libopenexr23 | CVE-2021-20302 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Floating-point-exception in Imf_2_5::precalculateTileInfot 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20302 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2022-12-13 02:22 | 
                            
                            
                                | libopenexr23 | CVE-2021-20303 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libopenexr23 | CVE-2021-23215 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23215 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libopenexr23 | CVE-2021-26260 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26260 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | libopenexr23 | CVE-2021-3474 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Undefined-shift in Imf_2_5::FastHufDecoder::FastHufDecoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3474 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-03 23:52 | 
                            
                            
                                | libopenexr23 | CVE-2021-3475 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Integer-overflow in Imf_2_5::calculateNumTiles 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-03 23:53 | 
                            
                            
                                | libopenexr23 | CVE-2021-3476 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Undefined-shift in Imf_2_5::unpack14 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-30 18:15 修改: 2023-02-02 17:03 | 
                            
                            
                                | libopenexr23 | CVE-2021-3477 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr23 | CVE-2021-3478 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory in ScanLineInputFile 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3478 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2022-12-13 01:57 | 
                            
                            
                                | libopenexr23 | CVE-2021-3479 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Out-of-memory caused by allocation of a very large buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-31 14:15 修改: 2022-12-13 01:56 | 
                            
                            
                                | libopenexr23 | CVE-2021-3598 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-06 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr23 | CVE-2021-3605 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: Heap buffer overflow in the rleUncompress function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr23 | CVE-2021-3933 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr23 | CVE-2021-3941 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libopenexr23 | CVE-2021-45942 | 中危 | 2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 | OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-01 01:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2021-4209 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2019-12973 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2022-10-05 20:37 | 
                            
                            
                                | libopenjp2-7 | CVE-2021-29338 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29338 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-14 14:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libopenjp2-7 | CVE-2022-1122 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-29 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39327 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: Malicious files can cause the program to enter a large loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39327 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39328 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: denail of service via crafted image file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39328 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-09 14:15 修改: 2024-07-09 18:19 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39329 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: Resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | libopenjp2-7 | CVE-2024-56826 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: heap buffer overflow in bin/common/color.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libopenjp2-7 | CVE-2024-56827 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: heap buffer overflow in lib/openjp2/j2k.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2023-5981 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u11 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2019-12973 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2022-10-05 20:37 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2021-29338 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29338 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-14 14:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2022-1122 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-29 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2023-39327 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: Malicious files can cause the program to enter a large loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39327 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2023-39328 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: denail of service via crafted image file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39328 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-09 14:15 修改: 2024-07-09 18:19 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2023-39329 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: Resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2024-56826 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: heap buffer overflow in bin/common/color.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2024-56827 | 中危 | 2.3.0-2+deb10u2 |  | openjpeg: heap buffer overflow in lib/openjp2/j2k.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | imagemagick-6-common | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libpam-modules | CVE-2024-10041 | 中危 | 1.3.1-5 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-modules | CVE-2024-22365 | 中危 | 1.3.1-5 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | imagemagick-6-common | CVE-2023-5341 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Heap use-after-free in coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5341 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-19 10:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | libpam-modules-bin | CVE-2024-10041 | 中危 | 1.3.1-5 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-modules-bin | CVE-2024-22365 | 中危 | 1.3.1-5 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | gnupg-utils | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libpam-runtime | CVE-2024-10041 | 中危 | 1.3.1-5 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-runtime | CVE-2024-22365 | 中危 | 1.3.1-5 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | libgnutls28-dev | CVE-2021-4209 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libpam0g | CVE-2024-10041 | 中危 | 1.3.1-5 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam0g | CVE-2024-22365 | 中危 | 1.3.1-5 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | libpcre16-3 | CVE-2020-14155 | 中危 | 2:8.39-12 |  | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libgnutls28-dev | CVE-2023-5981 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u11 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gpg | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-agent | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libpcre3 | CVE-2020-14155 | 中危 | 2:8.39-12 |  | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libpcre3-dev | CVE-2020-14155 | 中危 | 2:8.39-12 |  | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libpcre32-3 | CVE-2020-14155 | 中危 | 2:8.39-12 |  | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2020-14155 | 中危 | 2:8.39-12 |  | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | gpg-wks-client | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libgnutls30 | CVE-2021-4209 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libgnutls30 | CVE-2023-5981 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u11 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gpg-wks-server | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgconf | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgsm | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libgnutlsxx28 | CVE-2021-4209 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u9 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libgnutlsxx28 | CVE-2023-5981 | 中危 | 3.6.7-4+deb10u7 | 3.6.7-4+deb10u11 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gpgv | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | dirmngr | CVE-2022-34903 | 中危 | 2.2.12-1+deb10u1 | 2.2.12-1+deb10u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libc6-dev | CVE-2016-10228 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libpq-dev | CVE-2021-23222 | 中危 | 11.12-0+deb10u1 | 11.14-0+deb10u1 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpq-dev | CVE-2021-3677 | 中危 | 11.12-0+deb10u1 | 11.13-0+deb10u1 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | libpq-dev | CVE-2023-2455 | 中危 | 11.12-0+deb10u1 | 11.20-0+deb10u1 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq-dev | CVE-2023-5868 | 中危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Memory disclosure in aggregate function calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libpq-dev | CVE-2023-5870 | 中危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Role pg_signal_backend can signal certain superuser processes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libc6-dev | CVE-2019-25013 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libc6-dev | CVE-2020-10029 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-03-04 15:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | libc6-dev | CVE-2020-27618 | 中危 | 2.28-10 | 2.28-10+deb10u2 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libc6-dev | CVE-2023-4806 | 中危 | 2.28-10 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc6-dev | CVE-2023-4813 | 中危 | 2.28-10 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libpq5 | CVE-2021-23222 | 中危 | 11.12-0+deb10u1 | 11.14-0+deb10u1 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpq5 | CVE-2021-3677 | 中危 | 11.12-0+deb10u1 | 11.13-0+deb10u1 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | libpq5 | CVE-2023-2455 | 中危 | 11.12-0+deb10u1 | 11.20-0+deb10u1 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq5 | CVE-2023-5868 | 中危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Memory disclosure in aggregate function calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libpq5 | CVE-2023-5870 | 中危 | 11.12-0+deb10u1 | 11.22-0+deb10u1 | postgresql: Role pg_signal_backend can signal certain superuser processes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-10 18:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | libc6-dev | CVE-2024-33600 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6-dev | CVE-2024-33601 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libgssrpc4 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libgssrpc4 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libc6-dev | CVE-2024-33602 | 中危 | 2.28-10 | 2.28-10+deb10u4 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libharfbuzz0b | CVE-2022-33068 | 中危 | 2.3.1-1 |  | harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-23 17:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | icu-devtools | CVE-2020-21913 | 中危 | 63.1-6+deb10u1 | 63.1-6+deb10u2 | icu: Use after free in pkg_createWithAssemblyCode function in tools/pkgdata/pkgdata.cpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 14:15 修改: 2021-11-29 17:20 | 
                            
                            
                                | bsdutils | CVE-2021-37600 | 中危 | 1:2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | curl | CVE-2021-22947 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | curl | CVE-2022-27774 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libheif1 | CVE-2023-29659 | 中危 | 1.3.2-2~deb10u1 |  | A Segmentation fault caused by a floating point exception exists in li ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-05 16:15 修改: 2023-11-07 04:11 | 
                            
                            
                                | libheif1 | CVE-2024-41311 | 中危 | 1.3.2-2~deb10u1 |  | In Libheif 1.17.6, insufficient checks in ImageOverlay::parse() decodi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-15 21:15 修改: 2024-10-16 19:35 | 
                            
                            
                                | libpython2.7-minimal | CVE-2020-8492 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-23336 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-3733 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-4189 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-48566 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | libpython2.7-minimal | CVE-2023-27043 | 中危 | 2.7.16-2+deb10u1 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython2.7-minimal | CVE-2023-40217 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython2.7-minimal | CVE-2024-0397 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython2.7-minimal | CVE-2024-0450 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2024-6923 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libicu-dev | CVE-2020-21913 | 中危 | 63.1-6+deb10u1 | 63.1-6+deb10u2 | icu: Use after free in pkg_createWithAssemblyCode function in tools/pkgdata/pkgdata.cpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 14:15 修改: 2021-11-29 17:20 | 
                            
                            
                                | libicu63 | CVE-2020-21913 | 中危 | 63.1-6+deb10u1 | 63.1-6+deb10u2 | icu: Use after free in pkg_createWithAssemblyCode function in tools/pkgdata/pkgdata.cpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-20 14:15 修改: 2021-11-29 17:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libjpeg-dev | CVE-2020-35538 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39 | 
                            
                            
                                | libjpeg-dev | CVE-2021-46822 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | libjpeg62-turbo | CVE-2020-35538 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39 | 
                            
                            
                                | libjpeg62-turbo | CVE-2021-46822 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | libjpeg62-turbo-dev | CVE-2020-35538 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39 | 
                            
                            
                                | libjpeg62-turbo-dev | CVE-2021-46822 | 中危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2020-8492 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-23336 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-3733 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-4189 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-48566 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2023-27043 | 中危 | 2.7.16-2+deb10u1 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2023-40217 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2024-0397 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2024-0450 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2024-6923 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libk5crypto3 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libk5crypto3 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22947 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27774 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27776 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32206 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-23336 | 中危 | 3.7.3-2+deb10u3 |  | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-3426 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-3733 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-4189 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-48564 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: DoS when processing malformed Apple Property List files in binary format 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-15 15:56 | 
                            
                            
                                | libpython3.7-minimal | CVE-2022-48566 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | libpython3.7-minimal | CVE-2023-27043 | 中危 | 3.7.3-2+deb10u3 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython3.7-minimal | CVE-2023-40217 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython3.7-minimal | CVE-2024-0397 | 中危 | 3.7.3-2+deb10u3 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython3.7-minimal | CVE-2024-0450 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32208 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-43552 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-23916 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27535 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27536 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27538 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28321 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-46218 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-23336 | 中危 | 3.7.3-2+deb10u3 |  | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-3426 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-3733 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-4189 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-48564 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: DoS when processing malformed Apple Property List files in binary format 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-15 15:56 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2022-48566 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2023-27043 | 中危 | 3.7.3-2+deb10u3 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2023-40217 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2024-0397 | 中危 | 3.7.3-2+deb10u3 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2024-0450 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libkdb5-9 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkdb5-9 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | librsvg2-2 | CVE-2019-20446 | 中危 | 2.44.10-2.1 | 2.44.10-2.1+deb10u1 | librsvg: Resource exhaustion via crafted SVG file with nested patterns 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | librsvg2-common | CVE-2019-20446 | 中危 | 2.44.10-2.1 | 2.44.10-2.1+deb10u1 | librsvg: Resource exhaustion via crafted SVG file with nested patterns 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | librsvg2-dev | CVE-2019-20446 | 中危 | 2.44.10-2.1 | 2.44.10-2.1+deb10u1 | librsvg: Resource exhaustion via crafted SVG file with nested patterns 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-11053 | 中危 | 7.64.0-4+deb10u2 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-6874 | 中危 | 7.64.0-4+deb10u2 |  | curl: macidn punycode buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-7264 | 中危 | 7.64.0-4+deb10u2 |  | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | libsmartcols1 | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-8096 | 中危 | 7.64.0-4+deb10u2 |  | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | libkrb5-3 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkrb5-3 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-9681 | 中危 | 7.64.0-4+deb10u2 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2019-19645 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2019-12-09 16:15 修改: 2022-04-15 16:14 | 
                            
                            
                                | libsqlite3-0 | CVE-2019-19924 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19924 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libsqlite3-0 | CVE-2020-13631 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: Virtual table can be renamed into the name of one of its shadow tables 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-05-27 15:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libkrb5-dev | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libsqlite3-dev | CVE-2019-19645 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-09 16:15 修改: 2022-04-15 16:14 | 
                            
                            
                                | libsqlite3-dev | CVE-2019-19924 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libsqlite3-dev | CVE-2020-13631 | 中危 | 3.27.2-3+deb10u1 |  | sqlite: Virtual table can be renamed into the name of one of its shadow tables 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-05-27 15:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libkrb5-dev | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libkrb5support0 | CVE-2021-37750 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u3 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkrb5support0 | CVE-2023-36054 | 中危 | 1.17-3+deb10u1 | 1.17-3+deb10u6 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-3596 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: NULL pointer dereference in ReadSVGImage() in coders/svg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-24 19:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libcurl4 | CVE-2021-22947 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl4 | CVE-2022-27774 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-27776 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-32206 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libssl-dev | CVE-2021-4160 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u8 | openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-28 22:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-2097 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-4304 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0465 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0466 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-2650 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-3446 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u6 | openssl: Excessive time spent checking DH keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl-dev | CVE-2023-3817 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u6 | OpenSSL: Excessive time spent checking DH q parameter value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl-dev | CVE-2023-5678 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl-dev | CVE-2024-0727 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl-dev | CVE-2024-4741 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | libssl-dev | CVE-2024-5535 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libssl-dev | CVE-2024-6119 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Possible denial of service in X.509 name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35 | 
                            
                            
                                | libcurl4 | CVE-2022-32208 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-43552 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libcurl4 | CVE-2023-23916 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27535 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libcurl4 | CVE-2023-27536 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4 | CVE-2023-27538 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u6 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4 | CVE-2023-28321 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | libcurl4 | CVE-2023-46218 | 中危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libcurl4 | CVE-2024-11053 | 中危 | 7.64.0-4+deb10u2 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-4160 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1d-0+deb10u8 | openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4160 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-01-28 22:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-2097 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4304 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u4 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0465 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0466 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-2650 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u5 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-3446 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u6 | openssl: Excessive time spent checking DH keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-3817 | 中危 | 1.1.1d-0+deb10u6 | 1.1.1n-0+deb10u6 | OpenSSL: Excessive time spent checking DH q parameter value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-5678 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-0727 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-4741 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | libssl1.1 | CVE-2024-5535 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-6119 | 中危 | 1.1.1d-0+deb10u6 |  | openssl: Possible denial of service in X.509 name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35 | 
                            
                            
                                | libcurl4 | CVE-2024-6874 | 中危 | 7.64.0-4+deb10u2 |  | curl: macidn punycode buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27 | 
                            
                            
                                | libcurl4 | CVE-2024-7264 | 中危 | 7.64.0-4+deb10u2 |  | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | libcurl4 | CVE-2024-8096 | 中危 | 7.64.0-4+deb10u2 |  | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | libcurl4 | CVE-2024-9681 | 中危 | 7.64.0-4+deb10u2 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-44267 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: Denial of Service when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libsvn1 | CVE-2021-28544 | 中危 | 1.10.4-1+deb10u2 | 1.10.4-1+deb10u3 | subversion: SVN authz protected copyfrom paths regression 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28544 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-02-11 17:44 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2022-44268 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: vulnerable to Information Disclosure when it parses a PNG image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 21:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2023-1289 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", possible to leverage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 20:15 修改: 2024-02-22 11:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2023-34151 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u6 | ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25664 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25665 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WritePALMImage in coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libsystemd0 | CVE-2021-3997 | 中危 | 241-7~deb10u8 |  | systemd: Uncontrolled recursion in systemd-tmpfiles when removing files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | libsystemd0 | CVE-2022-3821 | 中危 | 241-7~deb10u8 | 241-7~deb10u10 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libsystemd0 | CVE-2022-4415 | 中危 | 241-7~deb10u8 |  | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libsystemd0 | CVE-2023-7008 | 中危 | 241-7~deb10u8 |  | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25674 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: heap-based buffer overflow in WriteOnePNGImage in coders/png.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25676 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27750 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in MagickCore/colorspace-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27756 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/geometry.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27760 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/enhance.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27762 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/hdr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27770 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: unsigned offset overflowed at MagickCore/string.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20176 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: processing crafted file leads to division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-06 00:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libtiff-dev | CVE-2020-19143 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u3 | libtiff: buffer overflow in TIFFVGetField() in libtiff/tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-09 15:15 修改: 2021-11-30 19:38 | 
                            
                            
                                | libtiff-dev | CVE-2022-0561 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0561 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2019-15213 | 中危 | 4.19.194-3 |  | kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15213 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2019-15794 | 中危 | 4.19.194-3 |  | kernel: Overlayfs in the Linux kernel and shiftfs  not restoring original value on error leading to a refcount underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-24 00:15 修改: 2020-05-26 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16089 | 中危 | 4.19.194-3 |  | kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16089 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-06 23:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | linux-libc-dev | CVE-2019-20794 | 中危 | 4.19.194-3 |  | kernel: task processes not being properly ended could lead to resource exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-05-09 18:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | linux-libc-dev | CVE-2020-12363 | 中危 | 4.19.194-3 |  | kernel: Improper input validation in some Intel(R) Graphics Drivers 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12363 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-17 14:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-12364 | 中危 | 4.19.194-3 |  | kernel: Null pointer dereference in some Intel(R) Graphics Drivers 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12364 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-17 14:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-14304 | 中危 | 4.19.194-3 |  | kernel: ethtool when reading eeprom of device could lead to memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-09-15 20:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-16120 | 中危 | 4.19.194-3 |  | kernel: incorrect unprivileged overlayfs permission checking may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16120 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-10 20:15 修改: 2021-11-18 18:40 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26141 | 中危 | 4.19.194-3 |  | kernel: not verifying TKIP MIC of fragmented frames 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 20:15 修改: 2022-04-22 19:33 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26145 | 中危 | 4.19.194-3 |  | kernel: accepting plaintext broadcast fragments as full frames 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 20:15 修改: 2022-05-13 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26541 | 中危 | 4.19.194-3 |  | kernel: security bypass in certs/blacklist.c and certs/system_keyring.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-02 19:15 修改: 2020-10-05 02:17 | 
                            
                            
                                | linux-libc-dev | CVE-2020-27835 | 中危 | 4.19.194-3 |  | kernel: child process is able to access parent mm through hfi dev file handle 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-07 18:15 修改: 2021-01-14 15:12 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36310 | 中危 | 4.19.194-3 |  | kernel: infinite loop in set_memory_region_test in arch/x86/kvm/svm/svm.c for certain nested page faults 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-07 00:15 修改: 2022-04-18 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36322 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-14 06:15 修改: 2022-10-14 18:56 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36516 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: off-path attacker may inject data or terminate victim's TCP session 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36516 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-26 04:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36691 | 中危 | 4.19.194-3 |  | kernel: lib/nlattr.c allows attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-24 17:15 修改: 2023-03-29 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36694 | 中危 | 4.19.194-3 |  | kernel: netfilter: use-after-free in the packet processing context 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36694 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-21 23:15 修改: 2023-06-22 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36775 | 中危 | 4.19.194-3 |  | kernel: potential deadlock in f2fs_write_single_data_page 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:32 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36776 | 中危 | 4.19.194-3 |  | kernel: thermal/drivers/cpufreq_cooling: Fix slab OOB issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:34 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36780 | 中危 | 4.19.194-3 |  | kernel: i2c: sprd: fix reference leak when pm_runtime_get_sync fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36780 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36782 | 中危 | 4.19.194-3 |  | kernel: i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36783 | 中危 | 4.19.194-3 |  | kernel: i2c: img-scb: fix reference leak when pm_runtime_get_sync fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36783 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36784 | 中危 | 4.19.194-3 |  | kernel: i2c: cadence: fix reference leak when pm_runtime_get_sync fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36784 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2020-3702 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: ath9k: information disclosure via specifically timed and handcrafted traffic 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3702 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-09-08 10:15 修改: 2022-01-06 14:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0920 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: Use After Free in unix_gc() which could result in a local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 19:15 修改: 2024-02-02 16:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20317 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: timer tree corruption leads to missing wakeup and system freeze 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20317 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-27 11:15 修改: 2022-06-14 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20320 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: s390 eBPF JIT miscompilation issues fixes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20320 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20321 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20321 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-18 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26401 | 中危 | 4.19.194-3 | 4.19.232-1 | hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26401 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2022-03-18 20:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28711 | 中危 | 4.19.194-3 | 4.19.232-1 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28712 | 中危 | 4.19.194-3 | 4.19.232-1 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28713 | 中危 | 4.19.194-3 | 4.19.232-1 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28713 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28714 | 中危 | 4.19.194-3 | 4.19.232-1 | Guest can force Linux netback driver to hog large amounts of kernel me ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28714 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-06 18:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28715 | 中危 | 4.19.194-3 | 4.19.232-1 | Guest can force Linux netback driver to hog large amounts of kernel me ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-06 18:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28950 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-20 20:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33061 | 中危 | 4.19.194-3 |  | kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33624 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: Linux kernel BPF protection against speculative execution attacks can be bypassed to read arbitrary kernel memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-23 16:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33630 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/sched: cbs NULL pointer dereference when offloading is enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-18 15:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33655 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-18 15:15 修改: 2022-10-29 02:52 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33656 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-18 15:15 修改: 2022-10-29 02:52 | 
                            
                            
                                | linux-libc-dev | CVE-2021-34556 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: BPF program can obtain sensitive information from kernel memory via a speculative store bypass side-channel attack because of the possibility of uninitialized memory locations on the BPF stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34556 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-02 05:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-35477 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: BPF program can obtain sensitive information from kernel memory via a speculative store bypass side-channel attack because the technique used by the BPF verifier to manage speculation is unreliable 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-02 04:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3669 | 中危 | 4.19.194-3 |  | kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-07-07 19:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3679 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: DoS in rb_per_cpu_empty() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-05 20:15 修改: 2022-10-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-37159 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:16 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3732 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:42 修改: 2022-12-13 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3744 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-04 16:15 修改: 2023-02-12 23:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3753 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: a race out-of-bound read in vt 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 19:15 修改: 2022-12-07 01:58 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3759 | 中危 | 4.19.194-3 |  | kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3764 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: DoS in ccp_run_aes_gcm_cmd() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2022-08-25 02:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3772 | 中危 | 4.19.194-3 | 4.19.235-1 | kernel: sctp: Invalid chunks may be used to remotely remove existing associations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-02 23:15 修改: 2023-02-12 23:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38198 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38199 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: incorrect connection-setup ordering allows operators of remote NFSv4 servers to cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38199 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-08 20:15 修改: 2021-12-21 12:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39633 | 中危 | 4.19.194-3 | 4.19.208-1 | In gre_handle_offloads of ip_gre.c, there is a possible page fault due ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 20:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4002 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: possible leak or coruption of data residing on hugetlbfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-03 22:15 修改: 2023-02-22 17:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4135 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Heap information leak in map_lookup_elem function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4135 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-14 20:15 修改: 2022-07-20 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4149 | 中危 | 4.19.194-3 | 4.19.235-1 | kernel: Improper lock operation in btrfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4149 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-23 20:15 修改: 2023-02-01 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4155 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-08-29 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4159 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: another kernel ptr leak vulnerability via BPF in coerce_reg_to_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-10-06 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4203 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4203 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42739 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Heap buffer overflow in firedtv driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-20 07:15 修改: 2024-03-24 23:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43389 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-04 19:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43975 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-17 17:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43976 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-17 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4441 | 中危 | 4.19.194-3 |  | kernel: spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4441 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-11 16:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4442 | 中危 | 4.19.194-3 |  | kernel: tcp: add sanity tests to TCP_QUEUE_SEQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4442 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-29 11:15 修改: 2024-09-12 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2021-44879 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44879 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-14 12:15 修改: 2024-01-11 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45095 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: refcount leak in pep_sock_accept() in net/phonet/pep.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-16 04:15 修改: 2022-04-06 13:56 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45480 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: memory leak in the __rds_conn_create() in net/rds/connection.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45480 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-24 23:15 修改: 2022-04-06 14:11 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45868 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-18 07:15 修改: 2023-02-04 00:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46906 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: info leak in hid_submit_ctrl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:28 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46924 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: NFC: st21nfca: Fix memory leak in device probe and remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46925 | 中危 | 4.19.194-3 |  | kernel: net/smc: fix kernel panic caused by race of smc_sock 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46925 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-10-29 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46926 | 中危 | 4.19.194-3 |  | kernel: ALSA: hda: intel-sdw-acpi: harden detection of controller 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46926 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 16:26 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46928 | 中危 | 4.19.194-3 |  | kernel: parisc: Clear stale IIR value on instruction access rights trap 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46929 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: sctp: use call_rcu to free endpoint 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46932 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Input: appletouch - initialize work before device registration 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46933 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46935 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: binder: fix async_free_space accounting for empty parcels 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46941 | 中危 | 4.19.194-3 |  | kernel: usb: dwc3: core: Do core softreset when switch mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46981 | 中危 | 4.19.194-3 |  | kernel: nbd: Fix NULL pointer in flush_workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47015 | 中危 | 4.19.194-3 |  | kernel: bnxt_en: Fix RX consumer index logic in the error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47024 | 中危 | 4.19.194-3 |  | kernel: vsock/virtio: free queued packets when closing socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-28 09:15 修改: 2024-12-06 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47060 | 中危 | 4.19.194-3 |  | kernel: KVM: use-after-free while looking for coalesced MMIO zones if the bus is destroyed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47060 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 23:15 修改: 2024-11-07 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47074 | 中危 | 4.19.194-3 |  | kernel: nvme-loop: fix memory leak in nvme_loop_create_ctrl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-01 22:15 修改: 2024-12-12 14:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47076 | 中危 | 4.19.194-3 |  | kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-01 22:15 修改: 2024-12-12 14:48 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47077 | 中危 | 4.19.194-3 |  | kernel: scsi: qedf: Add pointer checks in qedf_update_link_speed() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-01 22:15 修改: 2024-12-10 21:01 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47082 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: tun: avoid double free in tun_free_netdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47083 | 中危 | 4.19.194-3 |  | kernel: pinctrl: mediatek: fix global-out-of-bounds issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47086 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: phonet/pep: refuse to enable an unbound pipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47100 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47100 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47101 | 中危 | 4.19.194-3 |  | kernel: asix: fix uninit-value in asix_mdio_read() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47101 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47104 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47104 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-04 19:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47112 | 中危 | 4.19.194-3 |  | kernel: x86/kvm: Teardown PV features on boot CPU as well 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47112 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47113 | 中危 | 4.19.194-3 |  | kernel: btrfs: abort in rename_exchange if we fail to insert the second ref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47116 | 中危 | 4.19.194-3 |  | kernel: ext4: fix memory leak in ext4_mb_init_backend on error path. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47116 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47119 | 中危 | 4.19.194-3 |  | kernel: ext4: fix memory leak in ext4_fill_super 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47131 | 中危 | 4.19.194-3 |  | kernel: net/tls: Fix use-after-free after the TLS device goes down and up 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47131 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47143 | 中危 | 4.19.194-3 |  | kernel: net/smc: remove device from smcd_dev_list after failed device_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47161 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: spi: spi-fsl-dspi: Fix a resource leak in an error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47161 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-25 10:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47163 | 中危 | 4.19.194-3 |  | kernel: tipc: wait and exit until all work queues are done 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47163 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47167 | 中危 | 4.19.194-3 |  | kernel: NFS: Fix an Oopsable condition in __nfs_pageio_add_request() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47167 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47181 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: musb: tusb6010: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47181 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-12-20 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47182 | 中危 | 4.19.194-3 |  | kernel: scsi: core: Fix scsi_mode_sense() buffer length handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47182 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47183 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Fix link down processing to address NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47183 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47184 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: i40e: Fix NULL ptr dereference on VSI filter sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47184 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47185 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47185 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47186 | 中危 | 4.19.194-3 |  | kernel: tipc: check for null after calling kmemdup 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47186 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-07-08 14:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47187 | 中危 | 4.19.194-3 |  | kernel: arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47187 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47188 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Improve SCSI abort handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47188 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47189 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: btrfs: fix memory ordering between normal and ordered work functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-11-01 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47191 | 中危 | 4.19.194-3 |  | kernel: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47191 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47193 | 中危 | 4.19.194-3 |  | kernel: scsi: pm80xx: Fix memory leak during rmmod 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-19 19:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47201 | 中危 | 4.19.194-3 |  | kernel: iavf: free q_vectors before queues in iavf_disable_vf 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47201 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47202 | 中危 | 4.19.194-3 |  | kernel: thermal: Fix NULL pointer dereferences in of_thermal_ functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47202 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47203 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47203 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47204 | 中危 | 4.19.194-3 |  | kernel: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47205 | 中危 | 4.19.194-3 |  | kernel: clk: sunxi-ng: Unregister clocks/resets when unbinding 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47206 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: host: ohci-tmio: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47207 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ALSA: gus: fix null pointer dereference on pointer block 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47207 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47210 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47211 | 中危 | 4.19.194-3 |  | kernel: ALSA: usb-audio: fix null pointer dereference on pointer cs_desc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47216 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: advansys: Fix kernel pointer leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47216 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47217 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47219 | 中危 | 4.19.194-3 |  | kernel: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47219 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47222 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: bridge: fix vlan tunnel dst refcnt when egressing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47223 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: bridge: fix vlan tunnel dst null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47223 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47224 | 中危 | 4.19.194-3 |  | kernel: net: ll_temac: Make sure to free skb when it is completely used 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-04 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47229 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: PCI: aardvark: Fix kernel panic during PIO transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47229 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47231 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: can: mcba_usb: fix memory leak in mcba_usb 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47233 | 中危 | 4.19.194-3 |  | kernel: regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:51 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47234 | 中危 | 4.19.194-3 |  | kernel: phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47234 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47236 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: cdc_eem: fix tx fixup skb leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47237 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: hamradio: fix memory leak in mkiss_close 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47237 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47238 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: ipv4: fix memory leak in ip_mc_add1_src 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47238 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47246 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix page reclaim for dead peer hairpin 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47248 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: udp: fix race between close() and udp_abort() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47248 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47249 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: rds: fix memory leak in rds_recvmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47249 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47250 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: ipv4: fix memory leak in netlbl_cipsov4_add_std 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47252 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: batman-adv: Avoid WARN_ON timing related checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47253 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix potential memory leak in DMUB hw_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47253 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47256 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: mm/memory-failure: make sure wait for page writeback in memory_failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47257 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: ieee802154: fix null deref in parse dev addr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47257 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-07 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47258 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: scsi: core: Fix error handling of scsi_host_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47258 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47259 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: NFS: Fix use-after-free in nfs4_init_client() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47259 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47260 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: NFS: Fix a potential NULL dereference in nfs_get_client() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47260 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47261 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: IB/mlx5: Fix initializing CQ fragments buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47261 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47265 | 中危 | 4.19.194-3 |  | kernel: RDMA: Verify port when creating flow rule 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47265 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47267 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: usb: fix various gadget panics on 10gbps cabling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-01 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47269 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: usb: dwc3: ep0: fix NULL pointer exception 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47270 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: usb: fix various gadgets null ptr deref on 10gbps cabling. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47270 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47274 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: tracing: Correct the length check which causes memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47274 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47275 | 中危 | 4.19.194-3 |  | kernel: bcache: avoid oversized read request in cache missing code path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47276 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: ftrace: Do not blindly read the ip address in ftrace_bug() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47276 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47277 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: kvm: avoid speculation-based attacks from out-of-range memslot accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47283 | 中危 | 4.19.194-3 |  | kernel: net:sfc: fix non-freed irq in legacy irq mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47283 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 20:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47284 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: isdn: mISDN: netjet: Fix crash in nj_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47289 | 中危 | 4.19.194-3 |  | kernel: ACPI: fix NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-23 16:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47293 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net/sched: act_skbmod: Skip non-Ethernet packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47293 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47294 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: netrom: Decrease sock refcount when sock timers expire 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47295 | 中危 | 4.19.194-3 |  | kernel: net: sched: fix memory leak in tcindex_partial_destroy_work 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47295 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47296 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47297 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: net: fix uninit-value in caif_seqpkt_sendmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47297 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47305 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: dma-buf/sync_file: Don't leak fences on merge failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47305 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47307 | 中危 | 4.19.194-3 |  | kernel: cifs: prevent NULL deref in cifs_compose_mount_options() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47307 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 18:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47308 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: scsi: libfc: Fix array index out of bound exception 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47308 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-08 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47314 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: memory: fsl_ifc: fix leak of private memory on probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47314 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47315 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: memory: fsl_ifc: fix leak of IO mapping on probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47315 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47319 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: virtio-blk: Fix memory leak among suspend/resume procedure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47319 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47320 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: nfs: fix acl memory leak of posix_acl_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47320 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47323 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47323 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47324 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: watchdog: Fix possible use-after-free in wdt_startup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47324 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47325 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47325 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47327 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47327 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47329 | 中危 | 4.19.194-3 |  | kernel: scsi: megaraid_sas: Fix resource leak in case of probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47330 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47330 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47331 | 中危 | 4.19.194-3 |  | kernel: usb: common: usb-conn-gpio: fix NULL pointer dereference of charger 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47331 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47332 | 中危 | 4.19.194-3 |  | kernel: ALSA: usx2y: Don't call free_pages_exact() with NULL address 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47332 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47333 | 中危 | 4.19.194-3 |  | kernel: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47333 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-10-31 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47335 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47335 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47336 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: smackfs: restrict bytes count in smk_set_cipso() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47336 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47337 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: scsi: core: Fix bad pointer dereference when ehandler kthread is invalid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47337 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47340 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: jfs: fix GPF in diFree 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47340 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47343 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: dm btree remove: assign new_root only when removal succeeds 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47343 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47344 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: media: zr364xx: fix memory leak in zr364xx_start_readpipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47344 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:13 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47345 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: RDMA/cma: Fix rdma_resolve_route() memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47345 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47346 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47346 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47347 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: wl1251: Fix possible buffer overflow in wl1251_cmd_scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47347 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-13 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47348 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Avoid HDCP over-read and corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47348 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47350 | 中危 | 4.19.194-3 |  | kernel: powerpc/mm: Fix lockup on kernel exec fault 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47350 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-04 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47351 | 中危 | 4.19.194-3 |  | kernel: ubifs: Fix races between xattr_{set|get} and listxattr operations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47351 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47352 | 中危 | 4.19.194-3 |  | kernel: virtio-net: Add validation for used length 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47352 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47353 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: udf: Fix NULL pointer dereference in udf_symlink function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47353 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:11 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47354 | 中危 | 4.19.194-3 |  | kernel: drm/sched: Avoid data corruptions 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47354 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47356 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: mISDN: fix possible use-after-free in HFC_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47359 | 中危 | 4.19.194-3 |  | kernel: cifs: Fix soft lockup during fsstress 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47359 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47362 | 中危 | 4.19.194-3 |  | kernel: drm/amd/pm: Update intermediate power state for SI 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47362 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 18:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47373 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: irqchip/gic-v3-its: Fix potential VPE leak on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47373 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-26 17:57 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47374 | 中危 | 4.19.194-3 |  | kernel: dma-debug: prevent an error message from causing runtime problems 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47374 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47375 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47375 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-10-27 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47376 | 中危 | 4.19.194-3 |  | kernel: bpf: Add oversize check before call kvcalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47378 | 中危 | 4.19.194-3 |  | kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47380 | 中危 | 4.19.194-3 |  | kernel: HID: amd_sfh: Fix potential NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-23 20:48 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47383 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: tty: Fix out-of-bound vmalloc access in imageblit 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47383 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47384 | 中危 | 4.19.194-3 |  | kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47384 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-06 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47385 | 中危 | 4.19.194-3 |  | kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47385 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-23 21:01 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47386 | 中危 | 4.19.194-3 |  | kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-13 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47387 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47387 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47391 | 中危 | 4.19.194-3 |  | kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47391 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47393 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47393 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47395 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47395 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47396 | 中危 | 4.19.194-3 |  | kernel: mac80211-hwsim: fix late beacon hrtimer handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47396 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47397 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47401 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ipack: ipoctal: fix stack information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47401 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47403 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ipack: ipoctal: fix module reference leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47403 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47405 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: HID: usbhid: free raw_report buffers in usbhid_stop 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47405 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47407 | 中危 | 4.19.194-3 |  | kernel: KVM: x86: Handle SRCU initialization failure during page track init 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47407 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47408 | 中危 | 4.19.194-3 |  | kernel: netfilter: conntrack: serialize hash resizes and cleanups 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47408 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47409 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: dwc2: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47409 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 20:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47412 | 中危 | 4.19.194-3 |  | kernel: block: don't call rq_qos_ops->done_bio if the bio isn't tracked 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47412 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47414 | 中危 | 4.19.194-3 |  | kernel: riscv: Flush current cpu icache before other cpus 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47414 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47416 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: phy: mdio: fix memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47416 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-31 18:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47418 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net_sched: fix NULL deref in fifo_set_limit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47418 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-31 20:03 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47423 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: drm/nouveau/debugfs: fix file release memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47423 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47424 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: i40e: Fix freeing of uninitialized misc IRQ vector 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47424 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47425 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: i2c: acpi: fix resource leak in reconfiguration device addition 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47425 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47432 | 中危 | 4.19.194-3 |  | kernel: lib/generic-radix-tree.c: Don't overflow in peek() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47432 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-10-31 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47433 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix abort logic in btrfs_replace_file_extents 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47433 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47434 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: xhci: Fix command ring pointer corruption while aborting a command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47434 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47435 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: dm: fix mempool NULL pointer race when completing IO 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47436 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usb: musb: dsps: Fix the probe error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47436 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47438 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47438 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47440 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: encx24j600: check error in devm_regmap_init_encx24j600 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47440 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-11-01 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47441 | 中危 | 4.19.194-3 |  | kernel: mlxsw: thermal: Fix out-of-bounds memory accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47441 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47442 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47442 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47443 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47443 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-11-06 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47445 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: drm/msm: Fix null pointer dereference on pointer edp 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47445 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47455 | 中危 | 4.19.194-3 |  | kernel: ptp: Fix possible memory leak in ptp_clock_register() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47455 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47456 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: can: peak_pci: peak_pci_remove(): fix UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47458 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ocfs2: mount fails with buffer overflow in strlen 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47460 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ocfs2: fix data corruption after conversion from inline format 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47460 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47468 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: isdn: mISDN: Fix sleeping function called from invalid context 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47468 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47469 | 中危 | 4.19.194-3 |  | kernel: spi: Fix deadlock when adding SPI controllers on SPI buses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47473 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47473 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47474 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: comedi: vmk80xx: fix bulk-buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47474 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47475 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: comedi: vmk80xx: fix transfer-buffer overflows 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47476 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: comedi: ni_usb6501: fix NULL-deref in command paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47477 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: comedi: dt9812: fix DMA buffers on stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47478 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: isofs: Fix out of bound access for corrupted isofs image 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47478 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-11-07 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47479 | 中危 | 4.19.194-3 |  | kernel: staging: rtl8712: fix use-after-free in rtl8712_dl_fw 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47480 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: core: Put LLD module refcnt after SCSI device is released 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47480 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47482 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: batman-adv: fix error handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47482 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47483 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: regmap: Fix possible double-free in regcache_rbtree_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47483 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47485 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47485 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47490 | 中危 | 4.19.194-3 |  | kernel: drm/ttm: fix memleak in ttm_transfered_destroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47495 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: usbnet: sanity check for maxpacket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47496 | 中危 | 4.19.194-3 |  | kernel: net/tls: Fix flipped sign in tls_err_abort() calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47497 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47497 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47498 | 中危 | 4.19.194-3 |  | kernel: dm rq: don't queue request to blk-mq during DM suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47498 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-22 09:15 修改: 2024-11-01 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47499 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47500 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: iio: mma8452: Fix trigger reference couting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47501 | 中危 | 4.19.194-3 |  | kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47501 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47504 | 中危 | 4.19.194-3 |  | kernel: io_uring: ensure task_work gets run as part of cancelations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47504 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47505 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: aio: fix use-after-free due to missing POLLFREE handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47505 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47506 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: nfsd: fix use-after-free due to delegation race 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47506 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47508 | 中危 | 4.19.194-3 |  | kernel: btrfs: free exchange changeset on failures 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47508 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47509 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ALSA: pcm: oss: Limit the period size to 16MB 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-11-07 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47511 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ALSA: pcm: oss: Fix negative period/buffer sizes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47511 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-11-04 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47515 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: seg6: fix the iif in the IPv6 socket control block 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47515 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47516 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47516 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47518 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47518 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47522 | 中危 | 4.19.194-3 |  | kernel: HID: bigbenff: prevent null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47527 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: serial: core: fix transmit-buffer reset and memleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47527 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47542 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47542 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47544 | 中危 | 4.19.194-3 |  | kernel: tcp: fix page frag corruption on page fault 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47544 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47547 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-11-04 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47548 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47548 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47549 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47550 | 中危 | 4.19.194-3 |  | kernel: drm/amd/amdgpu: fix potential memleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47550 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 19:23 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47551 | 中危 | 4.19.194-3 |  | kernel: drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47551 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-11-04 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47552 | 中危 | 4.19.194-3 |  | kernel: blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47559 | 中危 | 4.19.194-3 |  | kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47559 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-06-10 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47565 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47566 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47577 | 中危 | 4.19.194-3 |  | kernel: io-wq: check for wq exit after adding new worker task_work 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47577 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47578 | 中危 | 4.19.194-3 |  | kernel: scsi: scsi_debug: Don't call kcalloc() if size arg is zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47578 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 03:18 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47579 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ovl: fix warning in ovl_create_real() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47580 | 中危 | 4.19.194-3 |  | kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47580 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-11-05 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47583 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: media: mxl111sf: change mutex_init() location 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47583 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-11-07 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47587 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: systemport: Add global locking for descriptor lifecycle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-11-01 15:10 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47597 | 中危 | 4.19.194-3 |  | kernel: inet_diag: fix kernel-infoleak for UDP sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-19 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47599 | 中危 | 4.19.194-3 |  | kernel: btrfs: use latest_dev in btrfs_show_devname 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-31 13:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47602 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: mac80211: track only QoS data frames for admission control 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-31 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47603 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: audit: improve robustness of the audit queue handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47603 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-31 13:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47606 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: netlink: af_netlink: Prevent empty skb by adding a check on len. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-31 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47610 | 中危 | 4.19.194-3 |  | kernel: drm/msm: Fix null ptr access msm_ioctl_gem_submit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47610 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47611 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: mac80211: validate extended element ID is present 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-10-30 21:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47612 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: nfc: fix segfault in nfc_genl_dump_devices_done 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47612 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47617 | 中危 | 4.19.194-3 | 4.19.235-1 | kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47617 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-09-18 17:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47618 | 中危 | 4.19.194-3 |  | kernel: ARM: 9170/1: fix panic when kasan and kprobe are enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47619 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: i40e: Fix queues reservation for XDP 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-09-18 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47620 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Bluetooth: refactor malicious adv data check 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47620 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-09-18 17:07 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47622 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: Fix a deadlock in the error handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47623 | 中危 | 4.19.194-3 |  | kernel: powerpc/fixmap: Fix VM debug warning on unmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0001 | 中危 | 4.19.194-3 | 4.19.232-1 | hw: cpu: intel: Branch History Injection (BHI) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2024-04-09 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0002 | 中危 | 4.19.194-3 | 4.19.232-1 | hw: cpu: intel: Intra-Mode BTI 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2022-08-19 12:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0322 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-02-02 17:17 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0480 | 中危 | 4.19.194-3 |  | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0480 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-03-03 18:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0487 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: use after free in moxart_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0487 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-04 23:15 修改: 2022-04-30 02:40 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0494 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: information leak in scsi_ioctl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0617 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0617 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 17:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0812 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: NFS over RDMA random memory leakage 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0854 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: swiotlb information leak with DMA_FROM_DEVICE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-23 20:15 修改: 2022-10-14 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1016 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-06-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1184 | 中危 | 4.19.194-3 |  | kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1184 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-12-20 20:10 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1195 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-29 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1198 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: use-after-free in drivers/net/hamradio/6pack.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2022-09-06 18:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1204 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: Use after free in net/ax25/af_ax25.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2022-09-02 19:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1205 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1280 | 中危 | 4.19.194-3 |  | kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1280 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-13 18:15 修改: 2022-04-20 19:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1462 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: possible race condition in drivers/tty/tty_buffers.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1462 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2022-10-29 02:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1516 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: null-ptr-deref caused by x25_disconnect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1516 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-05 15:15 修改: 2023-06-27 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1974 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-06-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1975 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: sleep in atomic bug when firmware download timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-09-07 16:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20008 | 中危 | 4.19.194-3 | 4.19.232-1 | In mmc_blk_read_single of block.c, there is a possible way to read ker ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-10 20:15 修改: 2022-05-16 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20132 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: Out of bounds read in lg_probe and related functions of hid-lg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20132 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 13:15 修改: 2022-06-23 18:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20154 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: possible use after free in lock_sock_nested of sock.c for the SCTP protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20154 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 14:15 修改: 2022-06-24 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20369 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20369 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-11 15:15 修改: 2023-02-23 15:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20423 | 中危 | 4.19.194-3 | 4.19.249-1 | In rndis_set_response of rndis.c, there is a possible out of bounds wr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20423 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-11 20:15 修改: 2022-10-13 02:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20572 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20572 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-16 16:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21123 | 中危 | 4.19.194-3 | 4.19.249-2 | hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21123 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 20:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21125 | 中危 | 4.19.194-3 | 4.19.249-2 | hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21125 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 20:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21166 | 中危 | 4.19.194-3 | 4.19.249-2 | hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21166 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-15 21:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21499 | 中危 | 4.19.194-3 |  | kernel: possible to use the debugger to write zero into a location of choice 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-09 21:15 修改: 2022-09-28 20:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2153 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2153 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-11-21 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2318 | 中危 | 4.19.194-3 | 4.19.260-1 | Kernel: A use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2318 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-06 19:15 修改: 2023-02-28 15:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2380 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: vulnerability in sm712fb driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-13 19:15 修改: 2022-07-20 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23960 | 中危 | 4.19.194-3 | 4.19.249-2 | hw: cpu: arm64: Spectre-BHB 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-13 00:15 修改: 2023-01-20 02:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24959 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 06:15 修改: 2022-05-11 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2503 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: LoadPin bypass via dm-verity table reload 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2503 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-12 11:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-25258 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: security issues in the OS descriptor handling section of composite_setup function (composite.c) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25258 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-25375 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: information disclosure in drivers/usb/gadget/function/rndis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25375 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-20 20:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26373 | 中危 | 4.19.194-3 | 4.19.260-1 | hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26373 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-18 20:15 修改: 2022-10-27 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2663 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: netfilter: nf_conntrack_irc message handling issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26966 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: heap memory leak in drivers/net/usb/sr9700.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-12 22:15 修改: 2022-12-22 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-27672 | 中危 | 4.19.194-3 |  | kernel: AMD: Cross-Thread Return Address Predictions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 08:15 修改: 2024-02-04 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28356 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: refcount leak in llc_ui_bind and llc_ui_autobind 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-02 21:15 修改: 2023-02-03 23:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28388 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28388 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28389 | 中危 | 4.19.194-3 | 4.19.249-2 | kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2873 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: an out-of-bounds vulnerability in i2c-ismt driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2873 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-22 15:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29900 | 中危 | 4.19.194-3 |  | hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29901 | 中危 | 4.19.194-3 | 4.19.269-1 | hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3061 | 中危 | 4.19.194-3 |  | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3061 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 18:15 修改: 2022-11-21 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3107 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-14 21:15 修改: 2022-12-16 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3108 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3108 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-14 21:15 修改: 2022-12-16 21:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3111 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: wm8350-power: memory leak in free_charger_irq() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3111 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-14 21:15 修改: 2022-12-16 21:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3115 | 中危 | 4.19.194-3 |  | kernel: drm: mali-dp: NULL pointer dereference in malidp_crtc_reset() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-14 21:15 修改: 2022-12-16 21:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3169 | 中危 | 4.19.194-3 |  | Kernel: Request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET  may cause a DOS. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3169 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 15:15 修改: 2023-02-02 17:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3303 | 中危 | 4.19.194-3 |  | kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-27 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3344 | 中危 | 4.19.194-3 |  | kernel: KVM: SVM: nested shutdown interception could lead to host crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3344 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-25 17:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33744 | 中危 | 4.19.194-3 | 4.19.260-1 | Arm guests can cause Dom0 DoS via PV devices When mapping pages of gue ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-05 13:15 修改: 2022-10-29 02:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3523 | 中危 | 4.19.194-3 |  | Kernel: race when faulting a device private page in memory manager 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3523 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-16 10:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3524 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: memory leak in ipv6_renew_options() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3524 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-16 10:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3567 | 中危 | 4.19.194-3 |  | kernel: data races around sk->sk_prot 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3567 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-17 19:15 修改: 2023-06-07 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3586 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: net scheduler use-after-free information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-19 18:15 修改: 2022-11-04 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3594 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: Rate limit overflow messages in r8152 in intr_callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3594 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-18 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3621 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-20 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3628 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: USB-accessible buffer overflow in brcmfmac 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3628 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-12 19:15 修改: 2023-01-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36280 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36280 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 15:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36402 | 中危 | 4.19.194-3 |  | kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36402 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-16 17:15 修改: 2022-09-20 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3643 | 中危 | 4.19.194-3 | 4.19.269-1 | v1: Guests can trigger NIC interface reset/abort/crash via netback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3643 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-07 01:15 修改: 2023-11-29 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3646 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3646 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 18:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36879 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36879 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-27 04:15 修改: 2022-11-04 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3707 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3707 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-06 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3903 | 中危 | 4.19.194-3 |  | kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-14 21:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-39188 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39188 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-02 05:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-39842 | 中危 | 4.19.194-3 | 4.19.260-1 | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39842 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-05 07:15 修改: 2024-08-03 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-40307 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: use-after-free in efi_capsule_write in capsule-loader.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40307 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-09 05:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-40768 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-18 05:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-40982 | 中危 | 4.19.194-3 | 4.19.289-2 | hw: Intel: Gather Data Sampling (GDS) side channel vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-11 03:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41218 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Report vmalloc UAF in dvb-core/dmxdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-21 07:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4129 | 中危 | 4.19.194-3 |  | kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-28 22:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41849 | 中危 | 4.19.194-3 | 4.19.269-1 | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41850 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42328 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42328 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:40 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42329 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42329 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4269 | 中危 | 4.19.194-3 |  | kernel: net: CPU soft lockup in TC mirred egress-to-ingress action 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-05 16:15 修改: 2023-10-20 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42703 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: use-after-free related to leaf anon_vma double reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-09 23:15 修改: 2023-02-03 20:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42895 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42895 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-23 15:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-43750 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: memory corruption in usbmon driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-26 04:15 修改: 2023-02-14 21:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4382 | 中危 | 4.19.194-3 |  | kernel: usb: use-after-free write in put_dev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4382 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-10 22:15 修改: 2023-01-14 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4662 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-12-22 22:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47929 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: NULL pointer dereference in traffic control subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-17 21:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48619 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: event code falling outside of a bitmap in input_set_capability() leads to panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-12 03:15 修改: 2024-09-03 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48627 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: vt: fix memory overlapping when deleting chars in the buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-04 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48628 | 中危 | 4.19.194-3 |  | kernel: ceph: drop messages from MDS when unmounting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48628 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48629 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: crypto: qcom-rng - ensure buffer for generate is completely filled 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48629 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-05 12:15 修改: 2024-03-21 02:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48630 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-05 12:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48631 | 中危 | 4.19.194-3 |  | kernel: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48631 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48634 | 中危 | 4.19.194-3 |  | kernel: drm/gma500: Fix BUG: sleeping function called from invalid context errors 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48634 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48636 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48636 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-10-29 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48641 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: netfilter: ebtables: fix memory leak when blob is malformed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48641 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48651 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48659 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: mm/slub: fix to return errno if kmalloc() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-04-30 15:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48664 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix hang during unmount when stopping a space reclaim worker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48671 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-11-20 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48673 | 中危 | 4.19.194-3 |  | kernel: net/smc: Fix possible access to freed memory in link clear 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48687 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48688 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: i40e: Fix kernel crash during module removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48688 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48693 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48697 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: nvmet: fix a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48698 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: fix memory leak when using debugfs_lookup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48699 | 中危 | 4.19.194-3 |  | kernel: sched/debug: fix dentry leak in update_sched_domain_debugfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48701 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48702 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48702 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48703 | 中危 | 4.19.194-3 |  | kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48704 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: drm/radeon: add a force flush to delay work when radeon 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48704 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-03 18:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48706 | 中危 | 4.19.194-3 |  | kernel: vdpa: ifcvf: Do proper cleanup if IFCVF init fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48706 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48708 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: pinctrl: single: fix potential NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48708 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48710 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: drm/radeon: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48710 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48711 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: tipc: improve size validations for received domain records 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48712 | 中危 | 4.19.194-3 |  | kernel: ext4: fix error handling in ext4_fc_record_modified_inode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48715 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48717 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ASoC: max9759: fix underflow in speaker_gain_control_put() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48717 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48722 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: ieee802154: ca8210: Stop leaking skb's 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48722 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48724 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-09-18 16:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48731 | 中危 | 4.19.194-3 |  | kernel: mm/kmemleak: avoid scanning potential huge holes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48731 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-10-29 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48734 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix deadlock between quota disable and qgroup rescan worker 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48734 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-08-19 17:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48738 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48738 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48739 | 中危 | 4.19.194-3 |  | kernel: ASoC: hdmi-codec: Fix OOB memory accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48743 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: net: amd-xgbe: Fix skb data length underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48744 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Avoid field-overflowing memcpy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48747 | 中危 | 4.19.194-3 |  | kernel: block: Fix wrong offset in bio_truncate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48751 | 中危 | 4.19.194-3 |  | kernel: net/smc: Transitional solution for clcsock race issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48754 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: phylib: fix potential use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48755 | 中危 | 4.19.194-3 |  | kernel: powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48756 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-09-18 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48759 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48760 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48761 | 中危 | 4.19.194-3 |  | kernel: usb: xhci-plat: fix crash when suspend if remote wake enable 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-10-30 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48763 | 中危 | 4.19.194-3 |  | kernel: KVM: x86: Forcibly leave nested virt when SMM state is toggled 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48765 | 中危 | 4.19.194-3 |  | kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48766 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48769 | 中危 | 4.19.194-3 |  | kernel: efi: runtime: avoid EFIv2 runtime services on Apple x86 machines 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48771 | 中危 | 4.19.194-3 | 4.19.232-1 | kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48772 | 中危 | 4.19.194-3 |  | kernel: media: lgdt3306a: Add a check against null-pointer-def 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-09-03 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48773 | 中危 | 4.19.194-3 |  | kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48775 | 中危 | 4.19.194-3 |  | kernel: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-09-11 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48776 | 中危 | 4.19.194-3 |  | kernel: mtd: parsers: qcom: Fix missing free for pparts in cleanup 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48777 | 中危 | 4.19.194-3 |  | kernel: mtd: parsers: qcom: Fix kernel panic on skipped partition 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48777 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48780 | 中危 | 4.19.194-3 |  | kernel: net/smc: Avoid overwriting the copies of clcsock callback functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48780 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48781 | 中危 | 4.19.194-3 |  | kernel: crypto: af_alg - get rid of alg_memory_allocated 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48781 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48784 | 中危 | 4.19.194-3 |  | kernel: cfg80211: fix race in netlink owner interface destruction 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48784 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48785 | 中危 | 4.19.194-3 |  | kernel: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48785 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48786 | 中危 | 4.19.194-3 |  | kernel: vsock: remove vsock from connected table when connect is interrupted by a signal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48786 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48793 | 中危 | 4.19.194-3 |  | kernel: KVM: x86: nSVM: fix potential NULL derefernce on nested migration 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48793 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48794 | 中危 | 4.19.194-3 |  | kernel: net: ieee802154: at86rf230: Stop leaking skb's 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48795 | 中危 | 4.19.194-3 |  | kernel: parisc: Fix data TLB miss in sba_unmap_sg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48795 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48797 | 中危 | 4.19.194-3 |  | kernel: mm: don't try to NUMA-migrate COW pages that have other uses 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48797 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48798 | 中危 | 4.19.194-3 |  | kernel: s390/cio: verify the driver availability for path_event call 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48798 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48799 | 中危 | 4.19.194-3 |  | kernel: perf: Fix list corruption in perf_cgroup_switch() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48800 | 中危 | 4.19.194-3 |  | kernel: mm: vmscan: remove deadlock due to throttling failing to make progress 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-21 18:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48801 | 中危 | 4.19.194-3 |  | kernel: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48802 | 中危 | 4.19.194-3 |  | kernel: fs/proc: task_mmu.c: don't read mapcount for migration entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48802 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48803 | 中危 | 4.19.194-3 |  | kernel: phy: ti: Fix missing sentinel for clk_div_table 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48804 | 中危 | 4.19.194-3 |  | kernel: vt_ioctl: fix array_index_nospec in vt_setactivate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-09-09 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48806 | 中危 | 4.19.194-3 |  | kernel: eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48807 | 中危 | 4.19.194-3 |  | kernel: ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48807 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48808 | 中危 | 4.19.194-3 |  | kernel: net: dsa: fix panic when DSA master device unbinds on shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48808 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48809 | 中危 | 4.19.194-3 |  | kernel: net: fix a memleak when uncloning an skb dst and its metadata 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48809 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:18 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48810 | 中危 | 4.19.194-3 |  | kernel: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48810 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48811 | 中危 | 4.19.194-3 |  | kernel: ibmvnic: don't release napi in __ibmvnic_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48811 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48812 | 中危 | 4.19.194-3 |  | kernel: net: dsa: lantiq_gswip: don't use devres for mdiobus 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48813 | 中危 | 4.19.194-3 |  | kernel: net: dsa: felix: don't use devres for mdiobus 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48814 | 中危 | 4.19.194-3 |  | kernel: net: dsa: seville: register the mdiobus under devres 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48814 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48815 | 中危 | 4.19.194-3 |  | kernel: net: dsa: bcm_sf2: don't use devres for mdiobus 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48816 | 中危 | 4.19.194-3 |  | kernel: SUNRPC: lock against ->sock changing during sysfs read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48816 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48817 | 中危 | 4.19.194-3 |  | kernel: net: dsa: ar9331: register the mdiobus under devres 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48818 | 中危 | 4.19.194-3 |  | kernel: net: dsa: mv88e6xxx: don't use devres for mdiobus 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48818 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48819 | 中危 | 4.19.194-3 |  | kernel: tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48819 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48821 | 中危 | 4.19.194-3 |  | kernel: misc: fastrpc: avoid double fput() on failed usercopy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48821 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48823 | 中危 | 4.19.194-3 |  | kernel: scsi: qedf: Fix refcount issue when LOGO is received during TMF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48824 | 中危 | 4.19.194-3 |  | kernel: scsi: myrs: Fix crash in error case 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48825 | 中危 | 4.19.194-3 |  | kernel: scsi: qedf: Add stag_work to all the vports 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48826 | 中危 | 4.19.194-3 |  | kernel: drm/vc4: Fix deadlock on DSI device attach error 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-09-05 19:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48827 | 中危 | 4.19.194-3 |  | kernel: NFSD: Fix the behavior of READ near OFFSET_MAX 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48828 | 中危 | 4.19.194-3 |  | kernel: NFSD: Fix ia_size underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48829 | 中危 | 4.19.194-3 |  | kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48829 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48830 | 中危 | 4.19.194-3 |  | kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48830 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48831 | 中危 | 4.19.194-3 |  | kernel: ima: fix reference leak in asymmetric_verify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48831 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48832 | 中危 | 4.19.194-3 |  | kernel: audit: don't deref the syscall args when checking the openat2 open_how::flags 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48832 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48833 | 中危 | 4.19.194-3 |  | kernel: btrfs: skip reserved bytes warning on unmount after log cleanup failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48833 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48835 | 中危 | 4.19.194-3 |  | kernel: scsi: mpt3sas: Page fault in reply q processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48836 | 中危 | 4.19.194-3 |  | kernel: Input: aiptek - properly check endpoint type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48836 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48838 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48839 | 中危 | 4.19.194-3 |  | kernel: net/packet: fix slab-out-of-bounds access in packet_recvmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48839 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-18 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48840 | 中危 | 4.19.194-3 |  | kernel: iavf: Fix hang during reboot/shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-17 20:37 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48841 | 中危 | 4.19.194-3 |  | kernel: ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48841 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-17 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48842 | 中危 | 4.19.194-3 |  | kernel: ice: Fix race condition during interface enslave 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48842 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-17 20:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48843 | 中危 | 4.19.194-3 |  | kernel: drm/vrr: Set VRR capable prop only if it is attached to connector 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:25 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48844 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_core: Fix leaking sent_cmd skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48845 | 中危 | 4.19.194-3 |  | kernel: MIPS: smp: fill in sibling and core maps earlier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 19:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48846 | 中危 | 4.19.194-3 |  | kernel: block: release rq qos structures for queue without disk 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-24 17:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48849 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: bypass tiling flag check in virtual display case (v2) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48850 | 中危 | 4.19.194-3 |  | kernel: net-sysfs: add check for netdevice being present to speed_show 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48853 | 中危 | 4.19.194-3 |  | kernel: swiotlb: fix info leak with DMA_FROM_DEVICE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48856 | 中危 | 4.19.194-3 |  | kernel: gianfar: ethtool: Fix refcount leak in gfar_get_ts_info 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48856 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:11 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48857 | 中危 | 4.19.194-3 |  | kernel: NFC: port100: fix use-after-free in port100_send_complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48857 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48859 | 中危 | 4.19.194-3 |  | kernel: net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48860 | 中危 | 4.19.194-3 |  | kernel: ethernet: Fix error handling in xemaclite_of_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48860 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48861 | 中危 | 4.19.194-3 |  | kernel: vdpa: fix use-after-free on vp_vdpa_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48862 | 中危 | 4.19.194-3 |  | kernel: vhost: fix hung thread due to erroneous iotlb entries 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48863 | 中危 | 4.19.194-3 |  | kernel: mISDN: Fix memory leak in dsp_pipeline_build() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48864 | 中危 | 4.19.194-3 |  | kernel: vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48865 | 中危 | 4.19.194-3 |  | kernel: tipc: fix kernel panic when enabling bearer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 14:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48868 | 中危 | 4.19.194-3 |  | kernel: dmaengine: idxd: Let probe fail when workqueue cannot be enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-04 18:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48869 | 中危 | 4.19.194-3 |  | kernel: USB: gadgetfs: Fix race between mounting and unmounting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48870 | 中危 | 4.19.194-3 |  | kernel: tty: fix possible null-ptr-defer in spk_ttyio_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:20 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48875 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: sdata can be NULL during AMPDU start 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-04 18:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48876 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: fix initialization of rx->link and rx->link_sta 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48877 | 中危 | 4.19.194-3 |  | kernel: f2fs: let's avoid panic if extent_tree is not created 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48877 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-05 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48879 | 中危 | 4.19.194-3 |  | kernel: efi: fix NULL-deref in init error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48879 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48880 | 中危 | 4.19.194-3 |  | kernel: platform/surface: aggregator: Add missing call to ssam_request_sync_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48882 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48882 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48883 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48883 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48884 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix command stats access after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48884 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48885 | 中危 | 4.19.194-3 |  | kernel: ice: Fix potential memory leak in ice_gnss_tty_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48885 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48886 | 中危 | 4.19.194-3 |  | kernel: ice: Add check for kzalloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48887 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: Remove rcu locks from user resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48888 | 中危 | 4.19.194-3 |  | kernel: drm/msm/dpu: Fix memory leak in msm_mdss_parse_data_bus_icc_path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48888 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48889 | 中危 | 4.19.194-3 |  | kernel: ASoC: Intel: sof-nau8825: fix module alias overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48889 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48890 | 中危 | 4.19.194-3 |  | kernel: scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48890 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:11 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48891 | 中危 | 4.19.194-3 |  | kernel: regulator: da9211: Use irq handler when ready 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48893 | 中危 | 4.19.194-3 |  | kernel: drm/i915/gt: Cleanup partial engine discovery failures 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48893 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 15:55 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48894 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu-v3: Don't unregister on shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 15:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48895 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu: Don't unregister on shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48895 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48896 | 中危 | 4.19.194-3 |  | kernel: ixgbe: fix pci device refcount leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48897 | 中危 | 4.19.194-3 |  | kernel: arm64/mm: fix incorrect file_map_count for invalid pmd 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48897 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48898 | 中危 | 4.19.194-3 |  | kernel: drm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48899 | 中危 | 4.19.194-3 |  | kernel: drm/virtio: Fix GEM handle creation UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48899 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48901 | 中危 | 4.19.194-3 |  | kernel: btrfs: do not start relocation until in progress drops are done 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48902 | 中危 | 4.19.194-3 |  | kernel: btrfs: do not WARN_ON() if we have PageError set 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 14:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48903 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48904 | 中危 | 4.19.194-3 |  | kernel: iommu/amd: Fix I/O page table memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:55 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48905 | 中危 | 4.19.194-3 |  | kernel: ibmvnic: free reset-work-item when flushing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48906 | 中危 | 4.19.194-3 |  | kernel: mptcp: Correctly set DATA_FIN timeout when number of retransmits is large 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48907 | 中危 | 4.19.194-3 |  | kernel: auxdisplay: lcd2s: Fix memory leak in ->remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48908 | 中危 | 4.19.194-3 |  | kernel: net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48909 | 中危 | 4.19.194-3 |  | kernel: net/smc: fix connection leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48910 | 中危 | 4.19.194-3 |  | kernel: net: ipv6: ensure we call ipv6_mc_down() at most once 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48911 | 中危 | 4.19.194-3 |  | kernel: netfilter: netfilter: nf_queue: fix possible use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48914 | 中危 | 4.19.194-3 |  | kernel: xen/netfront: destroy queues before real_num_tx_queues is zeroed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48915 | 中危 | 4.19.194-3 |  | kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48916 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Fix double list_add when enabling VMD in scalable mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:11 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48917 | 中危 | 4.19.194-3 |  | kernel: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48918 | 中危 | 4.19.194-3 |  | kernel: iwlwifi: mvm: check debugfs_dir ptr before use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48918 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48920 | 中危 | 4.19.194-3 |  | kernel: btrfs: get rid of warning on transaction commit when using flushoncommit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48921 | 中危 | 4.19.194-3 |  | kernel: sched/fair: Fix fault in reweight_entity 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48922 | 中危 | 4.19.194-3 |  | kernel: riscv: fix oops caused by irqsoff latency tracer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 12:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48923 | 中危 | 4.19.194-3 |  | kernel: btrfs: prevent copying too big compressed lzo segment 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-09-12 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48924 | 中危 | 4.19.194-3 |  | kernel: thermal: int340x: fix memory leak in int3400_notify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48928 | 中危 | 4.19.194-3 |  | kernel: iio: adc: men_z188_adc: Fix a resource leak in an error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48929 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48930 | 中危 | 4.19.194-3 |  | kernel: RDMA/ib_srp: Fix a deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48930 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48931 | 中危 | 4.19.194-3 |  | kernel: configfs: fix a race in configfs_{,un}register_subsystem() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48932 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48933 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: fix memory leak during stateful obj update 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48934 | 中危 | 4.19.194-3 |  | kernel: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48935 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: unregister flowtable hooks on netns exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48938 | 中危 | 4.19.194-3 |  | kernel: CDC-NCM: avoid overflow in sanity checking 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48940 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix crash due to incorrect copy_map_value 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 18:37 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48941 | 中危 | 4.19.194-3 |  | kernel: ice: fix concurrent reset and removal of VFs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 18:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48942 | 中危 | 4.19.194-3 |  | kernel: hwmon: Handle failure to register sensor with thermal zone correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 18:25 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48944 | 中危 | 4.19.194-3 |  | kernel: sched: Fix yet more sched_fork() races 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-30 11:15 修改: 2024-09-03 14:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48945 | 中危 | 4.19.194-3 |  | kernel: media: vivid: fix compose size exceed boundary 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-23 10:15 修改: 2024-09-26 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48946 | 中危 | 4.19.194-3 |  | kernel: udf: Fix preallocation discarding at indirect extent boundary 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48947 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: Fix u8 overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:11 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48949 | 中危 | 4.19.194-3 |  | kernel: igb: Initialize mailbox message for VF reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48952 | 中危 | 4.19.194-3 |  | kernel: PCI: mt7621: Add sentinel to quirks table 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48953 | 中危 | 4.19.194-3 |  | kernel: rtc: cmos: Fix event handler registration ordering issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48955 | 中危 | 4.19.194-3 |  | kernel: net: thunderbolt: fix memory leak in tbnet_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48957 | 中危 | 4.19.194-3 |  | kernel: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48957 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 14:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48958 | 中危 | 4.19.194-3 |  | kernel: ethernet: aeroflex: fix potential skb leak in greth_init_rings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 20:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48959 | 中危 | 4.19.194-3 |  | kernel: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48961 | 中危 | 4.19.194-3 |  | kernel: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 20:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48963 | 中危 | 4.19.194-3 |  | kernel: net: wwan: iosm: fix memory leak in ipc_mux_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48963 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48965 | 中危 | 4.19.194-3 |  | kernel: gpio/rockchip: fix refcount leak in rockchip_gpiolib_register() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48968 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: Fix potential memory leak in otx2_init_tc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48968 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48969 | 中危 | 4.19.194-3 |  | kernel: xen-netfront: Fix NULL sring after live migration 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48970 | 中危 | 4.19.194-3 |  | kernel: af_unix: Get user_ns from in_skb in unix_diag_get_exact(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48971 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: Fix not cleanup led when bt_init fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48971 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48972 | 中危 | 4.19.194-3 |  | kernel: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48973 | 中危 | 4.19.194-3 |  | kernel: gpio: amd8111: Fix PCI device reference count leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48974 | 中危 | 4.19.194-3 |  | kernel: netfilter: conntrack: fix using __this_cpu_add in preemptible 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:25 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48975 | 中危 | 4.19.194-3 |  | kernel: gpiolib: fix memory leak in gpiochip_setup_dev() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48976 | 中危 | 4.19.194-3 |  | kernel: netfilter: flowtable_offload: fix using __this_cpu_add in preemptible 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48977 | 中危 | 4.19.194-3 |  | kernel: can: af_can: fix NULL pointer dereference in can_rcv_filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48978 | 中危 | 4.19.194-3 |  | kernel: HID: core: fix shift-out-of-bounds in hid_report_raw_event 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48979 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: fix array index out of bound error in DCN32 DML 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48979 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:40 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48982 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: Fix crash when replugging CSR fake controllers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:12 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48983 | 中危 | 4.19.194-3 |  | kernel: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48983 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48984 | 中危 | 4.19.194-3 |  | kernel: can: slcan: fix freed work crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48985 | 中危 | 4.19.194-3 |  | kernel: net: mana: Fix race on per-CQ variable napi work_done 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48986 | 中危 | 4.19.194-3 |  | kernel: mm/gup: fix gup_pud_range() for dax 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48986 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48987 | 中危 | 4.19.194-3 |  | kernel: media: v4l2-dv-timings.c: fix too strict blanking sanity checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48987 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48989 | 中危 | 4.19.194-3 |  | kernel: fscache: Fix oops due to race with cookie_lru and use_cookie 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48989 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 16:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48992 | 中危 | 4.19.194-3 |  | kernel: ASoC: soc-pcm: Add NULL check in BE reparenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48992 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48994 | 中危 | 4.19.194-3 |  | kernel: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48994 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 13:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48995 | 中危 | 4.19.194-3 |  | kernel: Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48995 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48996 | 中危 | 4.19.194-3 |  | kernel: mm/damon/sysfs: fix wrong empty schemes assumption under online tuning in damon_sysfs_set_schemes() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:37 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48997 | 中危 | 4.19.194-3 |  | kernel: char: tpm: Protect tpm_pm_suspend with locks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-07 17:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49000 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-31 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49002 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49003 | 中危 | 4.19.194-3 |  | kernel: nvme: fix SRCU protection of nvme_ns_head list 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49003 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49004 | 中危 | 4.19.194-3 |  | kernel: riscv: Sync efi page table's kernel mappings before switching 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49005 | 中危 | 4.19.194-3 |  | kernel: ASoC: ops: Fix bounds check for _sx controls 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49005 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:17 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49007 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49008 | 中危 | 4.19.194-3 |  | kernel: can: can327: can327_feed_frame_to_netdev(): fix potential skb leak when netdev is down 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49009 | 中危 | 4.19.194-3 |  | kernel: hwmon: (asus-ec-sensors) Add checks for devm_kcalloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49009 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49010 | 中危 | 4.19.194-3 |  | kernel: hwmon: (coretemp) Check for null before removing sysfs attrs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49011 | 中危 | 4.19.194-3 |  | kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49012 | 中危 | 4.19.194-3 |  | kernel: afs: Fix server->active leak in afs_put_server 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49012 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49013 | 中危 | 4.19.194-3 |  | kernel: sctp: fix memory leak in sctp_stream_outq_migrate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49016 | 中危 | 4.19.194-3 |  | kernel: net: mdiobus: fix unbalanced node reference count 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49018 | 中危 | 4.19.194-3 |  | kernel: mptcp: fix sleep in atomic at close time 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49018 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49019 | 中危 | 4.19.194-3 |  | kernel: net: ethernet: nixge: fix NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49020 | 中危 | 4.19.194-3 |  | kernel: net/9p: Fix a potential socket leak in p9_socket_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49021 | 中危 | 4.19.194-3 |  | kernel: net: phy: fix null-ptr-deref while probe() failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49021 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49024 | 中危 | 4.19.194-3 |  | kernel: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49027 | 中危 | 4.19.194-3 |  | kernel: iavf: Fix error handling in iavf_init_module() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49027 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49028 | 中危 | 4.19.194-3 |  | kernel: ixgbevf: Fix resource leak in ixgbevf_init_module() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49033 | 中危 | 4.19.194-3 |  | kernel: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49033 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-30 21:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49035 | 中危 | 4.19.194-3 |  | kernel: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49035 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2025-01-02 15:15 修改: 2025-01-02 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0160 | 中危 | 4.19.194-3 |  | kernel: possibility of deadlock in libbpf function sock_hash_delete_elem 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-18 17:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0394 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: NULL pointer dereference in rawv6_push_pending_frames 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0394 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-26 21:18 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0458 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-26 19:15 修改: 2023-05-09 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0459 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Copy_from_user on 64-bit versions may leak kernel information 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0459 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-25 14:15 修改: 2023-06-06 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0590 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: use-after-free due to race condition in qdisc_graft() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 21:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0597 | 中危 | 4.19.194-3 |  | kernel: x86/mm: Randomize per-cpu entry area 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-23 20:15 修改: 2023-07-28 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0615 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: multiple issues for the Video for Linux version 2 test driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-06 23:15 修改: 2023-02-14 23:38 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1073 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: HID: check empty report_list in hid_validate_values() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1074 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: sctp: fail if no bound addresses can be used for a given scope 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1076 | 中危 | 4.19.194-3 |  | kernel: tap: tap_open(): correctly initialize socket uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-05-03 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1079 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: hid: Use After Free in asus_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1079 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1095 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-28 23:15 修改: 2023-03-06 14:41 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1206 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: hash collisions in the IPv6 connection lookup table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-30 22:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1249 | 中危 | 4.19.194-3 |  | kernel: missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1249 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1382 | 中危 | 4.19.194-3 | 4.19.269-1 | kernel: denial of service in tipc_conn_close 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1382 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 23:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1582 | 中危 | 4.19.194-3 |  | kernel: Soft lockup occurred during __page_mapcount 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1582 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-05 20:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1637 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: save/restore speculative MSRs during S3 suspend/resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1637 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 22:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1855 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: use-after-free bug in remove function xgene_hwmon_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-05 20:15 修改: 2023-11-07 04:05 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1859 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Use after free in xen_9pfs_front_remove due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-17 23:15 修改: 2023-11-07 04:05 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1990 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Use after free bug in ndlc_remove due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-12 20:15 修改: 2023-11-07 04:05 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1998 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Spectre v2 SMT mitigations problem 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-21 15:15 修改: 2023-05-03 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2002 | 中危 | 4.19.194-3 | 4.19.289-1 | Kernel: bluetooth: Unauthorized management command execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-26 17:15 修改: 2024-02-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-20569 | 中危 | 4.19.194-3 |  | amd: Return Address Predictor vulnerability leading to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20569 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-08 18:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-20588 | 中危 | 4.19.194-3 |  | hw: amd: division-by-zero may resulting in loss of confidentiality 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-08 18:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-20593 | 中危 | 4.19.194-3 | 4.19.289-1 | hw: amd: Cross-Process Information Leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 20:15 修改: 2024-11-19 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2162 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: UAF during login when accessing the shost ipaddress 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 20:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2177 | 中危 | 4.19.194-3 |  | Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2177 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-20 21:15 修改: 2023-04-28 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2194 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-20 21:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2269 | 中危 | 4.19.194-3 | 4.19.289-1 | kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-25 21:15 修改: 2024-02-01 01:33 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23454 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: slab-out-of-bounds read vulnerabilities in cbq_classify 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-12 07:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23455 | 中危 | 4.19.194-3 | 4.19.282-1 | Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23455 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-12 07:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-24023 | 中危 | 4.19.194-3 |  | kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-28 07:15 修改: 2024-08-01 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2513 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ext4: use-after-free in ext4_xattr_set_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2513 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-08 21:15 修改: 2023-11-07 04:12 | 
                            
                            
                                | linux-libc-dev | CVE-2023-26545 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: mpls: double free on sysctl allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-25 04:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28328 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28328 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 23:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2860 | 中危 | 4.19.194-3 | 4.19.260-1 | kernel: ipv6: sr: out-of-bounds read when setting HMAC data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2860 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 16:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28746 | 中危 | 4.19.194-3 |  | kernel: Local information disclosure on Intel(R) Atom(R) processors 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28746 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-14 17:15 修改: 2024-06-25 23:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28772 | 中危 | 4.19.194-3 | 4.19.208-1 | kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 15:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2985 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: use-after-free issue in hfsplus_release_folio in fs/hfsplus/super.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-01 01:15 修改: 2023-06-07 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3006 | 中危 | 4.19.194-3 |  | RHEL: Add Spectre-BHB mitigation for AmpereOne 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-31 20:15 修改: 2023-06-08 02:38 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3022 | 中危 | 4.19.194-3 |  | kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-19 18:15 修改: 2023-06-29 17:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-30456 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-10 02:15 修改: 2023-07-26 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-30772 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: da9150: race condition leading to use-after-free in da9150_charger_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-16 04:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31082 | 中危 | 4.19.194-3 |  | kernel: sleeping function called from an invalid context in gsmld_write 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 06:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31083 | 中危 | 4.19.194-3 |  | kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31084 | 中危 | 4.19.194-3 | 4.19.289-1 | kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3159 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: use after free issue in driver/firewire in outbound_phy_packet_callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-12 21:15 修改: 2023-06-20 20:29 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3161 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: fbcon: shift-out-of-bounds in fbcon_set_font() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3161 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-12 20:15 修改: 2023-06-22 00:17 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3212 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-23 20:15 修改: 2024-01-11 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3220 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: NULL pointer dereference in dpu_crtc_atomic_check() in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3220 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-20 20:15 修改: 2023-06-27 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-32269 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: user after free in nr_listen in net/netrom/af_netrom.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-05 17:15 修改: 2023-05-11 23:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-33203 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33203 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-18 08:15 修改: 2023-05-26 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2023-33288 | 中危 | 4.19.194-3 |  | kernel: use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33288 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-22 03:15 修改: 2023-11-07 04:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3338 | 中危 | 4.19.194-3 | 4.19.289-1 | kernel: DECnet: crash due to a NULL pointer dereference in the dn_nsp_send function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3338 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-30 22:15 修改: 2023-11-07 04:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3358 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-28 22:15 修改: 2023-07-06 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3397 | 中危 | 4.19.194-3 |  | kernel: slab-use-after-free Write in txEnd due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-01 20:15 修改: 2023-11-09 15:09 | 
                            
                            
                                | linux-libc-dev | CVE-2023-34256 | 中危 | 4.19.194-3 | 4.19.289-1 | An issue was discovered in the Linux kernel before 6.3.3. There is an  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-31 20:15 修改: 2024-08-02 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-34324 | 中危 | 4.19.194-3 | 4.19.304-1 | Closing of an event channel in the Linux kernel can result in a deadlo ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34324 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-05 17:15 修改: 2024-01-11 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-37453 | 中危 | 4.19.194-3 |  | kernel: usb: out-of-bounds read in read_descriptors 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37453 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-06 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-37454 | 中危 | 4.19.194-3 |  | kernel: udf: use-after-free write in udf_close_lvid 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37454 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-06 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3772 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-25 16:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3863 | 中危 | 4.19.194-3 |  | kernel: use-after-free in nfc_llcp_find_loca in net/nfc/llcp_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 15:15 修改: 2024-02-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39176 | 中危 | 4.19.194-3 |  | kernel: ksmbd: Transform Header Out-Of-Bounds Read Information Disclosure Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-18 10:15 修改: 2024-11-18 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39180 | 中危 | 4.19.194-3 |  | kernel: ksmbd: Read Request Memory Leak Denial-of-Service Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-18 10:15 修改: 2024-11-18 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39189 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39192 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: netfilter: xtables out-of-bounds read in u32_match_it() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39193 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: netfilter: xtables sctp out-of-bounds read in match_flags() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39194 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-39198 | 中危 | 4.19.194-3 |  | kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-09 20:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4010 | 中危 | 4.19.194-3 |  | kernel: usb: hcd: malformed USB descriptor leads to infinite loop in usb_giveback_urb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-31 17:15 修改: 2023-11-07 04:22 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4132 | 中危 | 4.19.194-3 |  | kernel: smsusb: use-after-free caused by do_submit_urb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4132 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-03 15:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4133 | 中危 | 4.19.194-3 |  | kernel: cxgb4: use-after-free in ch_flower_stats_cb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4133 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-03 15:15 修改: 2024-05-22 17:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4194 | 中危 | 4.19.194-3 |  | kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-07 14:15 修改: 2024-09-06 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-42754 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-42755 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: rsvp: out-of-bounds read in rsvp_classify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4385 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: jfs: NULL pointer dereference in dbFree() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4385 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-16 17:15 修改: 2023-11-07 04:22 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4458 | 中危 | 4.19.194-3 |  | kernel: ksmbd: smb2_open out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-14 12:15 修改: 2024-11-15 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4459 | 中危 | 4.19.194-3 | 4.19.249-1 | kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4459 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-21 19:15 修改: 2024-04-25 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4569 | 中危 | 4.19.194-3 |  | kernel: information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4569 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-28 22:15 修改: 2023-11-07 04:22 | 
                            
                            
                                | linux-libc-dev | CVE-2023-45862 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: drivers/usb/storage/ene_ub6250.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-14 21:15 修改: 2024-01-08 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2023-45863 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-14 21:15 修改: 2024-01-11 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-46343 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46343 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 10:15 修改: 2024-01-29 22:51 | 
                            
                            
                                | linux-libc-dev | CVE-2023-47233 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Use after free in brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-03 21:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52429 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: missing check for struct in dm-table.c can cause a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52429 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-12 03:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52435 | 中危 | 4.19.194-3 |  | kernel: net: prevent mss overflow in skb_segment() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-20 20:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52443 | 中危 | 4.19.194-3 | 4.19.316-1 | In the Linux kernel, the following vulnerability has been resolved:  a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52443 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52449 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52449 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52458 | 中危 | 4.19.194-3 |  | kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-23 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52470 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: null-ptr-deref in alloc_workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52470 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:27 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52476 | 中危 | 4.19.194-3 |  | kernel: perf/x86/lbr: Filter vsyscall addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-02-29 13:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52477 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-12-09 18:39 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52478 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52478 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-02-29 13:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52479 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix uaf in smb20_oplock_break_ack 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-11-05 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52481 | 中危 | 4.19.194-3 |  | kernel: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52481 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-11-04 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52482 | 中危 | 4.19.194-3 |  | kernel: x86/srso: Add SRSO mitigation for Hygon processors 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52482 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52484 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 06:15 修改: 2024-12-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52485 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Wake DMCUB before sending a command cause deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52485 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 15:15 修改: 2024-02-29 18:06 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52486 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52486 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52488 | 中危 | 4.19.194-3 |  | kernel: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52488 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52498 | 中危 | 4.19.194-3 |  | kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52498 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-12-12 17:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52500 | 中危 | 4.19.194-3 |  | kernel: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52501 | 中危 | 4.19.194-3 |  | kernel: ring-buffer: Do not attempt to read past "commit" 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52501 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52508 | 中危 | 4.19.194-3 |  | kernel: nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52508 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-10-31 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52511 | 中危 | 4.19.194-3 |  | kernel: spi: sun6i: reduce DMA RX transfer width to single byte 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52511 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-06 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52516 | 中危 | 4.19.194-3 |  | kernel: dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52516 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52517 | 中危 | 4.19.194-3 |  | kernel: spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52517 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52522 | 中危 | 4.19.194-3 |  | kernel: net: fix possible store tearing in neigh_periodic_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52525 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52525 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-04-04 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52527 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52527 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52528 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52528 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52566 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: nilfs2: potential use after free in nilfs_gccache_submit_read_data() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52567 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: serial: 8250_port: IRQ data NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52567 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:26 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52574 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: team: NULL pointer dereference when team device type is changed 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52577 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: dccp: out-of-bounds access in dccp_v4_err() and dccp_v6_err() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52577 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52583 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ceph: fix deadlock or deadcode of misusing dget() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52583 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52584 | 中危 | 4.19.194-3 |  | kernel: spmi: mediatek: Fix UAF on device remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-08-06 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52585 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-06 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52586 | 中危 | 4.19.194-3 |  | kernel: drm/msm/dpu: Add mutex lock in control vblank irq 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-03-06 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52587 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: IB/ipoib: Fix mcast list locking 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52589 | 中危 | 4.19.194-3 |  | kernel: media: rkisp1: Fix IRQ disable race issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-03-06 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52591 | 中危 | 4.19.194-3 |  | kernel: reiserfs: Avoid touching renamed directory if parent does not change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-01 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52593 | 中危 | 4.19.194-3 |  | kernel: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 15:10 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52595 | 中危 | 4.19.194-3 |  | kernel: wifi: rt2x00: restart beacon queue when hardware reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52595 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-12-12 15:10 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52596 | 中危 | 4.19.194-3 |  | kernel: sysctl: Fix out of bounds access for empty sysctl registers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-03-06 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52597 | 中危 | 4.19.194-3 |  | kernel: KVM: s390: fix setting of fpc register 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-07 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52598 | 中危 | 4.19.194-3 |  | kernel: s390/ptrace: handle setting of fpc register correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52601 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: jfs: fix array-index-out-of-bounds in dbAdjTree 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-12 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52602 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: jfs: fix slab-out-of-bounds Read in dtSearch 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52607 | 中危 | 4.19.194-3 |  | kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-06 07:15 修改: 2024-11-05 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52609 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: binder: fix race between mmput() and do_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52609 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52612 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: crypto: scomp - fix req->dst buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52612 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52615 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-12-12 15:20 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52617 | 中危 | 4.19.194-3 |  | kernel: PCI: switchtec: Fix stdev_release() crash after surprise hot remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52617 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52618 | 中危 | 4.19.194-3 |  | kernel: block/rnbd-srv: Check for unlikely string overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-06 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52619 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: pstore/ram: Fix crash when setting number of cpus to an odd number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52621 | 中危 | 4.19.194-3 |  | kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52622 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: avoid online resizing failures due to oversized flex bg 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52623 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: SUNRPC: Fix a suspicious RCU usage warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-11-04 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52624 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Wake DMCUB before executing GPINT commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52625 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52625 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52629 | 中危 | 4.19.194-3 |  | kernel: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52629 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-29 10:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52632 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: lock dependency warning with srcu 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52632 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52633 | 中危 | 4.19.194-3 |  | kernel: um: time-travel: fix time corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52634 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix disable_otg_wa logic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52634 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52635 | 中危 | 4.19.194-3 |  | kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52635 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52638 | 中危 | 4.19.194-3 |  | kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52638 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52639 | 中危 | 4.19.194-3 |  | kernel: KVM: s390: vsie: fix race during shadow creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52639 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52641 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52641 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52642 | 中危 | 4.19.194-3 |  | kernel: media: rc: bpf attach/detach requires write permission 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52644 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52644 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52646 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: aio: fix mremap after fork null-deref 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-26 13:15 修改: 2024-04-26 15:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52650 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52650 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:09 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52652 | 中危 | 4.19.194-3 |  | kernel: NTB: fix possible name leak in ntb_register_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52652 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52653 | 中危 | 4.19.194-3 |  | kernel: SUNRPC: fix a memleak in gss_import_v2_context 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52653 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-05 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52655 | 中危 | 4.19.194-3 |  | kernel: usb: aqc111: check packet for fixup for true limit 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 14:23 修改: 2024-05-14 16:13 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52656 | 中危 | 4.19.194-3 |  | kernel: io_uring: drop any code related to SCM_RIGHTS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 14:23 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52660 | 中危 | 4.19.194-3 |  | kernel: media: rkisp1: Fix IRQ handling due to shared interrupts 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52660 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52664 | 中危 | 4.19.194-3 |  | kernel: net: atlantic: eliminate double free in error handling logic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52669 | 中危 | 4.19.194-3 |  | kernel: crypto: s390/aes - Fix buffer overread in CTR mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52670 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: rpmsg: virtio: Free driver_override when rpmsg_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52670 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52671 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52673 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix a debugfs null pointer error 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-07 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52675 | 中危 | 4.19.194-3 |  | kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52676 | 中危 | 4.19.194-3 |  | kernel: bpf: Guard stack limits against 32bit overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52679 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: of: Fix double free in of_parse_phandle_with_args_map 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52683 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ACPI: LPIT: Avoid u32 multiplication overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52683 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52686 | 中危 | 4.19.194-3 |  | kernel: powerpc/powernv: Add a null pointer check in opal_event_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52691 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/amd/pm: fix a double-free in si_dpm_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52693 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ACPI: video: check for error while searching for backlight device parent 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52698 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: calipso: fix memory leak in netlbl_calipso_add_pass() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52699 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: sysv: don't call sb_bread() with pointers_lock held 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-06 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52700 | 中危 | 4.19.194-3 |  | kernel: tipc: fix kernel warning when sending SYN message 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52705 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: nilfs2: fix underflow in second superblock position calculations 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52705 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:18 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52708 | 中危 | 4.19.194-3 |  | kernel: mmc: mmc_spi: fix error handling in mmc_spi_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52708 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52730 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: mmc: sdio: fix possible resource leaks in some error paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52732 | 中危 | 4.19.194-3 |  | kernel: ceph: blocklist the kclient when receiving corrupted snap trace 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52733 | 中危 | 4.19.194-3 |  | kernel: s390/decompressor: specify __decompress() buf len to avoid overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52735 | 中危 | 4.19.194-3 |  | kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52736 | 中危 | 4.19.194-3 |  | kernel: ALSA: hda: Do not unset preset when cleaning up codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52736 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52737 | 中危 | 4.19.194-3 |  | kernel: btrfs: lock the inode in shared mode before starting fiemap 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52741 | 中危 | 4.19.194-3 |  | kernel: cifs: Fix use-after-free in rdata->read_into_pages() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52742 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: net: USB: Fix wrong-direction WARNING in plusb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52743 | 中危 | 4.19.194-3 |  | kernel: ice: Do not use WQ_MEM_RECLAIM flag for workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52745 | 中危 | 4.19.194-3 |  | kernel: IB/IPoIB: Fix legacy IPoIB due to wrong number of queues 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52747 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: IB/hfi1: Restore allocated resources on failed copyout 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52748 | 中危 | 4.19.194-3 |  | kernel: f2fs: avoid format-overflow warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52748 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52749 | 中危 | 4.19.194-3 |  | kernel: spi: Fix null dereference on suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52749 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52750 | 中危 | 4.19.194-3 |  | kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52753 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: drm/amd/display: Avoid NULL dereference of timing generator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:12 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52754 | 中危 | 4.19.194-3 |  | kernel: media: imon: fix access to invalid resource for the second interface 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52757 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix potential deadlock when releasing mids 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52761 | 中危 | 4.19.194-3 |  | kernel: riscv: VMAP_STACK overflow detection thread-safe 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52762 | 中危 | 4.19.194-3 |  | kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52763 | 中危 | 4.19.194-3 |  | kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52764 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52766 | 中危 | 4.19.194-3 |  | kernel: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52774 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: s390/dasd: protect device queue against concurrent access 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52781 | 中危 | 4.19.194-3 |  | kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52781 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52784 | 中危 | 4.19.194-3 |  | kernel: bonding: stop the device in bond_setup_by_slave() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52784 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52789 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: tty: vcc: Add check for kstrdup() in vcc_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52789 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52796 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: ipvlan: add ipvlan_route_v6_outbound() helper 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52803 | 中危 | 4.19.194-3 |  | kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-18 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52804 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: fs/jfs: Add validity check for db_maxag and db_agpref 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52805 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: jfs: fix array-index-out-of-bounds in diAlloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52806 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52808 | 中危 | 4.19.194-3 |  | kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52808 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52809 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52809 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52810 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: fs/jfs: Add check for negative db_l2nbperpage 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52810 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52811 | 中危 | 4.19.194-3 |  | kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52811 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-10-31 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52813 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52814 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix potential null pointer derefernce 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52814 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52815 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu/vkms: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52816 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: Fix shift out-of-bounds issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52816 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52817 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-08-08 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52819 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52819 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-05 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52821 | 中危 | 4.19.194-3 |  | kernel: drm/panel: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52821 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-24 01:14 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52825 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-05 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52826 | 中危 | 4.19.194-3 |  | kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:08 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52828 | 中危 | 4.19.194-3 |  | kernel: bpf: Detect IP == ksym.end as part of BPF program 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-05 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52829 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52829 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-04 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52831 | 中危 | 4.19.194-3 |  | kernel: cpu/hotplug: Don't offline the last non-isolated CPU 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52831 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52832 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52832 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52833 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btusb: Add date->evt_skb is NULL check 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52833 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:09 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52834 | 中危 | 4.19.194-3 |  | kernel: atl1c: Work around the DMA RX overflow issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52834 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52835 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: perf/core: Bail out early if the request AUX area is out of bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52836 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: locking/ww_mutex/test: Fix potential workqueue corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52836 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52838 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: fbdev: imsttfb: fix a resource leak in probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-12-04 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52843 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: llc: verify mac len before reading mac header 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52845 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52847 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: media: bttv: fix use after free error due to btv->timeout timer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52853 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: hid: cp2112: Fix duplicate workqueue initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52854 | 中危 | 4.19.194-3 |  | kernel: padata: Fix refcnt handling in padata_free_shell() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52855 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-05 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52864 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: platform/x86: wmi: Fix opening of char device 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52865 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52867 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: drm/radeon: possible buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52868 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: thermal: core: prevent potential string overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52871 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: llcc: Handle a second device without data corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52875 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52878 | 中危 | 4.19.194-3 |  | kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52878 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52880 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 16:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52881 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52881 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-29 11:16 修改: 2024-05-29 13:02 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52882 | 中危 | 4.19.194-3 |  | kernel: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52882 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-04 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52886 | 中危 | 4.19.194-3 |  | kernel: USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 10:15 修改: 2024-08-21 17:28 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52888 | 中危 | 4.19.194-3 |  | kernel: media: mediatek: vcodec: Only free buffer VA that is not NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52888 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52889 | 中危 | 4.19.194-3 |  | kernel: apparmor: Fix null pointer deref when receiving skb during sock creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52889 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 21:19 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52893 | 中危 | 4.19.194-3 |  | kernel: gsmi: fix null-deref in gsmi_get_variable 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52893 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52894 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52895 | 中危 | 4.19.194-3 |  | kernel: io_uring/poll: don't reissue in case of poll race on multishot request 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52895 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52896 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix race between quota rescan and disable leading to NULL pointer deref 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52897 | 中危 | 4.19.194-3 |  | kernel: btrfs: qgroup: do not warn on record without old_roots populated 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52897 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:52 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52898 | 中危 | 4.19.194-3 |  | kernel: xhci: Fix null pointer dereference when host dies 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:46 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52899 | 中危 | 4.19.194-3 |  | kernel: Add exception protection processing for vd in axi_chan_handle_err function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52899 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52900 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix general protection fault in nilfs_btree_insert() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:40 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52901 | 中危 | 4.19.194-3 |  | kernel: usb: xhci: Check endpoint is valid before dereferencing it 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52902 | 中危 | 4.19.194-3 |  | kernel: nommu: fix memory leak in do_mmap() error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:29 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52903 | 中危 | 4.19.194-3 |  | kernel: io_uring: lock overflowing for IOPOLL 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:34 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52904 | 中危 | 4.19.194-3 |  | kernel: ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52905 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: Fix resource leakage in VF driver unbind 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:27 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52907 | 中危 | 4.19.194-3 |  | kernel: nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 16:06 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52908 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix potential NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52909 | 中危 | 4.19.194-3 |  | kernel: nfsd: fix handling of cached open files in nfsd4_open codepath 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52910 | 中危 | 4.19.194-3 |  | kernel: iommu/iova: Fix alloc iova overflows issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:47 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52911 | 中危 | 4.19.194-3 |  | kernel: drm/msm: another fix for the headless Adreno GPU 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:49 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52912 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fixed bug on error when unloading amdgpu 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52913 | 中危 | 4.19.194-3 |  | kernel: drm/i915: Fix potential context UAFs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52914 | 中危 | 4.19.194-3 |  | kernel: io_uring/poll: add hash if ready poll request can't complete inline 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:07 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52915 | 中危 | 4.19.194-3 |  | kernel: media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-06 09:15 修改: 2024-09-10 17:12 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52916 | 中危 | 4.19.194-3 |  | kernel: media: aspeed: Fix memory overwrite if timing is 1600x900 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-06 09:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52917 | 中危 | 4.19.194-3 |  | kernel: ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52918 | 中危 | 4.19.194-3 |  | kernel: media: pci: cx23885: check cx23885_vdev_init() return 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52918 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-22 08:15 修改: 2024-10-24 03:55 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52919 | 中危 | 4.19.194-3 |  | kernel: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-22 08:15 修改: 2024-10-24 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52920 | 中危 | 4.19.194-3 |  | kernel: bpf: support non-r10 register spill/fill to/from stack in precision tracking 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 10:15 修改: 2024-11-07 19:31 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52922 | 中危 | 4.19.194-3 |  | kernel: can: bcm: Fix UAF in bcm_proc_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-28 15:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6121 | 中危 | 4.19.194-3 |  | kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6121 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-16 15:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6240 | 中危 | 4.19.194-3 |  | kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-04 14:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6915 | 中危 | 4.19.194-3 |  | kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-15 10:15 修改: 2024-09-14 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-7042 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-21 20:15 修改: 2024-09-28 04:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-7122 | 中危 | 4.19.194-3 |  | kernel: slab-use-after-free in iommufd_test 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | linux-libc-dev | CVE-2023-7192 | 中危 | 4.19.194-3 | 4.19.282-1 | kernel: refcount leak in ctnetlink_create_conntrack() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-02 19:15 修改: 2024-04-25 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0340 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0340 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-09 18:15 修改: 2024-11-12 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0607 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nf_tables: pointer math issue in nft_byteorder_eval() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-18 16:15 修改: 2024-09-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0639 | 中危 | 4.19.194-3 | 4.19.304-1 | kernel: potential deadlock on &net->sctp.addr_wq_lock leading to DOS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0639 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-17 16:15 修改: 2024-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-1151 | 中危 | 4.19.194-3 |  | kernel: stack overflow problem in Open vSwitch kernel module leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-11 15:15 修改: 2024-11-12 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-2193 | 中危 | 4.19.194-3 |  | hw: Spectre-SRC that is Speculative Race Conditions (SRCs) for synchronization primitives similar like Spectre V1 with possibility to bypass software features (e.g., IPIs, high-precision timers, etc) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-15 18:15 修改: 2024-10-29 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-2201 | 中危 | 4.19.194-3 |  | hw: cpu: intel: Native Branch History Injection (BHI) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2201 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-19 21:15 修改: 2024-12-19 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-22099 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: NULL Pointer dereference  bluetooth allows Overflow Buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22099 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-25 07:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-22386 | 中危 | 4.19.194-3 | 4.19.304-1 | A race condition was found in the Linux kernel's drm/exynos device dri ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22386 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-02-10 04:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-23196 | 中危 | 4.19.194-3 |  | kernel: Race condition in snd_hdac_regmap_sync() in sound/hda 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23196 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-02-10 04:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-23848 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: use-after-free in cec_queue_msg_fh 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23848 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 09:15 修改: 2024-01-30 02:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-23849 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 09:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-23851 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: copy_params can attempt to allocate more than INT_MAX bytes  and crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-23 09:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24855 | 中危 | 4.19.194-3 |  | kernel: Race condition in lpfc_unregister_fcf_rescan() in scsi/lpfc/lpfc_hbadisc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-02-10 04:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24857 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24857 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24858 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24859 | 中危 | 4.19.194-3 |  | kernel: bluetooth: race condition in sniff_{min,max}_interval_set() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-02-10 04:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24861 | 中危 | 4.19.194-3 | 4.19.316-1 | A race condition was found in the Linux kernel's media/xc4000 device d ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-24864 | 中危 | 4.19.194-3 |  | A race condition was found in the Linux kernel's media/dvb-core in dvb ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-05 08:15 修改: 2024-02-10 04:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-25739 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: crash due to a missing check for leb_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-12 03:15 修改: 2024-06-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-25740 | 中危 | 4.19.194-3 |  | kernel: memory leak in ubi driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-12 03:15 修改: 2024-02-26 21:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-25741 | 中危 | 4.19.194-3 |  | kernel: f_printer: crash leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-12 03:15 修改: 2024-09-06 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26584 | 中危 | 4.19.194-3 |  | kernel: tls: handle backlogging of crypto requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-21 15:15 修改: 2024-05-25 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26586 | 中危 | 4.19.194-3 |  | kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-22 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26600 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:27 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26602 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:28 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26606 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: signal epoll threads of self-work 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-26 16:28 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26615 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-12-12 15:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26629 | 中危 | 4.19.194-3 |  | kernel: nfsd: fix RELEASE_LOCKOWNER 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26629 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-13 14:15 修改: 2024-06-21 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26633 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-12-20 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26635 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: llc: Drop support for ETH_P_TR_802_2. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26635 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26636 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: llc: make llc_ui_sendmsg() more robust against bonding changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26636 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26640 | 中危 | 4.19.194-3 |  | kernel: tcp: add sanity checks to rx zerocopy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26641 | 中危 | 4.19.194-3 |  | kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26641 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-18 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26642 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_tables: disallow anonymous set with timeout flag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-21 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26644 | 中危 | 4.19.194-3 |  | kernel: btrfs: don't abort filesystem when attempting to snapshot deleted subvolume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26644 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 16:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26645 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tracing: Ensure visibility when inserting an element into tracing_map 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 16:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26646 | 中危 | 4.19.194-3 |  | kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26646 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26647 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix late dereference 'dsc' check in 'link_set_dsc_pps_packet()' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26647 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26648 | 中危 | 4.19.194-3 |  | kernel: NULL check in edp_setup_replay() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26648 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-26 18:15 修改: 2024-11-06 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26651 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: sr9800: Add check for usbnet_get_endpoints 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 14:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26654 | 中危 | 4.19.194-3 |  | kernel: ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26654 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-01 09:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26656 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26658 | 中危 | 4.19.194-3 |  | kernel: bcachefs: grab s_umount only if snapshotting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26659 | 中危 | 4.19.194-3 |  | kernel: xhci: handle isoc Babble and Buffer Overrun events properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26663 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26664 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: hwmon: (coretemp) Fix out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26671 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: blk-mq: fix IO hang from sbitmap wakeup race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26672 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-07 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26675 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ppp_async: limit MRU to 64K 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26677 | 中危 | 4.19.194-3 |  | kernel: rxrpc: Fix delayed ACKs to not set the reference serial number 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26679 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: inet: read sk->sk_family once in inet_recv_error() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-02 07:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26685 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix potential bug in end_buffer_async_write 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26685 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-07 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26686 | 中危 | 4.19.194-3 |  | kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26687 | 中危 | 4.19.194-3 |  | kernel: xen/events: close evtchn after mapping cleanup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26689 | 中危 | 4.19.194-3 |  | kernel: ceph: prevent use-after-free in encode_cap_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26689 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26691 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Fix circular locking dependency 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26696 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26697 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix data corruption in dsync block recovery for small block sizes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26699 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26700 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix MST Null Ptr for RV 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26704 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: fix double-free of blocks due to wrong extents moved_len 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26704 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26706 | 中危 | 4.19.194-3 |  | kernel: parisc: Fix random data corruption from exception handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26706 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26715 | 中危 | 4.19.194-3 |  | kernel: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26719 | 中危 | 4.19.194-3 |  | kernel: nouveau: offload fence uevents work to workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26719 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26722 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26722 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26726 | 中危 | 4.19.194-3 |  | kernel: btrfs: don't drop extent_map for free space inode on write error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26733 | 中危 | 4.19.194-3 |  | kernel: arp: Prevent overflow in arp_req_get(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26735 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26736 | 中危 | 4.19.194-3 |  | kernel: afs: Increase buffer size in afs_update_volume_status() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26736 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26739 | 中危 | 4.19.194-3 |  | kernel: net/sched: act_mirred: don't override retval if we already lost the skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26740 | 中危 | 4.19.194-3 |  | kernel: net/sched: act_mirred: use the backlog for mirred ingress 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26743 | 中危 | 4.19.194-3 |  | kernel: RDMA/qedr: Fix qedr_create_user_qp error flow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26744 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26747 | 中危 | 4.19.194-3 |  | kernel: usb: roles: fix NULL pointer issue when put module's reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26751 | 中危 | 4.19.194-3 |  | kernel: ARM: ep93xx: Add terminator to gpiod_lookup_table 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26752 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: l2tp: pass correct message length to ip6_append_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26754 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26756 | 中危 | 4.19.194-3 |  | kernel: md: Don't register sync_thread for reshape directly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26757 | 中危 | 4.19.194-3 |  | kernel: md: Don't ignore read-only array in md_check_recovery() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26758 | 中危 | 4.19.194-3 |  | kernel: md: Don't ignore suspended array in md_check_recovery() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-04 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26759 | 中危 | 4.19.194-3 |  | kernel: mm/swap: fix race when skipping swapcache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26763 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: dm-crypt: don't modify the data when using authenticated encryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26764 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26766 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26766 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26767 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: fixed integer types and null check locations 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26768 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-07 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26769 | 中危 | 4.19.194-3 |  | kernel: nvmet-fc: avoid deadlock on delete association path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-01 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26770 | 中危 | 4.19.194-3 |  | kernel: HID: nvidia-shield: Add missing null pointer checks to LED initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26771 | 中危 | 4.19.194-3 |  | kernel: dmaengine: ti: edma: Add some null pointer checks to the edma_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26772 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26773 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26774 | 中危 | 4.19.194-3 |  | kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26775 | 中危 | 4.19.194-3 |  | kernel: aoe: avoid potential deadlock at set_capacity 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26776 | 中危 | 4.19.194-3 |  | kernel: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26777 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fbdev: sis: Error out if pixclock equals zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26777 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26778 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fbdev: savage: Error out if pixclock equals zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26778 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26779 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: mac80211: fix race condition on enabling fast-xmit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26779 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-11-06 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26801 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-12-20 15:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26804 | 中危 | 4.19.194-3 |  | kernel: net: ip_tunnel: prevent perpetual headroom growth 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-11-12 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26805 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26807 | 中危 | 4.19.194-3 |  | kernel: spi: cadence-qspi: fix pointer reference in runtime PM hooks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26807 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-04 09:15 修改: 2024-06-20 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26810 | 中危 | 4.19.194-3 |  | kernel: vfio/pci: Lock external INTx masking ops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26810 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-05 09:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26811 | 中危 | 4.19.194-3 |  | kernel: ksmbd: validate payload size in ipc response 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26811 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-08 10:15 修改: 2024-04-28 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26812 | 中危 | 4.19.194-3 |  | kernel: vfio/pci: Create persistent INTx handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26812 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-05 09:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26813 | 中危 | 4.19.194-3 |  | kernel: vfio/platform: Create persistent IRQ handlers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-05 09:15 修改: 2024-12-20 14:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26816 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: x86, relocs: Ignore relocations in .notes section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26816 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-10 14:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26817 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: amdkfd: use calloc instead of kzalloc to avoid integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-13 12:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26820 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26820 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26825 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nfc: nci: free rx_data_reassembly skb on NCI device cleanup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26828 | 中危 | 4.19.194-3 |  | kernel: cifs: fix underflow in parse_server_interfaces() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-04 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26830 | 中危 | 4.19.194-3 |  | kernel: i40e: Do not allow untrusted VF to remove administratively set MAC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26830 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26839 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: IB/hfi1: Fix a memleak in init_credit_return 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26839 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26840 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: cachefiles: fix memory leak in cachefiles_add_cache() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26841 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Update cpu_sibling_map when disabling nonboot CPUs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26841 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26842 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Fix shift issue in ufshcd_clear_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26842 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26843 | 中危 | 4.19.194-3 |  | kernel: efi: runtime: Fix potential overflow of soft-reserved region size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26844 | 中危 | 4.19.194-3 |  | kernel: block: Fix WARNING in _copy_from_iter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26845 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: target: core: Add TMF to tmr_list handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26846 | 中危 | 4.19.194-3 |  | kernel: nvme-fc: do not wait in vain when unloading module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 10:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26851 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26857 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: geneve: make sure to pull inner header in geneve_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26857 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-06 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26859 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/bnx2x: Prevent access to a freed page in page_pool 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26863 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: hsr: Fix uninit-value access in hsr_get_node() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26865 | 中危 | 4.19.194-3 |  | kernel: rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26866 | 中危 | 4.19.194-3 |  | kernel: spi: lpspi: Avoid potential use-after-free in probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26869 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to truncate meta inode pages forcely 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26872 | 中危 | 4.19.194-3 |  | kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26872 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26874 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26874 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26875 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: pvrusb2: fix uaf in pvr2_context_set_notify 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26876 | 中危 | 4.19.194-3 |  | kernel: drm/bridge: adv7511: fix crash on irq during probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-10-10 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26878 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: quota: Fix potential NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26878 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26880 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: dm: call the resume method on internal suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26889 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: hci_core: Fix possible buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26889 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26894 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26901 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-07 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26902 | 中危 | 4.19.194-3 |  | kernel: perf: RISCV: Fix panic on pmu overflow handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-04-29 19:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26903 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26906 | 中危 | 4.19.194-3 |  | kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26910 | 中危 | 4.19.194-3 |  | kernel: netfilter: ipset: fix performance regression in swap operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26914 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: fix incorrect mpc_combine array size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-04-17 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26915 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-11-06 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26917 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26920 | 中危 | 4.19.194-3 |  | kernel: tracing/trigger: Fix to return error if failed to alloc snapshot 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-17 16:15 修改: 2024-05-03 06:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26921 | 中危 | 4.19.194-3 |  | kernel: inet: inet_defrag: prevent sk release while still in use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-18 10:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26922 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-23 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26928 | 中危 | 4.19.194-3 |  | kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 12:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26931 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: qla2xxx: Fix command flush on cable pull 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26936 | 中危 | 4.19.194-3 |  | kernel: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-17 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26938 | 中危 | 4.19.194-3 |  | kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26944 | 中危 | 4.19.194-3 |  | kernel: btrfs: zoned: fix use-after-free in do_zone_finish() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26945 | 中危 | 4.19.194-3 |  | kernel: crypto: iaa - Fix nr_cpus < nr_iaa case 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-07-03 01:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26948 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add a dc_state NULL check in dc_state_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26954 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26955 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: prevent kernel bug at submit_bh_wbc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26956 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix failure to detect DAT corruption in btree and direct mappings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26956 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26957 | 中危 | 4.19.194-3 |  | kernel: s390/zcrypt: fix reference counting on zcrypt card objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26957 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26960 | 中危 | 4.19.194-3 |  | kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26962 | 中危 | 4.19.194-3 |  | kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26962 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26965 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26966 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26969 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26973 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fat: fix uninitialized field in nostale filehandles 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26976 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26980 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26980 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-06 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26982 | 中危 | 4.19.194-3 |  | kernel: Squashfs: check the inode number is not the invalid value of zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-03 06:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26984 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nouveau: fix instmem race condition around ptr stores 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26993 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26993 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 20:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26994 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: speakup: Avoid crash on very long word 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26994 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26997 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: usb: dwc2: host: Fix dereference issue in DDMA completion flow. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26999 | 中危 | 4.19.194-3 |  | kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27000 | 中危 | 4.19.194-3 |  | kernel: serial: mxs-auart: add spinlock around changing cts state 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27001 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: comedi: vmk80xx: fix incomplete endpoint checking 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27004 | 中危 | 4.19.194-3 |  | kernel: clk: Get runtime PM before walking tree during disable_unused 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27008 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm: nv04: Fix out of bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27010 | 中危 | 4.19.194-3 |  | kernel: net/sched: Fix mirred deadlock on device recursion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27011 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: fix memleak in map from abort path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-12-23 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27013 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tun: limit printing rate when illegal packet received by tun dev 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27014 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Prevent deadlock while disabling aRFS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-05-23 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27019 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 06:15 修改: 2024-06-16 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27025 | 中危 | 4.19.194-3 |  | kernel: nbd: null check for nla_nest_start 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27028 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-08 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27032 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to avoid potential panic during recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-06 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27037 | 中危 | 4.19.194-3 |  | kernel: clk: zynq: Prevent null pointer dereference caused by kmalloc failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-07 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27046 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nfp: flower: handle acti_netdevs allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27046 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27051 | 中危 | 4.19.194-3 |  | kernel: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27054 | 中危 | 4.19.194-3 |  | kernel: s390/dasd: fix double module refcount decrement 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27056 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27057 | 中危 | 4.19.194-3 |  | kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27059 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27059 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27062 | 中危 | 4.19.194-3 |  | kernel: nouveau: lock the client object tree. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-05 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27072 | 中危 | 4.19.194-3 |  | kernel: media: usbtv: Remove useless locks in usbtv_video_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27072 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-10-31 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27073 | 中危 | 4.19.194-3 |  | kernel: media: ttpci: fix two memleaks in budget_av_attach 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-06 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27074 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: go7007: fix a memleak in go7007_load_encoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27075 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: dvb-frontends: avoid stack overflow warnings with clang 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27077 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27078 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: v4l2-tpg: fix some memleaks in tpg_alloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27388 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: SUNRPC: fix some memleaks in gssx_dec_option_array 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27388 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-01 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27395 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27395 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27396 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net: gtp: Fix Use-After-Free in gtp_dellink 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27396 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27398 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27398 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-11-30 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27399 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27401 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: firewire: nosy: ensure user_length is taken into account when fetching packet contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27401 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27402 | 中危 | 4.19.194-3 |  | kernel: phonet/pep: fix racy skb_queue_empty() use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27402 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-07 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27403 | 中危 | 4.19.194-3 |  | kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27403 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27405 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27405 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27407 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Fixed overflow check in mi_enum_attr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27407 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27410 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: nl80211: reject iftype change with mesh ID change 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27410 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27412 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: power: supply: bq27xxx-i2c: Do not free non existing IRQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27412 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27413 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: efi/capsule-loader: fix incorrect allocation size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27413 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27415 | 中危 | 4.19.194-3 |  | kernel: netfilter: bridge: confirm multicast packets before passing them up the stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27415 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27416 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27416 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27419 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netrom: Fix data-races around sysctl_net_busy_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27419 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27436 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27436 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-11-07 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-27437 | 中危 | 4.19.194-3 |  | kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27437 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-05 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-31076 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35247 | 中危 | 4.19.194-3 |  | kernel: fpga: region: add owner module and take its refcount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35247 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-24 14:15 修改: 2024-06-24 19:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35784 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix deadlock with fiemap and extent locking 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35784 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35789 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35789 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35790 | 中危 | 4.19.194-3 |  | kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35790 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35791 | 中危 | 4.19.194-3 |  | kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35794 | 中危 | 4.19.194-3 |  | kernel: dm-raid: really frozen sync_thread during suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35799 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Prevent crash when disable stream 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-07-03 02:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35803 | 中危 | 4.19.194-3 |  | kernel: x86/efistub: Call mixed mode boot services on the firmware's stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35805 | 中危 | 4.19.194-3 |  | kernel: dm snapshot: fix lockup in dm_exception_table_exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35806 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: soc: fsl: qbman: Always disable interrupts when taking cgr_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35807 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: fix corruption during on-line resize 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35807 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35808 | 中危 | 4.19.194-3 |  | kernel: md/dm-raid: don't call md_reap_sync_thread() directly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35808 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35809 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: PCI/PM: Drain runtime-idle callbacks before driver removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35809 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35811 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35811 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35815 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35815 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35817 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35818 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Define the __io_aw() hook as mmiowb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35818 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35819 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: soc: fsl: qbman: Use raw spinlock for cgr_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35819 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35821 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ubifs: Set page uptodate in the correct place 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35821 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35822 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: usb: udc: remove warning when queue disabled ep 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35823 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: vt: fix unicode buffer corruption when deleting characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-07 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35825 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: usb: gadget: ncm: Fix handling of zero block length packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35826 | 中危 | 4.19.194-3 |  | kernel: block: Fix page refcounts for unaligned buffers in __bio_release_pages() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35828 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35830 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: tc358743: register v4l2 async device only after successful setup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35830 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35832 | 中危 | 4.19.194-3 |  | kernel: bcachefs: kvfree bch_fs::snapshots in bch2_fs_snapshots_exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35832 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35835 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/mlx5e: fix a double-free in arfs_create_groups 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35837 | 中危 | 4.19.194-3 |  | kernel: net: mvpp2: clear BM pool before initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35837 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 14:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35839 | 中危 | 4.19.194-3 |  | kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35839 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35843 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Use device rbtree in iopf reporting path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-07-03 02:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35849 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-17 15:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35865 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-01 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35869 | 中危 | 4.19.194-3 |  | kernel: smb: client: guarantee refcounted children from parent session 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-07-03 02:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35870 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix UAF in smb2_reconnect_server() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35871 | 中危 | 4.19.194-3 |  | kernel: riscv: process: Fix kernel gp leakage 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35875 | 中危 | 4.19.194-3 |  | kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35877 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: x86/mm/pat: fix VM_PAT handling in COW mappings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35877 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35878 | 中危 | 4.19.194-3 |  | kernel: of: module: prevent NULL pointer dereference in vsnprintf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35878 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-12 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35886 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ipv6: Fix infinite recursion in fib6_dump_done(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35888 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: erspan: make sure erspan_base_hdr is present in skb->head 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35888 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-06 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35893 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/sched: act_skbmod: prevent kernel-infoleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35893 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35898 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35902 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/rds: fix possible cp null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-12-30 19:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35904 | 中危 | 4.19.194-3 |  | kernel: selinux: avoid dereference of garbage after mount failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35910 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tcp: properly terminate timers for kernel sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35915 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35922 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fbmon: prevent division by zero in fb_videomode_from_videomode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-12-30 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35924 | 中危 | 4.19.194-3 |  | kernel: usb: typec: ucsi: Limit read size on v1.2 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35925 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: block: prevent division by zero in blk_rq_stat_sum() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35925 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-12-31 18:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35926 | 中危 | 4.19.194-3 |  | kernel: crypto: iaa - Fix async_disable descriptor leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35926 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35927 | 中危 | 4.19.194-3 |  | kernel: drm: Check output polling initialized before disabling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35927 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-10-29 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35930 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35930 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-12-30 19:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35931 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35932 | 中危 | 4.19.194-3 |  | kernel: drm/vc4: don't check if plane->state->fb == state->fb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35933 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-12-30 19:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35934 | 中危 | 4.19.194-3 |  | kernel: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35936 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35937 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: check A-MSDU format more carefully 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-08-29 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35938 | 中危 | 4.19.194-3 |  | kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35939 | 中危 | 4.19.194-3 |  | kernel: dma-direct: Leak pages on dma_set_decrypted() failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35940 | 中危 | 4.19.194-3 |  | kernel: pstore/zone: Add a null pointer check to the psz_kmsg_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-05 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35942 | 中危 | 4.19.194-3 |  | kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35943 | 中危 | 4.19.194-3 |  | kernel: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35943 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-09-18 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35944 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35945 | 中危 | 4.19.194-3 |  | kernel: net: phy: phy_device: Prevent nullptr exceptions on ISR 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35946 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw89: fix null pointer access when abort scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35947 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: dyndbg: fix old BUG_ON in >control parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 12:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35948 | 中危 | 4.19.194-3 |  | kernel: bcachefs: Check for journal entries overruning end of sb clean section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-07-03 02:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35949 | 中危 | 4.19.194-3 |  | kernel: btrfs: make sure that WRITTEN is set on all metadata blocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35950 | 中危 | 4.19.194-3 |  | kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35955 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: kprobes: Fix possible use-after-free issue on kprobe registration 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35960 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/mlx5: Properly link new fs rules into the tree 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35965 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: Fix not validating setsockopt user input 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35966 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: RFCOMM: Fix not validating setsockopt user input 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-08-29 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35967 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: SCO: Fix not validating setsockopt user input 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35967 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35969 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35973 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: geneve: fix header validation in geneve[6]_xmit_skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35976 | 中危 | 4.19.194-3 |  | kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35978 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: Bluetooth: Fix memory leak in hci_req_sync_complete() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35982 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: batman-adv: Avoid infinite loop trying to resize local TT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35984 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: i2c: smbus: fix NULL function pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35995 | 中危 | 4.19.194-3 |  | kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35995 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35997 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35998 | 中危 | 4.19.194-3 |  | kernel: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35999 | 中危 | 4.19.194-3 |  | kernel: smb3: missing lock when picking channel 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-10-29 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36004 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36009 | 中危 | 4.19.194-3 |  | kernel: ax25: Fix netdev refcount issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36009 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-20 10:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36014 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/arm/malidp: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-29 07:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36015 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ppdev: Add an error check in register_device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-29 08:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36016 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-29 19:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36017 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36017 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 13:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36020 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: i40e: fix vf may be used uninitialized in this function warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 15:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36022 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 15:15 修改: 2024-05-30 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36023 | 中危 | 4.19.194-3 |  | kernel: Julia Lawall reported this null pointer dereference, this should fix it. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 15:15 修改: 2024-06-10 19:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36024 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Disable idle reallow as part of command/gpint execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 15:15 修改: 2024-05-30 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36026 | 中危 | 4.19.194-3 |  | kernel: drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36026 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 15:15 修改: 2024-05-30 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36029 | 中危 | 4.19.194-3 |  | kernel: mmc: sdhci-msm: pervent access to suspended controller 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36270 | 中危 | 4.19.194-3 |  | kernel: netfilter: tproxy: bail out if IP has been disabled on the device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36270 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36286 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36286 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36288 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36288 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 12:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36479 | 中危 | 4.19.194-3 |  | kernel: fpga: bridge: add owner module and take its refcount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-24 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36484 | 中危 | 4.19.194-3 |  | kernel: net: relax socket state check at accept time. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-29 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36880 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: qca: add missing firmware sanity checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36894 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36897 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36897 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36901 | 中危 | 4.19.194-3 |  | kernel: ipv6: prevent NULL dereference in ip6_output() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-18 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36902 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36903 | 中危 | 4.19.194-3 |  | kernel: ipv6: Fix potential uninit-value access in __ip6_make_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36903 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36905 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-19 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36908 | 中危 | 4.19.194-3 |  | kernel: blk-iocost: do not WARN if iocg was already offlined 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-07 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36909 | 中危 | 4.19.194-3 |  | kernel: Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36910 | 中危 | 4.19.194-3 |  | kernel: uio_hv_generic: Don't free decrypted memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36911 | 中危 | 4.19.194-3 |  | kernel: hv_netvsc: Don't free decrypted memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36912 | 中危 | 4.19.194-3 |  | kernel: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36913 | 中危 | 4.19.194-3 |  | kernel: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36914 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip on writeback when it's not applicable 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36915 | 中危 | 4.19.194-3 |  | kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36916 | 中危 | 4.19.194-3 |  | kernel: blk-iocost: avoid out of bounds shift 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36917 | 中危 | 4.19.194-3 |  | kernel: block: fix overflow in blk_ioctl_discard() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36918 | 中危 | 4.19.194-3 |  | kernel: bpf: Check bloom filter map value size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36918 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36919 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36920 | 中危 | 4.19.194-3 |  | kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36921 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36922 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: read txq->read_ptr under lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36923 | 中危 | 4.19.194-3 |  | kernel: fs/9p: fix uninitialized values during inode evict 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36924 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36927 | 中危 | 4.19.194-3 |  | kernel: ipv4: Fix uninit-value access in __ip_make_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36927 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36933 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36934 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: bna: ensure the copied buf is NUL terminated 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36939 | 中危 | 4.19.194-3 |  | kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36941 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: nl80211: don't free NULL coalescing rule 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36944 | 中危 | 4.19.194-3 |  | kernel: Reapply "drm/qxl: simplify qxl_fence_wait" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-06 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36948 | 中危 | 4.19.194-3 |  | kernel: drm/xe/xe_migrate: Cast to output precision before multiplying operands 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36949 | 中危 | 4.19.194-3 |  | kernel: amd/amdkfd: sync all devices to wait all processes being evicted 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36950 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36951 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: range check cp bad op exception interrupts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36952 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36953 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36954 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tipc: fix a possible memleak in tipc_buf_append 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36959 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36964 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: fs/9p: only translate RWX permissions for plain 9P2000 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-03 08:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36968 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36968 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-08 13:15 修改: 2024-07-17 16:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36969 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix division by zero in setup_dsc_config 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-08 13:15 修改: 2024-07-17 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-37021 | 中危 | 4.19.194-3 |  | kernel: fpga: manager: add owner module and take its refcount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37021 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-24 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-37078 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix potential kernel bug due to lack of writeback flag waiting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-37354 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix crash on racing fsync and size-extending write into prealloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37354 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-06-25 18:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-37356 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37356 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38541 | 中危 | 4.19.194-3 |  | kernel: of: module: add buffer overflow check in of_modalias() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-03 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38544 | 中危 | 4.19.194-3 |  | kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38544 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38546 | 中危 | 4.19.194-3 |  | kernel: drm: vc4: Fix possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 20:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38547 | 中危 | 4.19.194-3 |  | kernel: media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 19:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38549 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 19:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38553 | 中危 | 4.19.194-3 |  | kernel: net: fec: remove .ndo_poll_controller to avoid deadlocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38554 | 中危 | 4.19.194-3 |  | kernel: ax25: Fix reference count leak issue of net_device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38554 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 19:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38558 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38558 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38559 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: qedf: Ensure the copied buf is NUL terminated 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38559 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38560 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: scsi: bfa: Ensure the copied buf is NUL terminated 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38565 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: ar5523: enable proper endpoint verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38567 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: wifi: carl9170: add a proper sanity check for endpoints 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38567 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38578 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ecryptfs: Fix buffer size for tag 66 packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38578 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38579 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: crypto: bcm - Fix pointer arithmetic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38582 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: nilfs2: fix potential hang in nilfs_detach_log_writer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38582 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-08 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38587 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-04 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38589 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: netrom: fix possible dead-lock in nr_rt_ioctl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38596 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38597 | 中危 | 4.19.194-3 |  | kernel: eth: sungem: remove .ndo_poll_controller to avoid deadlocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38598 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: md: fix resync softlockup when bitmap size is less than array size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38599 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: jffs2: prevent xattr node from overflowing the eraseblock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38600 | 中危 | 4.19.194-3 |  | kernel: ALSA: Fix deadlocks with kctl removals at disconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 16:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38601 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ring-buffer: Fix a race between readers and resize checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38602 | 中危 | 4.19.194-3 |  | kernel: ax25: Fix reference count leak issues of ax25_dev 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38607 | 中危 | 4.19.194-3 |  | kernel: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38608 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix netif state handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38608 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-08-27 15:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38611 | 中危 | 4.19.194-3 |  | kernel: media: i2c: et8ek8: Don't strip remove function when driver is builtin 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38612 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ipv6: sr: fix invalid unregister error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38612 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38613 | 中危 | 4.19.194-3 |  | kernel: m68k: Fix spinlock race in kernel thread creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38613 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38618 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ALSA: timer: Set lower bound of start tick time 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-11-08 22:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38619 | 中危 | 4.19.194-3 |  | kernel: usb-storage: alauda: Check whether the media is initialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 07:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38620 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: HCI: Remove HCI_AMP support 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38620 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 08:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38621 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: media: stk1160: fix bounds checking in stk1160_copy_video() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38633 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: serial: max3100: Update uart_driver_registered on driver removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38634 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: serial: max3100: Lock port->lock when calling uart_handle_cts_change() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38634 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38635 | 中危 | 4.19.194-3 |  | kernel: soundwire: cadence: fix invalid PDI offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38635 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-06-21 11:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38637 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: greybus: lights: check return of get_channel_from_mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38637 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38659 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: enic: Validate length of nl attributes in enic_set_vf_port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38661 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: s390/ap: Fix crash in AP internal function modify_bitmap() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-09-03 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38780 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38780 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 12:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39276 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39276 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-11-05 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39292 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: um: Add winch to winch_handlers before registering winch IRQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39292 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-24 14:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39293 | 中危 | 4.19.194-3 |  | kernel: Revert "xsk: Support redirect to any socket bound to the same umem" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39293 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-06-25 18:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39301 | 中危 | 4.19.194-3 | 4.19.316-1 | kernel: net/9p: fix uninit-value in p9_client_rpc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39301 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-09-03 18:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39467 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39467 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-06-25 18:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39468 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix deadlock in smb2_find_smb_tcon() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39468 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-09-03 18:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39469 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39469 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-25 15:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39472 | 中危 | 4.19.194-3 |  | kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39472 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-08-19 05:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39473 | 中危 | 4.19.194-3 |  | kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39473 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39474 | 中危 | 4.19.194-3 |  | kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39474 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39475 | 中危 | 4.19.194-3 |  | kernel: fbdev: savage: Handle err return when savagefb_check_var failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39476 | 中危 | 4.19.194-3 |  | kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39477 | 中危 | 4.19.194-3 |  | kernel: mm/hugetlb: do not call vma_add_reservation upon ENOMEM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39478 | 中危 | 4.19.194-3 |  | kernel: crypto: starfive - Do not free stack buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39478 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39481 | 中危 | 4.19.194-3 |  | kernel: media: mc: Fix graph walk in media_pipeline_start 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39481 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39482 | 中危 | 4.19.194-3 |  | kernel: bcache: fix variable length array abuse in btree_iter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39482 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 18:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39484 | 中危 | 4.19.194-3 |  | kernel: mmc: davinci: Don't strip remove function when driver is builtin 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39485 | 中危 | 4.19.194-3 |  | kernel: media: v4l: async: Properly re-initialise notifier entry in unregister 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39485 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-05 07:15 修改: 2024-07-08 15:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39488 | 中危 | 4.19.194-3 |  | kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39488 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-07-11 13:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39489 | 中危 | 4.19.194-3 |  | kernel: ipv6: sr: fix memleak in seg6_hmac_init_algo 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39489 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-07-31 14:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39490 | 中危 | 4.19.194-3 |  | kernel: ipv6: sr: fix missing sk_buff release in seg6_input_core 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-11-25 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39491 | 中危 | 4.19.194-3 |  | kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39491 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-07-11 13:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39492 | 中危 | 4.19.194-3 |  | kernel: mailbox: mtk-cmdq: Fix pm_runtime_get_sync() warning in mbox shutdown 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39492 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-10-30 21:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39493 | 中危 | 4.19.194-3 |  | kernel: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-10 08:15 修改: 2024-07-31 15:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39497 | 中危 | 4.19.194-3 |  | kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39497 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39498 | 中危 | 4.19.194-3 |  | kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39498 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39499 | 中危 | 4.19.194-3 |  | kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39499 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39500 | 中危 | 4.19.194-3 |  | kernel: sock_map: avoid race between sock_map_close and sk_psock_put 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39500 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39501 | 中危 | 4.19.194-3 |  | kernel: drivers: core: synchronize really_probe() and dev_uevent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39501 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39502 | 中危 | 4.19.194-3 |  | kernel: ionic: fix use after netif_napi_del() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39502 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39503 | 中危 | 4.19.194-3 |  | kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39503 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39504 | 中危 | 4.19.194-3 |  | kernel: netfilter: nft_inner: validate mandatory meta and payload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39504 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39505 | 中危 | 4.19.194-3 |  | kernel: drm/komeda: check for error-valued pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39505 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39506 | 中危 | 4.19.194-3 |  | kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39506 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39507 | 中危 | 4.19.194-3 |  | kernel: net: hns3: fix kernel crash problem in concurrent scenario 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-39509 | 中危 | 4.19.194-3 |  | kernel: HID: core: remove unnecessary WARN_ON() in implement() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39509 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40900 | 中危 | 4.19.194-3 |  | kernel: cachefiles: remove requests from xarray during flushing requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40901 | 中危 | 4.19.194-3 |  | kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40904 | 中危 | 4.19.194-3 |  | kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-19 13:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40905 | 中危 | 4.19.194-3 |  | kernel: ipv6: fix possible race in __fib6_drop_pcpu_from() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-19 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40907 | 中危 | 4.19.194-3 |  | kernel: ionic: fix kernel panic in XDP_TX action 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 14:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40908 | 中危 | 4.19.194-3 |  | kernel: bpf: Set run context for rawtp test_run callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40910 | 中危 | 4.19.194-3 |  | kernel: ax25: Fix refcount imbalance on inbound connections 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 13:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40911 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40912 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40913 | 中危 | 4.19.194-3 |  | kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40914 | 中危 | 4.19.194-3 |  | kernel: mm/huge_memory: don't unpoison huge_zero_folio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40915 | 中危 | 4.19.194-3 |  | kernel: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40916 | 中危 | 4.19.194-3 |  | kernel: drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40917 | 中危 | 4.19.194-3 |  | kernel: memblock: make memblock_set_node() also warn about use of MAX_NUMNODES 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40919 | 中危 | 4.19.194-3 |  | kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40920 | 中危 | 4.19.194-3 |  | kernel: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40921 | 中危 | 4.19.194-3 |  | kernel: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40922 | 中危 | 4.19.194-3 |  | kernel: io_uring/rsrc: don't lock while !TASK_RUNNING 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40923 | 中危 | 4.19.194-3 |  | kernel: vmxnet3: disable rx data ring on dma allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40924 | 中危 | 4.19.194-3 |  | kernel: drm/i915/dpt: Make DPT object unshrinkable 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40925 | 中危 | 4.19.194-3 |  | kernel: block: fix request.queuelist usage in flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40925 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40926 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau: don't attempt to schedule hpd_work on headless cards 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40926 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40927 | 中危 | 4.19.194-3 |  | kernel: xhci: Handle TD clearing for multiple streams case 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40927 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40928 | 中危 | 4.19.194-3 |  | kernel: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40929 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40930 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: validate HE operation element parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40930 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40931 | 中危 | 4.19.194-3 |  | kernel: mptcp: ensure snd_una is properly initialized on connect 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40932 | 中危 | 4.19.194-3 |  | kernel: drm/exynos/vidi: fix memory leak in .get_modes() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40933 | 中危 | 4.19.194-3 |  | kernel: iio: temperature: mlx90635: Fix ERR_PTR dereference in mlx90635_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40934 | 中危 | 4.19.194-3 |  | kernel: HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40935 | 中危 | 4.19.194-3 |  | kernel: cachefiles: flush all requests after setting CACHEFILES_DEAD 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40936 | 中危 | 4.19.194-3 |  | kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40937 | 中危 | 4.19.194-3 |  | kernel: gve: Clear napi->skb before dev_kfree_skb_any() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40938 | 中危 | 4.19.194-3 |  | kernel: landlock: Fix d_parent walk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40939 | 中危 | 4.19.194-3 |  | kernel: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40940 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40941 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40942 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40943 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix races between hole punching and AIO+DIO 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40943 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40944 | 中危 | 4.19.194-3 |  | kernel: x86/kexec: Fix bug with call depth tracking 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40945 | 中危 | 4.19.194-3 |  | kernel: iommu: Return right value in iommu_sva_bind_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40947 | 中危 | 4.19.194-3 |  | kernel: ima: Avoid blocking in RCU read-side critical section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-18 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40948 | 中危 | 4.19.194-3 |  | kernel: mm/page_table_check: fix crash on ZONE_DEVICE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40949 | 中危 | 4.19.194-3 |  | kernel: mm: shmem: fix getting incorrect lruvec when replacing a shmem folio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40950 | 中危 | 4.19.194-3 |  | kernel: mm: huge_memory: fix misused mapping_large_folio_support() for anon folios 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40951 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-06 13:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40952 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix NULL pointer dereference in ocfs2_journal_dirty() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40953 | 中危 | 4.19.194-3 |  | kernel: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40955 | 中危 | 4.19.194-3 |  | kernel: ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40957 | 中危 | 4.19.194-3 |  | kernel: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40957 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 18:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40959 | 中危 | 4.19.194-3 |  | kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-28 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40960 | 中危 | 4.19.194-3 |  | kernel: ipv6: prevent possible NULL dereference in rt6_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40961 | 中危 | 4.19.194-3 |  | kernel: ipv6: prevent possible NULL deref in fib6_nh_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40962 | 中危 | 4.19.194-3 |  | kernel: btrfs: zoned: allocate dummy checksums for zoned NODATASUM writes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40962 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40963 | 中危 | 4.19.194-3 |  | kernel: mips: bmips: BCM6358: make sure CBR is correctly set 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40963 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40964 | 中危 | 4.19.194-3 |  | kernel: ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 17:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40965 | 中危 | 4.19.194-3 |  | kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40966 | 中危 | 4.19.194-3 |  | kernel: tty: add the option to have a tty reject a new ldisc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40967 | 中危 | 4.19.194-3 |  | kernel: serial: imx: Introduce timeout when waiting on transmitter empty 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40967 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 17:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40968 | 中危 | 4.19.194-3 |  | kernel: MIPS: Octeon: Add PCIe link status check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40968 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40969 | 中危 | 4.19.194-3 |  | kernel: f2fs: don't set RO when shutting down f2fs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 17:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40970 | 中危 | 4.19.194-3 |  | kernel: Avoid hw_desc array overrun in dw-axi-dmac 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40971 | 中危 | 4.19.194-3 |  | kernel: f2fs: remove clear SB_INLINECRYPT flag in default_options 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40971 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40972 | 中危 | 4.19.194-3 |  | kernel: ext4: do not create EA inode under buffer lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-29 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40973 | 中危 | 4.19.194-3 |  | kernel: media: mtk-vcodec: potential null pointer deference in SCP 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40974 | 中危 | 4.19.194-3 |  | kernel: powerpc/pseries: Enforce hcall result buffer validity and size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40975 | 中危 | 4.19.194-3 |  | kernel: platform/x86: x86-android-tablets: Unregister devices in reverse order 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40976 | 中危 | 4.19.194-3 |  | kernel: drm/lima: mask irqs in timeout path before hard reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40977 | 中危 | 4.19.194-3 |  | kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40978 | 中危 | 4.19.194-3 |  | kernel: scsi: qedi: Fix crash while reading debugfs attribute 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40979 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix kernel crash during resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40979 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40980 | 中危 | 4.19.194-3 |  | kernel: drop_monitor: replace spin_lock by raw_spin_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40980 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40981 | 中危 | 4.19.194-3 |  | kernel: batman-adv: bypass empty buckets in batadv_purge_orig_ref() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40982 | 中危 | 4.19.194-3 |  | kernel: ssb: Fix potential NULL pointer dereference in ssb_device_uevent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-09-09 18:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40983 | 中危 | 4.19.194-3 |  | kernel: tipc: force a dst refcount before doing decryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40983 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40984 | 中危 | 4.19.194-3 |  | kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40986 | 中危 | 4.19.194-3 |  | kernel: dmaengine: xilinx: xdma: Fix data synchronisation in xdma_channel_isr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40986 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40987 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix UBSAN warning in kv_dpm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40987 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40988 | 中危 | 4.19.194-3 |  | kernel: drm/radeon: fix UBSAN warning in kv_dpm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40989 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40989 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40990 | 中危 | 4.19.194-3 |  | kernel: RDMA/mlx5: Add check for srq max_sge attribute 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40991 | 中危 | 4.19.194-3 |  | kernel: dmaengine: ti: k3-udma-glue: Fix of_k3_udma_glue_parse_chn_by_id() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40991 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40992 | 中危 | 4.19.194-3 |  | kernel: RDMA/rxe: Fix responder length checking for UD request packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40992 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40993 | 中危 | 4.19.194-3 |  | kernel: netfilter: ipset: Fix suspicious rcu_dereference_protected() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40993 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40995 | 中危 | 4.19.194-3 |  | kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40995 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40997 | 中危 | 4.19.194-3 |  | kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40997 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40998 | 中危 | 4.19.194-3 |  | kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40999 | 中危 | 4.19.194-3 |  | kernel: net: ena: Add validation for completion descriptors consistency 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41001 | 中危 | 4.19.194-3 |  | kernel: io_uring/sqpoll: work around a potential audit memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41002 | 中危 | 4.19.194-3 |  | kernel: crypto: hisilicon/sec - Fix memory leak for sec resource release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41003 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix reg_set_min_max corruption of fake_reg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41003 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41004 | 中危 | 4.19.194-3 |  | kernel: tracing: Build event generation tests only as modules 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41005 | 中危 | 4.19.194-3 |  | kernel: netpoll: Fix race condition in netpoll_owner_active 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41005 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41006 | 中危 | 4.19.194-3 |  | kernel: netrom: Fix a memory leak in nr_heartbeat_expiry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-08-21 17:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41008 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: change vm->task_info handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 08:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41009 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix overrunning reservations in ringbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41009 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-17 07:15 修改: 2024-07-29 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41010 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix too early release of tcx_entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-17 07:15 修改: 2024-07-19 15:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41012 | 中危 | 4.19.194-3 |  | kernel: filelock: Remove locks reliably when fcntl/close race is detected 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41012 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-23 08:15 修改: 2024-09-12 15:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41014 | 中危 | 4.19.194-3 |  | kernel: xfs: add bounds checking to xlog_recover_process_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41015 | 中危 | 4.19.194-3 |  | kernel: ocfs2: add bounds checking to ocfs2_check_dir_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41016 | 中危 | 4.19.194-3 |  | kernel: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41017 | 中危 | 4.19.194-3 |  | kernel: jfs: don't walk off the end of ealist 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41017 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41018 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Add a check for attr_names and oatbl 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41018 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 07:15 修改: 2024-07-29 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41020 | 中危 | 4.19.194-3 |  | kernel: filelock: Fix fcntl/close race recovery compat path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 14:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41022 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 14:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41023 | 中危 | 4.19.194-3 |  | kernel: sched/deadline: Fix task_struct reference leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41025 | 中危 | 4.19.194-3 |  | kernel: misc: fastrpc: Fix memory leak in audio daemon attach operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41026 | 中危 | 4.19.194-3 |  | kernel: mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41026 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41028 | 中危 | 4.19.194-3 |  | kernel: platform/x86: toshiba_acpi: Fix array out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41030 | 中危 | 4.19.194-3 |  | kernel: ksmbd: discard write access to the directory open 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41030 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41031 | 中危 | 4.19.194-3 |  | kernel: mm/filemap: skip to create PMD-sized page cache if needed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41031 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41032 | 中危 | 4.19.194-3 |  | kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41033 | 中危 | 4.19.194-3 |  | kernel: cachestat: do not flush stats in recency check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41033 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41034 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix kernel bug on rename operation of broken directory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41034 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41035 | 中危 | 4.19.194-3 |  | kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41035 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41036 | 中危 | 4.19.194-3 |  | kernel: net: ks8851: Fix deadlock with the SPI chip variant 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41036 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 18:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41037 | 中危 | 4.19.194-3 |  | kernel: ASoC: SOF: Intel: hda: fix null deref on system suspend entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-08 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41038 | 中危 | 4.19.194-3 |  | kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41038 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-08 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41041 | 中危 | 4.19.194-3 |  | kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41041 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41042 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: prefer nft_chain_validate 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-19 05:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41043 | 中危 | 4.19.194-3 |  | kernel: netfilter: nfnetlink_queue: drop bogus WARN_ON 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41044 | 中危 | 4.19.194-3 |  | kernel: ppp: reject claimed-as-LCP but actually malformed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41044 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41045 | 中危 | 4.19.194-3 |  | kernel: bpf: Defer work in bpf_timer_cancel_and_free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41045 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41048 | 中危 | 4.19.194-3 |  | kernel: skmsg: Skip zero length skb in sk_msg_recvmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41050 | 中危 | 4.19.194-3 |  | kernel: cachefiles: cyclic allocation of msg_id to avoid reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41051 | 中危 | 4.19.194-3 |  | kernel: cachefiles: wait for ondemand_object_worker to finish when dropping object 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41052 | 中危 | 4.19.194-3 |  | kernel: vfio/pci: Init the count variable in collecting hot-reset devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-21 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41053 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Fix ufshcd_abort_one racing issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41053 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-21 19:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41054 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Fix ufshcd_clear_cmd racing issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41054 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41055 | 中危 | 4.19.194-3 |  | kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41055 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41056 | 中危 | 4.19.194-3 |  | kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41060 | 中危 | 4.19.194-3 |  | kernel: drm/radeon: check bo_va->bo is non-NULL before using it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41060 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41062 | 中危 | 4.19.194-3 |  | kernel: bluetooth/l2cap: sync sock recv cb and release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41063 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41064 | 中危 | 4.19.194-3 |  | kernel: powerpc/eeh: avoid possible crash when edev->pdev changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-26 14:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41065 | 中危 | 4.19.194-3 |  | kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41066 | 中危 | 4.19.194-3 |  | kernel: ibmvnic: Add tx check to prevent skb leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41066 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41067 | 中危 | 4.19.194-3 |  | kernel: btrfs: scrub: handle RST lookup error correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41067 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41069 | 中危 | 4.19.194-3 |  | kernel: ASoC: topology: Fix references to freed memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41069 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41072 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41072 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41074 | 中危 | 4.19.194-3 |  | kernel: cachefiles: Set object to close if ondemand_id < 0 in copen 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41075 | 中危 | 4.19.194-3 |  | kernel: cachefiles: add consistency check for copen/cread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41076 | 中危 | 4.19.194-3 |  | kernel: NFSv4: Fix memory leak in nfs4_set_security_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-08-22 13:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41077 | 中危 | 4.19.194-3 |  | kernel: null_blk: fix validation of block size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41078 | 中危 | 4.19.194-3 |  | kernel: btrfs: qgroup: fix quota root leak after quota disable failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41079 | 中危 | 4.19.194-3 |  | kernel: nvmet: always initialize cqe.result 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41079 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41080 | 中危 | 4.19.194-3 |  | kernel: io_uring: fix possible deadlock in io_register_iowq_max_workers() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41080 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41081 | 中危 | 4.19.194-3 |  | kernel: ila: block BH in ila_output() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41081 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41082 | 中危 | 4.19.194-3 |  | kernel: nvme-fabrics: use reserved tag for reg read/write command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41083 | 中危 | 4.19.194-3 |  | kernel: netfs: Fix netfs_page_mkwrite() to check folio-->mapping is valid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-26 14:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41084 | 中危 | 4.19.194-3 |  | kernel: cxl/region: Avoid null pointer dereference in region lookup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-22 13:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41085 | 中危 | 4.19.194-3 |  | kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-22 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41086 | 中危 | 4.19.194-3 |  | kernel: bcachefs: Fix sb_field_downgrade validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41088 | 中危 | 4.19.194-3 |  | kernel: can: mcp251xfd: fix infinite loop when xmit fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-22 13:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41089 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41089 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41093 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: avoid using null object of framebuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41093 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41094 | 中危 | 4.19.194-3 |  | kernel: drm/fbdev-dma: Only set smem_start is enable per module option 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41094 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-22 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41095 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41097 | 中危 | 4.19.194-3 |  | kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41097 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-08-22 13:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41098 | 中危 | 4.19.194-3 |  | kernel: ata: libata-core: Fix null pointer dereference on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41098 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42063 | 中危 | 4.19.194-3 |  | kernel: bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-09-05 17:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42064 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip pipe if the pipe idx not set properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42065 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42066 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Fix potential integer overflow in page size calculation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42066 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42067 | 中危 | 4.19.194-3 |  | kernel: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42067 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42068 | 中危 | 4.19.194-3 |  | kernel: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42069 | 中危 | 4.19.194-3 |  | kernel: net: mana: Fix possible double free in error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42069 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42070 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42071 | 中危 | 4.19.194-3 |  | kernel: ionic: use dev_consume_skb_any outside of napi 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42073 | 中危 | 4.19.194-3 |  | kernel: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42074 | 中危 | 4.19.194-3 |  | kernel: ASoC: amd: acp: add a null check for chip_pdev structure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42075 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix remap of arena. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42076 | 中危 | 4.19.194-3 |  | kernel: net: can: j1939: Initialize unused data in j1939_send_one() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42077 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix DIO failure due to insufficient transaction credits 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42078 | 中危 | 4.19.194-3 |  | kernel: nfsd: initialise nfsd_info.mutex early. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42079 | 中危 | 4.19.194-3 |  | kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42079 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42080 | 中危 | 4.19.194-3 |  | kernel: RDMA/restrack: Fix potential invalid address access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42080 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42081 | 中危 | 4.19.194-3 |  | kernel: drm/xe/xe_devcoredump: Check NULL before assignments 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42081 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42082 | 中危 | 4.19.194-3 |  | kernel: xdp: Remove WARN() from __xdp_reg_mem_model() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42083 | 中危 | 4.19.194-3 |  | kernel: ionic: fix kernel panic due to multi-buffer handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42084 | 中危 | 4.19.194-3 |  | kernel: ftruncate: pass a signed offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42085 | 中危 | 4.19.194-3 |  | kernel: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-08-26 14:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42086 | 中危 | 4.19.194-3 |  | kernel: iio: chemical: bme680: Fix overflows in compensate() functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42088 | 中危 | 4.19.194-3 |  | kernel: ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42089 | 中危 | 4.19.194-3 |  | kernel: ASoC: fsl-asoc-card: set priv-->pdev before using it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42089 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42090 | 中危 | 4.19.194-3 |  | kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-08-26 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42091 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Check pat.ops before dumping PAT settings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42092 | 中危 | 4.19.194-3 |  | kernel: gpio: davinci: Validate the obtained number of IRQs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42092 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42095 | 中危 | 4.19.194-3 |  | kernel: serial: 8250_omap: Implementation of Errata i2310 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42096 | 中危 | 4.19.194-3 |  | kernel: x86: stop playing stack games in profile_pc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42097 | 中危 | 4.19.194-3 |  | kernel: ALSA: emux: improve patch ioctl data validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42097 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42098 | 中危 | 4.19.194-3 |  | kernel: crypto: ecdh - explicitly zeroize private_key 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42098 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42099 | 中危 | 4.19.194-3 |  | kernel: s390/dasd: Fix invalid dereferencing of indirect CCW data pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42099 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42100 | 中危 | 4.19.194-3 |  | kernel: clk: sunxi-ng: common: Don't call hw_to_ccu_common on hw without common 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42100 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42101 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42101 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-22 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42102 | 中危 | 4.19.194-3 |  | kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42102 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-19 20:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42103 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix adding block group to a reclaim list and the unused list during reclaim 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42103 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42105 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix inode number range checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42105 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42106 | 中危 | 4.19.194-3 |  | kernel: inet_diag: Initialize pad field in struct inet_diag_req_v2 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42106 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42107 | 中危 | 4.19.194-3 |  | kernel: ice: Don't process extts if PTP is disabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42109 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: unconditionally flush pending work before notifier 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42109 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-27 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42110 | 中危 | 4.19.194-3 |  | kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42110 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42111 | 中危 | 4.19.194-3 |  | kernel: btrfs: always do the basic checks for btrfs_qgroup_inherit structure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42111 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42112 | 中危 | 4.19.194-3 |  | kernel: net: txgbe: free isb resources at the right time 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42112 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42113 | 中危 | 4.19.194-3 |  | kernel: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42114 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42114 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-25 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42115 | 中危 | 4.19.194-3 |  | kernel: jffs2: Fix potential illegal address access in jffs2_free_inode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42117 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: ASSERT when failing to find index by plane/stream id 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42118 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Do not return negative stream id for array 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42118 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42119 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip finding free audio for unknown engine_id 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42120 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check pipe offset before setting vblank 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42120 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42121 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check index msg_id before read or write 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42121 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42122 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL pointer check for kzalloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42123 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix double free err_addr pointer warnings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42123 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-25 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42124 | 中危 | 4.19.194-3 |  | kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42124 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42125 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42125 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42126 | 中危 | 4.19.194-3 |  | kernel: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-19 05:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42127 | 中危 | 4.19.194-3 |  | kernel: drm/lima: fix shared irq handling on driver remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42127 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42128 | 中危 | 4.19.194-3 |  | kernel: leds: an30259a: Use devm_mutex_init() for mutex initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42128 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42129 | 中危 | 4.19.194-3 |  | kernel: leds: mlxreg: Use devm_mutex_init() for mutex initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42130 | 中危 | 4.19.194-3 |  | kernel: nfc/nci: Add the inconsistency check between the input data length and count 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42130 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42131 | 中危 | 4.19.194-3 |  | kernel: mm: avoid overflows in dirty throttling logic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42131 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-25 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42133 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: Ignore too large handle values in BIG 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42133 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 17:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42134 | 中危 | 4.19.194-3 |  | kernel: virtio-pci: Check if is_avq is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 17:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42135 | 中危 | 4.19.194-3 |  | kernel: vhost_task: Handle SIGKILL by flushing work and exiting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42135 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 14:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42137 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42137 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-16 14:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42139 | 中危 | 4.19.194-3 |  | kernel: ice: Fix improper extts handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42139 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42140 | 中危 | 4.19.194-3 |  | kernel: riscv: kexec: Avoid deadlock in kexec crash path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42140 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-23 14:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42141 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: ISO: Check socket flag instead of hcon 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42142 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: E-switch, Create ingress ACL when needed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42144 | 中危 | 4.19.194-3 |  | kernel: thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-16 14:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42145 | 中危 | 4.19.194-3 |  | kernel: IB/core: Implement a limit on UMAD receive List 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42146 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42146 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42149 | 中危 | 4.19.194-3 |  | kernel: fs: don't misleadingly warn during thaw operations 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42149 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-09 23:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42150 | 中危 | 4.19.194-3 |  | kernel: net: txgbe: remove separate irq request for MSI and INTx 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42150 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-09 23:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42151 | 中危 | 4.19.194-3 |  | kernel: bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-09 23:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42152 | 中危 | 4.19.194-3 |  | kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-09 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42153 | 中危 | 4.19.194-3 |  | kernel: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42153 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-08 12:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42154 | 中危 | 4.19.194-3 |  | kernel: tcp_metrics: validate source addr length 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42154 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-10-01 19:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42156 | 中危 | 4.19.194-3 |  | kernel: s390/pkey: Wipe copies of clear-key structures on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42156 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42157 | 中危 | 4.19.194-3 |  | kernel: s390/pkey: Wipe sensitive data on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42157 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-02 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42158 | 中危 | 4.19.194-3 |  | kernel: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42158 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-02 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42161 | 中危 | 4.19.194-3 |  | kernel: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42161 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-25 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42223 | 中危 | 4.19.194-3 |  | kernel: media: dvb-frontends: tda10048: Fix integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42223 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-02 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42224 | 中危 | 4.19.194-3 |  | kernel: net: dsa: mv88e6xxx: Correct check for empty list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-09-25 15:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42227 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix overlapping copy within dml_core_mode_programming 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42227 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42229 | 中危 | 4.19.194-3 |  | kernel: crypto: aead,cipher - zeroize key buffer after use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42229 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42230 | 中危 | 4.19.194-3 |  | kernel: powerpc/pseries: Fix scv instruction crash with kexec 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42230 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 19:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42231 | 中危 | 4.19.194-3 |  | kernel: btrfs: zoned: fix calc_available_free_space() for zoned mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-07-30 19:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42232 | 中危 | 4.19.194-3 |  | kernel: libceph: fix race between delayed_work() and ceph_monc_stop() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42234 | 中危 | 4.19.194-3 |  | kernel: mm: fix crashes from deferred split racing folio migration 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42234 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42235 | 中危 | 4.19.194-3 |  | kernel: s390/mm: Add NULL pointer check to crst_table_free() base_crst_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42236 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42237 | 中危 | 4.19.194-3 |  | kernel: firmware: cs_dsp: Validate payload length before processing block 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42237 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42238 | 中危 | 4.19.194-3 |  | kernel: firmware: cs_dsp: Return error if block header overflows file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42238 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42239 | 中危 | 4.19.194-3 |  | kernel: bpf: Fail bpf_timer_cancel when callback is being cancelled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42240 | 中危 | 4.19.194-3 |  | kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42241 | 中危 | 4.19.194-3 |  | kernel: mm/shmem: disable PMD-sized page cache if needed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42242 | 中危 | 4.19.194-3 |  | kernel: mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42242 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42243 | 中危 | 4.19.194-3 |  | kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42244 | 中危 | 4.19.194-3 |  | kernel: USB: serial: mos7840: fix crash on resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42245 | 中危 | 4.19.194-3 |  | kernel: Revert "sched/fair: Make sure to try to detach at least one movable task" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42246 | 中危 | 4.19.194-3 |  | kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42247 | 中危 | 4.19.194-3 |  | kernel: wireguard: allowedips: avoid unaligned 64-bit memory accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42247 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42248 | 中危 | 4.19.194-3 |  | kernel: tty: serial: ma35d1: Add a NULL check for of_node 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42248 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 20:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42250 | 中危 | 4.19.194-3 |  | kernel: cachefiles: add missing lock protection when polling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 20:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42251 | 中危 | 4.19.194-3 |  | kernel: mm: page_ref: remove folio_try_get_rcu() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42251 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-08 09:15 修改: 2024-09-06 13:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42252 | 中危 | 4.19.194-3 |  | kernel: closures: Change BUG_ON() to WARN_ON() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-08 09:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42253 | 中危 | 4.19.194-3 |  | kernel: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42253 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-08 09:15 修改: 2024-09-06 13:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42258 | 中危 | 4.19.194-3 |  | kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42258 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 15:15 修改: 2024-08-14 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42259 | 中危 | 4.19.194-3 |  | kernel: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42259 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-14 15:15 修改: 2024-09-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42260 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Validate passed in drm syncobj handles in the performance extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42260 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42261 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Validate passed in drm syncobj handles in the timestamp extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42261 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42262 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Fix potential memory leak in the performance extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42262 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42263 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Fix potential memory leak in the timestamp extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42263 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42264 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Prevent out of bounds access in performance query extensions 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42264 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42265 | 中危 | 4.19.194-3 |  | kernel: protect the fetch of ->fd[fd] in do_dup2() from mispredictions 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42265 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42266 | 中危 | 4.19.194-3 |  | kernel: btrfs: make cow_file_range_inline() honor locked_page on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42266 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42267 | 中危 | 4.19.194-3 |  | kernel: riscv/mm: Add handling for VM_FAULT_SIGSEGV in mm_fault_error() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42267 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42268 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix missing lock on sync reset reload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42268 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42269 | 中危 | 4.19.194-3 |  | kernel: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42270 | 中危 | 4.19.194-3 |  | kernel: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42270 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 20:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42272 | 中危 | 4.19.194-3 |  | kernel: sched: act_ct: take care of padding in struct zones_ht_key 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42272 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-30 13:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42273 | 中危 | 4.19.194-3 |  | kernel: f2fs: assign CURSEG_ALL_DATA_ATGC if blkaddr is valid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42273 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42274 | 中危 | 4.19.194-3 |  | kernel: Revert "ALSA: firewire-lib: operate for period elapse event in process context" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42274 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42275 | 中危 | 4.19.194-3 |  | kernel: drm/client: Fix error code in drm_client_buffer_vmap_local() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42276 | 中危 | 4.19.194-3 |  | kernel: nvme-pci: add missing condition check for existence of mapped data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42276 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42277 | 中危 | 4.19.194-3 |  | kernel: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-10 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42278 | 中危 | 4.19.194-3 |  | kernel: ASoC: TAS2781: Fix tasdev_load_calibrated_data() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42278 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-30 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42279 | 中危 | 4.19.194-3 |  | kernel: spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42279 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42281 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix a segment issue when downgrading gso_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42282 | 中危 | 4.19.194-3 |  | kernel: net: mediatek: Fix potential NULL pointer dereference in dummy net_device handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42282 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42283 | 中危 | 4.19.194-3 |  | kernel: net: nexthop: Initialize all fields in dumped nexthops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42283 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42286 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: validate nvme_local_port correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42286 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-10 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42287 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Complete command early within lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42287 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-10 19:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42288 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Fix for possible memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42288 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-05 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42289 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: During vport delete send async logout explicitly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-05 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42290 | 中危 | 4.19.194-3 |  | kernel: irqchip/imx-irqsteer: Handle runtime power management correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42290 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42291 | 中危 | 4.19.194-3 |  | kernel: ice: Add a per-VF limit on number of FDIR filters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42291 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-11-14 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42292 | 中危 | 4.19.194-3 |  | kernel: kobject_uevent: Fix OOB access within zap_modalias_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42292 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42294 | 中危 | 4.19.194-3 |  | kernel: block: fix deadlock between sd_remove & sd_release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42295 | 中危 | 4.19.194-3 |  | kernel: nilfs2: handle inconsistent state in nilfs_btnode_create_block() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42295 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42296 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix return value of f2fs_convert_inline_inode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42297 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to don't dirty inode for readonly filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42297 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-30 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42298 | 中危 | 4.19.194-3 |  | kernel: ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42298 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-10 18:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42299 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Update log->page_{mask,bits} if log->page_size changed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42299 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42300 | 中危 | 4.19.194-3 |  | kernel: erofs: fix race in z_erofs_get_gbuf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42300 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42303 | 中危 | 4.19.194-3 |  | kernel: media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42304 | 中危 | 4.19.194-3 |  | kernel: ext4: make sure the first directory block is not a hole 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42306 | 中危 | 4.19.194-3 |  | kernel: udf: Avoid using corrupted block bitmap buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42306 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42307 | 中危 | 4.19.194-3 |  | kernel: cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42307 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-05 17:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42309 | 中危 | 4.19.194-3 |  | kernel: drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42310 | 中危 | 4.19.194-3 |  | kernel: drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42311 | 中危 | 4.19.194-3 |  | kernel: hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-03 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42312 | 中危 | 4.19.194-3 |  | kernel: sysctl: always initialize i_uid/i_gid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42312 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42315 | 中危 | 4.19.194-3 |  | kernel: exfat: fix potential deadlock on __exfat_get_dentry_set 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42315 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42316 | 中危 | 4.19.194-3 |  | kernel: mm/mglru: fix div-by-zero in vmpressure_calc_level() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42316 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-22 15:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42317 | 中危 | 4.19.194-3 |  | kernel: mm/huge_memory: avoid PMD-size page cache if needed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42317 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42318 | 中危 | 4.19.194-3 |  | kernel: landlock: Don't lose track of restrictions on cred_transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42318 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42319 | 中危 | 4.19.194-3 |  | kernel: mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42319 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42320 | 中危 | 4.19.194-3 |  | kernel: s390/dasd: fix error checks in dasd_copy_pair_store() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42320 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-09-30 12:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42321 | 中危 | 4.19.194-3 |  | kernel: net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42321 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42322 | 中危 | 4.19.194-3 |  | kernel: ipvs: properly dereference pe in ip_vs_add_service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 09:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43817 | 中危 | 4.19.194-3 |  | kernel: net: missing check virtio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43818 | 中危 | 4.19.194-3 |  | kernel: ASoC: amd: Adjust error handling in case of absent codec device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43818 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43819 | 中危 | 4.19.194-3 |  | kernel: kvm: s390: Reject memory region operations for ucontrol VMs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43819 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43820 | 中危 | 4.19.194-3 |  | kernel: dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43820 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43821 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43821 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43823 | 中危 | 4.19.194-3 |  | kernel: PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43824 | 中危 | 4.19.194-3 |  | kernel: PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43826 | 中危 | 4.19.194-3 |  | kernel: nfs: pass explicit offset/count to trace events 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-12 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43827 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check before access structs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-30 12:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43828 | 中危 | 4.19.194-3 |  | kernel: ext4: fix infinite loop when replaying fast_commit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43828 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 15:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43829 | 中危 | 4.19.194-3 |  | kernel: drm/qxl: Add check for drm_cvt_mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43829 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-30 12:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43830 | 中危 | 4.19.194-3 |  | kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43830 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43831 | 中危 | 4.19.194-3 |  | kernel: media: mediatek: vcodec: Handle invalid decoder vsi 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43831 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43833 | 中危 | 4.19.194-3 |  | kernel: media: v4l: async: Fix NULL pointer dereference in adding ancillary links 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43833 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 15:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43834 | 中危 | 4.19.194-3 |  | kernel: xdp: fix invalid wait context of page_pool_destroy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43834 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-30 21:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43835 | 中危 | 4.19.194-3 |  | kernel: virtio_net: Fix napi_skb_cache_put warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-30 21:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43837 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix null pointer dereference in resolve_prog_type() for BPF_PROG_TYPE_EXT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43837 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 15:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43838 | 中危 | 4.19.194-3 |  | kernel: bpf: fix overflow check in adjust_jmp_off() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-29 16:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43840 | 中危 | 4.19.194-3 |  | kernel: bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-29 16:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43846 | 中危 | 4.19.194-3 |  | kernel: lib: objagg: Fix general protection fault 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-25 19:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43849 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: pdr: protect locator_addr with the main mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43849 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-24 16:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43850 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-30 13:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43851 | 中危 | 4.19.194-3 |  | kernel: soc: xilinx: rename cpu_number1 to dummy_cpu_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-24 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43853 | 中危 | 4.19.194-3 |  | kernel: cgroup/cpuset: Prevent UAF in proc_cpuset_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43853 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43854 | 中危 | 4.19.194-3 |  | kernel: block: initialize integrity buffer to zero before writing it to media 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43854 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43855 | 中危 | 4.19.194-3 |  | kernel: md: fix deadlock between mddev_suspend and flush bio 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 17:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43856 | 中危 | 4.19.194-3 |  | kernel: dma: fix call order in dmam_free_coherent 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43856 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 17:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43857 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix null reference error when checking end of zone 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43857 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43859 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to truncate preallocated blocks in f2fs_file_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-09-08 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43860 | 中危 | 4.19.194-3 |  | kernel: remoteproc: imx_rproc: Skip over memory region when node value is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43860 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-22 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43861 | 中危 | 4.19.194-3 |  | kernel: net: usb: qmi_wwan: fix memory leak for not ip packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-20 22:15 修改: 2024-09-03 13:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43862 | 中危 | 4.19.194-3 |  | kernel: net: wan: fsl_qmc_hdlc: Convert carrier_lock spinlock to a mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-09-03 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43863 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: Fix a deadlock in dma buf fence polling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-09-03 13:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43864 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix CT entry update leaks of modify header context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43865 | 中危 | 4.19.194-3 |  | kernel: s390/fpu: Re-add exception handling in load_fpu_state() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43866 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Always drain health in shutdown callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43867 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau: prime: fix refcount underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43868 | 中危 | 4.19.194-3 |  | kernel: riscv/purgatory: align riscv_kernel_entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 00:15 修改: 2024-11-14 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43869 | 中危 | 4.19.194-3 |  | kernel: perf: Fix event leak upon exec and file release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43870 | 中危 | 4.19.194-3 |  | kernel: perf: Fix event leak upon exit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43871 | 中危 | 4.19.194-3 |  | kernel: devres: Fix memory leakage caused by driver API devm_free_percpu() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43872 | 中危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix soft lockup under heavy CEQE load 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43872 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43874 | 中危 | 4.19.194-3 |  | kernel: crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43874 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43875 | 中危 | 4.19.194-3 |  | kernel: PCI: endpoint: Clean up error handling in vpci_scan_bus() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43877 | 中危 | 4.19.194-3 |  | kernel: media: pci: ivtv: Add check for DMA map result 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43877 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43879 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43879 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43880 | 中危 | 4.19.194-3 |  | kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43880 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43881 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: change DMA direction while mapping reinjected packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43881 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43884 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: MGMT: Add error handling to pair_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43884 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 08:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43886 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check in resource_log_pipe_topology_update 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43887 | 中危 | 4.19.194-3 |  | kernel: net/tcp: Disable TCP-AO static key after RCU grace period 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 19:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43889 | 中危 | 4.19.194-3 |  | kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43889 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43890 | 中危 | 4.19.194-3 |  | kernel: tracing: Fix overflow in get_free_elt() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43890 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43891 | 中危 | 4.19.194-3 |  | kernel: tracing: Have format file honor EVENT_FILE_FL_FREED 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43892 | 中危 | 4.19.194-3 |  | kernel: memcg: protect concurrent access to mem_cgroup_idr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43892 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43893 | 中危 | 4.19.194-3 |  | kernel: serial: core: check uartclk for zero to avoid divide by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43893 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-10 18:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43894 | 中危 | 4.19.194-3 |  | kernel: drm/client: fix null pointer dereference in drm_client_modeset_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43894 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-10 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43895 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip Recompute DSC Params if no Stream on Link 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43895 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43896 | 中危 | 4.19.194-3 |  | kernel: ASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43897 | 中危 | 4.19.194-3 |  | kernel: net: drop bad gso csum_start and offset in virtio_net_hdr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43897 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43899 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix null pointer deref in dcn20_resource.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43899 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43901 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43902 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null checker before passing variables 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43904 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43905 | 中危 | 4.19.194-3 |  | kernel: drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43906 | 中危 | 4.19.194-3 |  | kernel: drm/admgpu: fix dereferencing null pointer context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43907 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43908 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix the null pointer dereference to ras_manager 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43909 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu/pm: Fix the null pointer dereference for smu7 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43910 | 中危 | 4.19.194-3 |  | kernel: bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43911 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43912 | 中危 | 4.19.194-3 |  | kernel: wifi: nl80211: disallow setting special AP channel widths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43913 | 中危 | 4.19.194-3 |  | kernel: nvme: apple: fix device reference counting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43914 | 中危 | 4.19.194-3 |  | kernel: md/raid5: avoid BUG_ON() while continue reshape after reassembling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44931 | 中危 | 4.19.194-3 |  | kernel: gpio: prevent potential speculation leaks in gpio_device_get_desc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44933 | 中危 | 4.19.194-3 |  | kernel: bnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44935 | 中危 | 4.19.194-3 |  | kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44936 | 中危 | 4.19.194-3 |  | kernel: power: supply: rt5033: Bring back i2c_set_clientdata 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44936 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-09-05 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44937 | 中危 | 4.19.194-3 |  | kernel: platform/x86: intel-vbtn: Protect ACPI notify handler against recursion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44938 | 中危 | 4.19.194-3 |  | kernel: jfs: Fix shift-out-of-bounds in dbDiscardAG 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 12:15 修改: 2024-09-12 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44939 | 中危 | 4.19.194-3 |  | kernel: jfs: fix null ptr deref in dtInsertEntry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-26 12:15 修改: 2024-09-12 20:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44943 | 中危 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44943 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-28 08:15 修改: 2024-09-10 18:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44944 | 中危 | 4.19.194-3 |  | kernel: netfilter: ctnetlink: use helper function to calculate expect ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-30 08:15 修改: 2024-09-10 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44946 | 中危 | 4.19.194-3 |  | kernel: kcm: Serialise kcm_sendmsg() for the same socket. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-31 14:15 修改: 2024-09-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44947 | 中危 | 4.19.194-3 |  | kernel: fuse: Initialize beyond-EOF page contents before setting uptodate 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-02 18:15 修改: 2024-11-23 23:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44948 | 中危 | 4.19.194-3 |  | kernel: x86/mtrr: Check if fixed MTRRs exist before saving them 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-05 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44950 | 中危 | 4.19.194-3 |  | kernel: serial: sc16is7xx: fix invalid FIFO access with special register set 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44950 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44953 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Fix deadlock during RTC update 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44954 | 中危 | 4.19.194-3 |  | kernel: ALSA: line6: Fix racy access to midibuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-10 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44955 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44956 | 中危 | 4.19.194-3 |  | kernel: drm/xe/preempt_fence: enlarge the fence critical section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44956 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44957 | 中危 | 4.19.194-3 |  | kernel: xen: privcmd: Switch from mutex to spinlock for irqfds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44957 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44958 | 中危 | 4.19.194-3 |  | kernel: sched/smt: Fix unbalance sched_smt_present dec/inc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-10 17:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44959 | 中危 | 4.19.194-3 |  | kernel: tracefs: Use generic inode RCU for synchronizing freeing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-10 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44960 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: core: Check for unset descriptor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44960 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44961 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Forward soft recovery errors to userspace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44962 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44962 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44963 | 中危 | 4.19.194-3 |  | kernel: btrfs: do not BUG_ON() when freeing tree block after error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44963 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44965 | 中危 | 4.19.194-3 |  | kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44966 | 中危 | 4.19.194-3 |  | kernel: binfmt_flat: Fix corruption when not offsetting data start 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44968 | 中危 | 4.19.194-3 |  | kernel: tick/broadcast: Move per CPU pointer access into the atomic section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44968 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 18:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44969 | 中危 | 4.19.194-3 |  | kernel: s390/sclp: Prevent release of buffer in I/O 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44969 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44970 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44971 | 中危 | 4.19.194-3 |  | kernel: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44971 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-09-05 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44972 | 中危 | 4.19.194-3 |  | kernel: btrfs: do not clear page dirty inside extent_write_locked_range() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44973 | 中危 | 4.19.194-3 |  | kernel: mm, slub: do not call do_slab_free for kfence object 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 19:15 修改: 2024-10-03 14:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44975 | 中危 | 4.19.194-3 |  | kernel: cgroup/cpuset: fix panic caused by partcmd_update 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-03 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44976 | 中危 | 4.19.194-3 |  | kernel: ata: pata_macio: Fix DMA table overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 17:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44979 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Fix missing workqueue destroy in xe_gt_pagefault 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44979 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 17:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44980 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Fix opregion leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44980 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 17:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44981 | 中危 | 4.19.194-3 |  | kernel: workqueue: Fix UBSAN 'subtraction overflow' error in shift_and_mask() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44982 | 中危 | 4.19.194-3 |  | kernel: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44982 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44984 | 中危 | 4.19.194-3 |  | kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44984 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 16:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44988 | 中危 | 4.19.194-3 |  | kernel: net: dsa: mv88e6xxx: Fix out-of-bound access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44989 | 中危 | 4.19.194-3 |  | kernel: bonding: fix xfrm real_dev null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44989 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44990 | 中危 | 4.19.194-3 |  | kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44991 | 中危 | 4.19.194-3 |  | kernel: tcp: prevent concurrent execution of tcp_sk_exit_batch 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44991 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-09 14:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44992 | 中危 | 4.19.194-3 |  | kernel: smb/client: avoid possible NULL dereference in cifs_free_subrequest() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44992 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44994 | 中危 | 4.19.194-3 |  | kernel: iommu: Restore lost return in iommu_report_device_fault() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44994 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-10 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44995 | 中危 | 4.19.194-3 |  | kernel: net: hns3: fix a deadlock problem when config TC during resetting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44995 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-15 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-44996 | 中危 | 4.19.194-3 |  | kernel: vsock: fix recursive ->recvmsg calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-16 12:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45000 | 中危 | 4.19.194-3 |  | kernel: fs/netfs/fscache_cookie: add missing "n_accesses" check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45001 | 中危 | 4.19.194-3 |  | kernel: net: mana: Fix RX buf alloc_size alignment and atomic op panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-09 14:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45002 | 中危 | 4.19.194-3 |  | kernel: rtla/osnoise: Prevent NULL dereference in error handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45003 | 中危 | 4.19.194-3 |  | kernel: vfs: Don't evict inode under the inode lru traversing context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45003 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-11-05 10:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45004 | 中危 | 4.19.194-3 |  | kernel: KEYS: trusted: dcp: fix leak of blob encryption key 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-09 15:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45005 | 中危 | 4.19.194-3 |  | kernel: KVM: s390: fix validity interception issue when gisa is switched off 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45005 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-10-09 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45006 | 中危 | 4.19.194-3 |  | kernel: xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45007 | 中危 | 4.19.194-3 |  | kernel: char: xillybus: Don't destroy workqueue from work item running on it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45008 | 中危 | 4.19.194-3 |  | kernel: Input: MT - limit max slots 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-04 20:15 修改: 2024-09-05 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45009 | 中危 | 4.19.194-3 |  | kernel: mptcp: pm: only decrement add_addr_accepted for MPJ req 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45009 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45010 | 中危 | 4.19.194-3 |  | kernel: mptcp: pm: only mark 'subflow' endp as available 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45011 | 中危 | 4.19.194-3 |  | kernel: char: xillybus: Check USB endpoints when probing device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45012 | 中危 | 4.19.194-3 |  | kernel: nouveau/firmware: use dma non-coherent allocator 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45012 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45013 | 中危 | 4.19.194-3 |  | kernel: nvme: move stopping keep-alive into nvme_uninit_ctrl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45014 | 中危 | 4.19.194-3 |  | kernel: s390/boot: Avoid possible physmem_info segment corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45015 | 中危 | 4.19.194-3 |  | kernel: drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45016 | 中危 | 4.19.194-3 |  | kernel: netem: fix return value if duplicate enqueue fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45017 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix IPsec RoCE MPV trace call 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45017 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45018 | 中危 | 4.19.194-3 |  | kernel: netfilter: flowtable: initialise extack before use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45018 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45019 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Take state lock during tx timeout reporter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45020 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix a kernel verifier crash in stacksafe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45021 | 中危 | 4.19.194-3 |  | kernel: memcg_write_event_control(): fix a user-triggerable oops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45021 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45022 | 中危 | 4.19.194-3 |  | kernel: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45024 | 中危 | 4.19.194-3 |  | kernel: mm/hugetlb: fix hugetlb vs. core-mm PT locking 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45025 | 中危 | 4.19.194-3 |  | kernel: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45027 | 中危 | 4.19.194-3 |  | kernel: usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45027 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45028 | 中危 | 4.19.194-3 |  | kernel: mmc: mmc_test: Fix NULL dereference on allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45029 | 中危 | 4.19.194-3 |  | kernel: i2c: tegra: Do not mark ACPI devices as irq safe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45029 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-45030 | 中危 | 4.19.194-3 |  | kernel: igb: cope with large MAX_SKB_FRAGS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45030 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46672 | 中危 | 4.19.194-3 |  | kernel: wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46675 | 中危 | 4.19.194-3 |  | kernel: usb: dwc3: core: Prevent USB core invalid event buffer address access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-20 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46676 | 中危 | 4.19.194-3 |  | kernel: nfc: pn533: Add poll mod list filling check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46676 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-23 14:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46677 | 中危 | 4.19.194-3 |  | kernel: gtp: fix a potential NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46678 | 中危 | 4.19.194-3 |  | kernel: bonding: change ipsec_lock from spin lock to mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-23 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46679 | 中危 | 4.19.194-3 |  | kernel: ethtool: check device is present when getting link settings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-23 14:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46680 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btnxpuart: Fix random crash seen while removing driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46680 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-23 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46681 | 中危 | 4.19.194-3 |  | kernel: pktgen: use cpus_read_lock() in pg_net_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46681 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-19 18:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46682 | 中危 | 4.19.194-3 |  | kernel: nfsd: prevent panic for nfsv4.0 closed files in nfs4_show_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46682 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46684 | 中危 | 4.19.194-3 |  | kernel: binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46684 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-19 18:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46685 | 中危 | 4.19.194-3 |  | kernel: pinctrl: single: fix potential NULL dereference in pcs_get_function() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46685 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-14 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46686 | 中危 | 4.19.194-3 |  | kernel: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-14 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46688 | 中危 | 4.19.194-3 |  | kernel: erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46688 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-19 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46689 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: cmd-db: Map shared memory as WC, not WB 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46689 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-20 15:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46690 | 中危 | 4.19.194-3 |  | kernel: nfsd: fix nfsd4_deleg_getattr_conflict in presence of third party lease 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46690 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-20 15:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46691 | 中危 | 4.19.194-3 |  | kernel: usb: typec: ucsi: Move unregister out of atomic section 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46692 | 中危 | 4.19.194-3 |  | kernel: firmware: qcom: scm: Mark get_wq_ctx() as atomic call 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46692 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46693 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: pmic_glink: Fix race during initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46694 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: avoid using null object of framebuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46694 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-19 18:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46695 | 中危 | 4.19.194-3 |  | kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46697 | 中危 | 4.19.194-3 |  | kernel: nfsd: ensure that nfsd4_fattr_args.context is zeroed out 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-19 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46698 | 中危 | 4.19.194-3 |  | kernel: video/aperture: optionally match the device in sysfb_disable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46701 | 中危 | 4.19.194-3 |  | kernel: libfs: fix infinite directory reads for offset dir 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46702 | 中危 | 4.19.194-3 |  | kernel: thunderbolt: Mark XDomain as unplugged when router is removed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46702 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46703 | 中危 | 4.19.194-3 |  | kernel: Revert "serial: 8250_omap: Set the console genpd always on if no console suspend" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46704 | 中危 | 4.19.194-3 |  | kernel: workqueue: Fix spruious data race in __flush_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46704 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46705 | 中危 | 4.19.194-3 |  | kernel: drm/xe: reset mmio mappings with devm 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46705 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46706 | 中危 | 4.19.194-3 |  | kernel: tty: serial: fsl_lpuart: mark last busy before uart_add_one_port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46706 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46707 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46707 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46708 | 中危 | 4.19.194-3 |  | kernel: pinctrl: qcom: x1e80100: Fix special pin offsets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46708 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46709 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: Fix prime with external buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46710 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: Prevent unmapping active read buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46710 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46711 | 中危 | 4.19.194-3 |  | kernel: mptcp: pm: fix ID 0 endp usage after multiple re-creations 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46712 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: Disable coherent dumb buffers without 3d 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46713 | 中危 | 4.19.194-3 |  | kernel: perf/aux: Fix AUX buffer serialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46713 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-13 15:15 修改: 2024-09-13 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46714 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46714 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-30 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46715 | 中危 | 4.19.194-3 |  | kernel: driver: iio: add missing checks on iio_info's callback access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46716 | 中危 | 4.19.194-3 |  | kernel: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46717 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: SHAMPO, Fix incorrect page release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46717 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46718 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Don't overmap identity VRAM mapping 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46718 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46719 | 中危 | 4.19.194-3 |  | kernel: usb: typec: ucsi: Fix null pointer dereference in trace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46719 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46720 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix dereference after null check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46720 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46721 | 中危 | 4.19.194-3 |  | kernel: apparmor: fix possible NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46721 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46726 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Ensure index calculation will not overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46727 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-30 12:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46728 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check index for aux_rd_interval before using 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46728 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-26 13:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46729 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix incorrect size calculation for loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46729 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46730 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Ensure array index tg_inst won't be -1 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46730 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-30 12:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46732 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Assign linear_pitch_alignment even for VM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-26 13:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46733 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix qgroup reserve leaks in cow_file_range 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 07:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46734 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix race between direct IO write and fsync when using same fd 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46734 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46735 | 中危 | 4.19.194-3 |  | kernel: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46736 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix double put of @cfile in smb2_rename_path() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46736 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46737 | 中危 | 4.19.194-3 |  | kernel: nvmet-tcp: fix kernel crash if commands allocation fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46739 | 中危 | 4.19.194-3 |  | kernel: uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46742 | 中危 | 4.19.194-3 |  | kernel: smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46745 | 中危 | 4.19.194-3 |  | kernel: Input: uinput - reject requests with unreasonable number of slots 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46748 | 中危 | 4.19.194-3 |  | kernel: cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46748 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46749 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46749 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46750 | 中危 | 4.19.194-3 |  | kernel: PCI: Add missing bridge lock to pci_bus_lock() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46751 | 中危 | 4.19.194-3 |  | kernel: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-30 12:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46752 | 中危 | 4.19.194-3 |  | kernel: btrfs: replace BUG_ON() with error handling at update_ref_for_cow() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46753 | 中危 | 4.19.194-3 |  | kernel: btrfs: handle errors from btrfs_dec_ref() properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46754 | 中危 | 4.19.194-3 |  | kernel: bpf: Remove tst_run from lwt_seg6local_prog_ops. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46755 | 中危 | 4.19.194-3 |  | kernel: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-26 13:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46760 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw88: usb: schedule rx work after everything is set up 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46760 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46761 | 中危 | 4.19.194-3 |  | kernel: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46762 | 中危 | 4.19.194-3 |  | kernel: xen: privcmd: Fix possible access to a freed kirqfd instance 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46762 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46763 | 中危 | 4.19.194-3 |  | kernel: fou: Fix null-ptr-deref in GRO. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46764 | 中危 | 4.19.194-3 |  | kernel: bpf: add check for invalid name in btf_name_valid_section() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46765 | 中危 | 4.19.194-3 |  | kernel: ice: protect XDP configuration with a mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-26 13:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46767 | 中危 | 4.19.194-3 |  | kernel: net: phy: Fix missing of_node_put() for leds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46768 | 中危 | 4.19.194-3 |  | kernel: hwmon: (hp-wmi-sensors) Check if WMI event data exists 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46769 | 中危 | 4.19.194-3 |  | kernel: spi: intel: Add check devm_kasprintf() returned value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-30 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46770 | 中危 | 4.19.194-3 |  | kernel: ice: Add netif_device_attach/detach into PF reset flow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46770 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46771 | 中危 | 4.19.194-3 |  | kernel: can: bcm: Remove proc entry when dev is unregistered. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 18:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46772 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check denominator crb_pipes before used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46773 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check denominator pbn_div before used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46775 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Validate function returns 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 18:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46776 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Run DC_LOG_DC after checking link->link_enc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46777 | 中危 | 4.19.194-3 |  | kernel: udf: Avoid excessive partition lengths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46777 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46778 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check UnboundedRequestEnabled's value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46778 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46779 | 中危 | 4.19.194-3 |  | kernel: drm/imagination: Free pvr_vm_gpuva after unlink 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46779 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46780 | 中危 | 4.19.194-3 |  | kernel: nilfs2: protect references to superblock parameters exposed in sysfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46781 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix missing cleanup on rollforward recovery error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46783 | 中危 | 4.19.194-3 |  | kernel: tcp_bpf: fix return value of tcp_bpf_sendmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46783 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46784 | 中危 | 4.19.194-3 |  | kernel: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46784 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-26 13:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46785 | 中危 | 4.19.194-3 |  | kernel: eventfs: Use list_del_rcu() for SRCU protected list variable 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46785 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46787 | 中危 | 4.19.194-3 |  | kernel: userfaultfd: fix checks for huge PMDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46787 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 15:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46788 | 中危 | 4.19.194-3 |  | kernel: tracing/osnoise: Use a cpumask to know what threads are kthreads 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46788 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-22 16:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46789 | 中危 | 4.19.194-3 |  | kernel: mm/slub: add check for s->flags in the alloc_tagging_slab_free_hook 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46789 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46790 | 中危 | 4.19.194-3 |  | kernel: codetag: debug: mark codetags for poisoned page as empty 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46790 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-22 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46791 | 中危 | 4.19.194-3 |  | kernel: can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46792 | 中危 | 4.19.194-3 |  | kernel: riscv: misaligned: Restrict user access to kernel memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46792 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46793 | 中危 | 4.19.194-3 |  | kernel: ASoC: Intel: Boards: Fix NULL pointer deref in BYT/CHT boards harder 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46793 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-24 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46795 | 中危 | 4.19.194-3 |  | kernel: ksmbd: unset the binding mark of a reused connection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46795 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46797 | 中危 | 4.19.194-3 |  | kernel: powerpc/qspinlock: Fix deadlock in MCS queue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46797 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-29 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46799 | 中危 | 4.19.194-3 |  | kernel: net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46801 | 中危 | 4.19.194-3 |  | kernel: libfs: fix get_stashed_dentry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46802 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: added NULL check at start of dc_validate_stream 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46802 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-07 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46803 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: Check debug trap enable before write dbg_ev_file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46805 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix the waring dereferencing hive 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46805 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46806 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix the warning division or modulo by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46806 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 13:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46807 | 中危 | 4.19.194-3 |  | kernel: drm/amd/amdgpu: Check tbo resource pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46807 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46808 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46808 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46809 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check BIOS images before it is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46809 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46810 | 中危 | 4.19.194-3 |  | kernel: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46810 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46816 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46816 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46817 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46817 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46819 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46819 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46822 | 中危 | 4.19.194-3 |  | kernel: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46822 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46823 | 中危 | 4.19.194-3 |  | kernel: kunit/overflow: Fix UB in overflow_allocation_test 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46823 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 13:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46824 | 中危 | 4.19.194-3 |  | kernel: iommufd: Require drivers to supply the cache_invalidate_user ops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46824 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46825 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46826 | 中危 | 4.19.194-3 |  | kernel: ELF: fix kernel.randomize_va_space double read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46827 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix firmware crash due to invalid peer nss 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46827 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-11-20 20:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46829 | 中危 | 4.19.194-3 |  | kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46830 | 中危 | 4.19.194-3 |  | kernel: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46830 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-09-30 12:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46832 | 中危 | 4.19.194-3 |  | kernel: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46832 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46834 | 中危 | 4.19.194-3 |  | kernel: ethtool: fail closed if we can't get max channel used in indirection tables 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46834 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46835 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix smatch static checker warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46835 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46837 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Restrict high priorities on group_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46837 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46838 | 中危 | 4.19.194-3 |  | kernel: userfaultfd: don't BUG_ON() if khugepaged yanks our page table 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46840 | 中危 | 4.19.194-3 |  | kernel: btrfs: clean up our handling of refs == 0 in snapshot delete 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46841 | 中危 | 4.19.194-3 |  | kernel: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46841 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46842 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46842 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46843 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Remove SCSI host only if added 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46843 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46846 | 中危 | 4.19.194-3 |  | kernel: spi: rockchip: Resolve unbalanced runtime PM / system PM handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46847 | 中危 | 4.19.194-3 |  | kernel: mm: vmalloc: ensure vmap_block is initialised before adding to queue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46847 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46848 | 中危 | 4.19.194-3 |  | kernel: perf/x86/intel: Limit the period on Haswell 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46848 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46850 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Avoid race between dcn35_set_drr() and dc_state_destruct() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46851 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-04 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46855 | 中危 | 4.19.194-3 |  | kernel: netfilter: nft_socket: fix sk refcount leaks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46855 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46856 | 中危 | 4.19.194-3 |  | kernel: net: phy: dp83822: Fix NULL pointer dereference on DP83825 devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46856 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-01 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46857 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix bridge mode operations when there are no VFs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46857 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-01 17:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46860 | 中危 | 4.19.194-3 |  | kernel: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46860 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46861 | 中危 | 4.19.194-3 |  | kernel: usbnet: ipheth: do not stop RX on failing RX callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46862 | 中危 | 4.19.194-3 |  | kernel: ASoC: Intel: soc-acpi-intel-mtl-match: add missing empty item 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46862 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46863 | 中危 | 4.19.194-3 |  | kernel: ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46864 | 中危 | 4.19.194-3 |  | kernel: x86/hyperv: fix kexec crash due to VP assist page corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46866 | 中危 | 4.19.194-3 |  | kernel: drm/xe/client: add missing bo locking in show_meminfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-01 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46867 | 中危 | 4.19.194-3 |  | kernel: drm/xe/client: fix deadlock in show_meminfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-01 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46868 | 中危 | 4.19.194-3 |  | kernel: firmware: qcom: uefisecapp: Fix deadlock in qcuefi_acquire() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-27 13:15 修改: 2024-10-01 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46869 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btintel_pcie: Allocate memory for driver private data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-30 16:15 修改: 2024-11-13 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46870 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Disable DMCUB timeout for DCN35 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 14:15 修改: 2024-10-23 14:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47658 | 中危 | 4.19.194-3 |  | kernel: crypto: stm32/cryp - call finalize with bh disabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 14:15 修改: 2024-10-23 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47660 | 中危 | 4.19.194-3 |  | kernel: fsnotify: clear PARENT_WATCHED flags lazily 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47660 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 14:15 修改: 2024-10-23 17:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47661 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Avoid overflow from uint32_t to uint8_t 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-15 16:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47662 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47663 | 中危 | 4.19.194-3 |  | kernel: staging: iio: frequency: ad9834: Validate frequency parameter value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47664 | 中危 | 4.19.194-3 |  | kernel: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 16:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47665 | 中危 | 4.19.194-3 |  | kernel: i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 16:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47666 | 中危 | 4.19.194-3 |  | kernel: scsi: pm80xx: Set phy->enable_completion only when we wait for it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47667 | 中危 | 4.19.194-3 |  | kernel: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 16:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47668 | 中危 | 4.19.194-3 |  | kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47669 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix state management in error path of log writing function 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-21 13:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47671 | 中危 | 4.19.194-3 |  | kernel: USB: usbtmc: prevent kernel-usb-infoleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47672 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47673 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-09 15:15 修改: 2024-10-23 20:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47674 | 中危 | 4.19.194-3 |  | kernel: mm: avoid leaving partial pfn mappings around in error case 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-15 11:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47677 | 中危 | 4.19.194-3 |  | kernel: exfat: resolve memory leak from exfat_create_upcase_table() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-22 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47678 | 中危 | 4.19.194-3 |  | kernel: icmp: change the order of rate limits 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 17:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47679 | 中危 | 4.19.194-3 |  | kernel: vfs: fix race between evice_inodes() and find_inode()&iput() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47680 | 中危 | 4.19.194-3 |  | kernel: f2fs: check discard support for conventional zones 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47680 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47681 | 中危 | 4.19.194-3 |  | kernel: wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47681 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-22 14:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47683 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Skip Recompute DSC Params if no Stream on Link 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47683 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47684 | 中危 | 4.19.194-3 |  | kernel: tcp: check skb is non-NULL in tcp_rto_delta_us() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47684 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47687 | 中危 | 4.19.194-3 |  | kernel: vdpa/mlx5: Fix invalid mr resource destroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 15:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47688 | 中危 | 4.19.194-3 |  | kernel: driver core: Fix a potential null-ptr-deref in module_add_driver() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47688 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 15:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47689 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47689 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47690 | 中危 | 4.19.194-3 |  | kernel: f2fs: get rid of online repaire on corrupted directory 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47690 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 21:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47692 | 中危 | 4.19.194-3 |  | kernel: nfsd: return -EINVAL when namelen is 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47692 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47693 | 中危 | 4.19.194-3 |  | kernel: IB/core: Fix ib_cache_setup_one error flow cleanup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 21:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47699 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47700 | 中危 | 4.19.194-3 |  | kernel: ext4: check stripe size compatibility on remount as well 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 21:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47702 | 中危 | 4.19.194-3 |  | kernel: bpf: Fail verification for sign-extension of packet data/data_end/data_meta 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47702 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47703 | 中危 | 4.19.194-3 |  | kernel: bpf, lsm: Add check for BPF LSM return value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47704 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check link_res->hpo_dp_link_enc before using it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47704 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47705 | 中危 | 4.19.194-3 |  | kernel: block: fix potential invalid pointer dereference in blk_add_partition 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47705 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47706 | 中危 | 4.19.194-3 |  | kernel: block, bfq: fix possible UAF for bfqq->bic with merge chain 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47706 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47707 | 中危 | 4.19.194-3 |  | kernel: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47707 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47709 | 中危 | 4.19.194-3 |  | kernel: can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47710 | 中危 | 4.19.194-3 |  | kernel: sock_map: Add a cond_resched() in sock_hash_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47710 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47712 | 中危 | 4.19.194-3 |  | kernel: wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47713 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47713 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47714 | 中危 | 4.19.194-3 |  | kernel: wifi: mt76: mt7996: use hweight16 to get correct tx antenna 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47714 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47715 | 中危 | 4.19.194-3 |  | kernel: wifi: mt76: mt7915: fix oops on non-dbdc mt7986 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47716 | 中危 | 4.19.194-3 |  | kernel: ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47717 | 中危 | 4.19.194-3 |  | kernel: RISC-V: KVM: Don't zero-out PMU snapshot area before freeing data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47717 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47720 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47720 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 12:15 修改: 2024-10-23 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47724 | 中危 | 4.19.194-3 |  | kernel: wifi: ath11k: use work queue to process beacon tx event 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 21:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47726 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to wait dio completion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-24 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47728 | 中危 | 4.19.194-3 |  | kernel: bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47728 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 20:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47729 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Use reserved copy engine for user binds on faulting devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47729 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 20:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47731 | 中危 | 4.19.194-3 |  | kernel: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47731 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47732 | 中危 | 4.19.194-3 |  | kernel: crypto: iaa - Fix potential use after free bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-12-20 15:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47733 | 中危 | 4.19.194-3 |  | kernel: netfs: Delete subtree of 'fs/netfs' when netfs module exits 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47734 | 中危 | 4.19.194-3 |  | kernel: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47734 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 17:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47735 | 中危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47735 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 21:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47736 | 中危 | 4.19.194-3 |  | kernel: erofs: handle overlapped pclusters out of crafted images properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47736 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47737 | 中危 | 4.19.194-3 |  | kernel: nfsd: call cache_put if xdr_reserve_space returns NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47739 | 中危 | 4.19.194-3 |  | kernel: padata: use integer wrap around to prevent deadlock on seq_nr overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47740 | 中危 | 4.19.194-3 |  | kernel: f2fs: Require FMODE_WRITE for atomic write ioctls 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47740 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47743 | 中危 | 4.19.194-3 |  | kernel: KEYS: prevent NULL pointer dereference in find_asymmetric_key() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47743 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 15:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47744 | 中危 | 4.19.194-3 |  | kernel: KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 15:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47746 | 中危 | 4.19.194-3 |  | kernel: fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47746 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47749 | 中危 | 4.19.194-3 |  | kernel: RDMA/cxgb4: Added NULL check for lookup_atid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47749 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47752 | 中危 | 4.19.194-3 |  | kernel: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47753 | 中危 | 4.19.194-3 |  | kernel: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47754 | 中危 | 4.19.194-3 |  | kernel: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47756 | 中危 | 4.19.194-3 |  | kernel: PCI: keystone: Fix if-statement expression in ks_pcie_quirk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49850 | 中危 | 4.19.194-3 |  | kernel: bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49850 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49851 | 中危 | 4.19.194-3 |  | kernel: tpm: Clean up TPM space after command failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49851 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49856 | 中危 | 4.19.194-3 |  | kernel: x86/sgx: Fix deadlock in SGX NUMA node search 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49856 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49858 | 中危 | 4.19.194-3 |  | kernel: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49858 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49859 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to check atomic_file in f2fs ioctl interfaces 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49859 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-22 16:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49863 | 中危 | 4.19.194-3 |  | kernel: vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49863 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 19:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49864 | 中危 | 4.19.194-3 |  | kernel: rxrpc: Fix a race between socket set up and I/O thread creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49864 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49866 | 中危 | 4.19.194-3 |  | kernel: tracing/timerlat: Fix a race during cpuhp processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49866 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-20 15:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49867 | 中危 | 4.19.194-3 |  | kernel: btrfs: wait for fixup workers before stopping cleaner kthread during umount 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49868 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49870 | 中危 | 4.19.194-3 |  | kernel: cachefiles: fix dentry leak in cachefiles_open_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49870 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 12:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49871 | 中危 | 4.19.194-3 |  | kernel: Input: adp5589-keys - fix NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 20:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49872 | 中危 | 4.19.194-3 |  | kernel: mm/gup: fix memfd_pin_folios alloc race panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49872 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49873 | 中危 | 4.19.194-3 |  | kernel: mm/filemap: fix filemap_get_folios_contig THP panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49873 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 20:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49875 | 中危 | 4.19.194-3 |  | kernel: nfsd: map the EBADMSG to nfserr_io to avoid warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49875 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 20:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49877 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49877 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49878 | 中危 | 4.19.194-3 |  | kernel: resource: fix region_intersects() vs add_memory_driver_managed() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49878 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49879 | 中危 | 4.19.194-3 |  | kernel: drm: omapdrm: Add missing check for alloc_ordered_workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49879 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49881 | 中危 | 4.19.194-3 |  | kernel: ext4: update orig_path in ext4_find_extent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49881 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49885 | 中危 | 4.19.194-3 |  | kernel: mm, slub: avoid zeroing kmalloc redzone 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49885 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49886 | 中危 | 4.19.194-3 |  | kernel: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49887 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to don't panic system for no free segment fault injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49888 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix a sdiv overflow issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49888 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49890 | 中危 | 4.19.194-3 |  | kernel: drm/amd/pm: ensure the fw_info is not null before using it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49890 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49891 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49891 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49892 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Initialize get_bytes_per_element's default to 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49892 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49893 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check stream_status before it is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49893 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49896 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check stream before comparing them 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49897 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check phantom_stream before it is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49897 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49898 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null-initialized variables 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49899 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Initialize denominators' default to 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49899 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49901 | 中危 | 4.19.194-3 |  | kernel: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49901 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49902 | 中危 | 4.19.194-3 |  | kernel: jfs: check if leafidx greater than num leaves per dmap tree 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49902 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49904 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: add list empty check to avoid null pointer issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49904 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49905 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49905 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49906 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointer before try to access it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49906 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49907 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointers before using dc->clk_mgr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 03:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49908 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 03:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49909 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49910 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49910 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 02:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49911 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49911 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49912 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49912 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 17:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49913 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49913 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 14:39 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49914 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49914 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49915 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49916 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn401_init_hw 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 17:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49917 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49918 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49918 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 16:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49919 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49920 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointers before multiple uses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49920 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49921 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointers before used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49921 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49922 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointers before using them 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49923 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-24 19:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49925 | 中危 | 4.19.194-3 |  | kernel: fbdev: efifb: Register sysfs groups through driver core 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49925 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49926 | 中危 | 4.19.194-3 |  | kernel: rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49926 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49927 | 中危 | 4.19.194-3 |  | kernel: x86/ioapic: Handle allocation failures gracefully 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49927 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49929 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49932 | 中危 | 4.19.194-3 |  | kernel: btrfs: don't readahead the relocation inode on RST 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 15:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49933 | 中危 | 4.19.194-3 |  | kernel: blk_iocost: fix more out of bound shifts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49933 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 15:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49934 | 中危 | 4.19.194-3 |  | kernel: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49935 | 中危 | 4.19.194-3 |  | kernel: ACPI: PAD: fix crash in exit_round_robin() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 15:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49937 | 中危 | 4.19.194-3 |  | kernel: wifi: cfg80211: Set correct chandef when starting CAC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 17:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49938 | 中危 | 4.19.194-3 |  | kernel: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49938 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 15:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49939 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw89: avoid to add interface to list twice when SER 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49940 | 中危 | 4.19.194-3 |  | kernel: l2tp: prevent possible tunnel refcount underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 13:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49941 | 中危 | 4.19.194-3 |  | kernel: gpiolib: Fix potential NULL pointer dereference in gpiod_get_label() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49941 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49942 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Prevent null pointer access in xe_migrate_copy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49943 | 中危 | 4.19.194-3 |  | kernel: drm/xe/guc_submit: add missing locking in wedged_fini 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49943 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-01 14:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49944 | 中危 | 4.19.194-3 |  | kernel: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49944 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 13:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49945 | 中危 | 4.19.194-3 |  | kernel: net/ncsi: Disable the ncsi work before freeing the associated structure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-01 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49946 | 中危 | 4.19.194-3 |  | kernel: ppp: do not assume bh is held in ppp_channel_bridge_input() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49946 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49947 | 中危 | 4.19.194-3 |  | kernel: net: test for not too small csum_start in virtio_net_hdr_to_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49947 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49948 | 中危 | 4.19.194-3 |  | kernel: net: add more sanity checks to qdisc_pkt_len_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49948 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49949 | 中危 | 4.19.194-3 |  | kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49949 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49951 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49952 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: prevent nf_skb_duplicated corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-13 00:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49953 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-07 17:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49954 | 中危 | 4.19.194-3 |  | kernel: static_call: Replace pointless WARN_ON() in static_call_module_notify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49954 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-07 19:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49955 | 中危 | 4.19.194-3 |  | kernel: ACPI: battery: Fix possible crash when unregistering a battery hook 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49955 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49956 | 中危 | 4.19.194-3 |  | kernel: gfs2: fix double destroy_workqueue error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49956 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-01 15:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49957 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix null-ptr-deref when journal load failed. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49957 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49958 | 中危 | 4.19.194-3 |  | kernel: ocfs2: reserve space for inline xattr before attaching reflink tree 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49958 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49959 | 中危 | 4.19.194-3 |  | kernel: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49959 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49961 | 中危 | 4.19.194-3 |  | kernel: media: i2c: ar0521: Use cansleep version of gpiod_set_value() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-07 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49962 | 中危 | 4.19.194-3 |  | kernel: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49962 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49963 | 中危 | 4.19.194-3 |  | kernel: mailbox: bcm2835: Fix timeout during suspend mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49963 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49964 | 中危 | 4.19.194-3 |  | kernel: mm/hugetlb: fix memfd_pin_folios free_huge_pages leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49964 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-07 19:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49965 | 中危 | 4.19.194-3 |  | kernel: ocfs2: remove unreasonable unlock in ocfs2_read_blocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49968 | 中危 | 4.19.194-3 |  | kernel: ext4: filesystems without casefold feature cannot be mounted with siphash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49968 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-07 19:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49970 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN401 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49970 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-29 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49971 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Increase array size of dummy_boolean 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49971 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-01 19:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49972 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Deallocate DML memory if allocation fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-01 20:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49973 | 中危 | 4.19.194-3 |  | kernel: r8169: add tally counter fields added with RTL8125 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49974 | 中危 | 4.19.194-3 |  | kernel: NFSD: Limit the number of concurrent async COPY operations 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49974 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49975 | 中危 | 4.19.194-3 |  | kernel: uprobes: fix kernel info leak via "[uprobes]" vma 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49975 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49976 | 中危 | 4.19.194-3 |  | kernel: tracing/timerlat: Drop interface_lock in stop_kthread() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49976 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 20:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49977 | 中危 | 4.19.194-3 |  | kernel: net: stmmac: Fix zero-division error when disabling tc cbs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 20:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49978 | 中危 | 4.19.194-3 |  | kernel: gso: fix udp gso fraglist segmentation after pull from frag_list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49978 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-29 18:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49979 | 中危 | 4.19.194-3 |  | kernel: net: gso: fix tcp fraglist segmentation after pull from frag_list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49979 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-29 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49980 | 中危 | 4.19.194-3 |  | kernel: vrf: revert "vrf: Remove unnecessary RCU-bh critical section" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49980 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-31 14:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49985 | 中危 | 4.19.194-3 |  | kernel: i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49987 | 中危 | 4.19.194-3 |  | kernel: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49987 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-28 16:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49988 | 中危 | 4.19.194-3 |  | kernel: ksmbd: add refcnt to ksmbd_conn struct 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-28 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49990 | 中危 | 4.19.194-3 |  | kernel: drm/xe/hdcp: Check GSC structure validity 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49990 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-28 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49994 | 中危 | 4.19.194-3 |  | kernel: block: fix integer overflow in BLKSECDISCARD 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49994 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49998 | 中危 | 4.19.194-3 |  | kernel: net: dsa: improve shutdown sequence 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49998 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-30 22:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-49999 | 中危 | 4.19.194-3 |  | kernel: afs: Fix the setting of the server responding flag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49999 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-29 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50000 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-25 19:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50001 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix error path in multi-packet WQE transmit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50001 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-30 21:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50002 | 中危 | 4.19.194-3 |  | kernel: static_call: Handle module init failure correctly in static_call_del_module() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 18:15 修改: 2024-10-30 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50003 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix system hang while resume with TBT monitor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50003 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-01 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50004 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50004 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-07 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50006 | 中危 | 4.19.194-3 |  | kernel: ext4: fix i_data_sem unlock order in ext4_ind_migrate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50006 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50008 | 中危 | 4.19.194-3 |  | kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50009 | 中危 | 4.19.194-3 |  | kernel: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50009 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-01 15:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50010 | 中危 | 4.19.194-3 |  | kernel: exec: don't WARN for racy path_noexec check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-12-05 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50011 | 中危 | 4.19.194-3 |  | kernel: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-01 15:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50012 | 中危 | 4.19.194-3 |  | kernel: cpufreq: Avoid a bad reference count on CPU node 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50012 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50013 | 中危 | 4.19.194-3 |  | kernel: exfat: fix memory leak in exfat_load_bitmap() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50013 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-10-25 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50014 | 中危 | 4.19.194-3 |  | kernel: ext4: fix access to uninitialised lock in fc replay path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50014 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-10-28 17:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50015 | 中危 | 4.19.194-3 |  | kernel: ext4: dax: fix overflowing extents beyond inode size when partially writing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-10-28 17:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50016 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Avoid overflow assignment in link_dp_cts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50016 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-10-28 17:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50017 | 中危 | 4.19.194-3 |  | kernel: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50017 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 19:15 修改: 2024-10-25 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50019 | 中危 | 4.19.194-3 |  | kernel: kthread: unpark only parked kthread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50020 | 中危 | 4.19.194-3 |  | kernel: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50020 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50021 | 中危 | 4.19.194-3 |  | kernel: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50021 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50022 | 中危 | 4.19.194-3 |  | kernel: device-dax: correct pgoff align in dax_set_mapping() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50023 | 中危 | 4.19.194-3 |  | kernel: net: phy: Remove LED entry from LEDs list on unregister 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50024 | 中危 | 4.19.194-3 |  | kernel: net: Fix an unsafe loop on the list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50025 | 中危 | 4.19.194-3 |  | kernel: scsi: fnic: Move flush_work initialization out of if block 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50026 | 中危 | 4.19.194-3 |  | kernel: scsi: wd33c93: Don't use stale scsi_pointer value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50026 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50027 | 中危 | 4.19.194-3 |  | kernel: thermal: core: Free tzp copy along with the thermal zone 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50027 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50028 | 中危 | 4.19.194-3 |  | kernel: thermal: core: Reference count the zone in thermal_zone_get_by_id() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50028 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50031 | 中危 | 4.19.194-3 |  | kernel: drm/v3d: Stop the active perfmon before being destroyed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50031 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50032 | 中危 | 4.19.194-3 |  | kernel: rcu/nocb: Fix rcuog wake-up from offline softirq 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50034 | 中危 | 4.19.194-3 |  | kernel: net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50034 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50037 | 中危 | 4.19.194-3 |  | kernel: drm/fbdev-dma: Only cleanup deferred I/O if necessary 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50038 | 中危 | 4.19.194-3 |  | kernel: netfilter: xtables: avoid NFPROTO_UNSPEC where needed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50038 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50039 | 中危 | 4.19.194-3 |  | kernel: net/sched: accept TCA_STAB only for root qdisc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50040 | 中危 | 4.19.194-3 |  | kernel: igb: Do not bring the device up after non-fatal error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50040 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50041 | 中危 | 4.19.194-3 |  | kernel: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50041 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50045 | 中危 | 4.19.194-3 |  | kernel: netfilter: br_netfilter: fix panic with metadata_dst skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50045 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50046 | 中危 | 4.19.194-3 |  | kernel: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50046 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50048 | 中危 | 4.19.194-3 |  | kernel: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 21:46 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50049 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Check null pointer before dereferencing se 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50049 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 21:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50056 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-20 20:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50058 | 中危 | 4.19.194-3 |  | kernel: serial: protect uart_port_dtr_rts() in uart_shutdown() too 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50060 | 中危 | 4.19.194-3 |  | kernel: io_uring: check if we need to reschedule during overflow flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50060 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-20 20:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50062 | 中危 | 4.19.194-3 |  | kernel: RDMA/rtrs-srv: Avoid null pointer deref during path establishment 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50062 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 21:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50064 | 中危 | 4.19.194-3 |  | kernel: zram: free secondary algorithms names 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-23 21:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50065 | 中危 | 4.19.194-3 |  | kernel: ntfs3: Change to non-blocking allocation in ntfs_d_hash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-20 20:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50068 | 中危 | 4.19.194-3 |  | kernel: mm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 16:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50069 | 中危 | 4.19.194-3 |  | kernel: pinctrl: apple: check devm_kasprintf() returned value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50069 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50070 | 中危 | 4.19.194-3 |  | kernel: pinctrl: stm32: check devm_kasprintf() returned value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 16:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50072 | 中危 | 4.19.194-3 |  | kernel: x86/bugs: Use code segment selector for VERW operand 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50072 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50075 | 中危 | 4.19.194-3 |  | kernel: xhci: tegra: fix checked USB2 port number 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-01 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50076 | 中危 | 4.19.194-3 |  | kernel: vt: prevent kernel-infoleak in con_font_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50077 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: ISO: Fix multiple init when debugfs is disabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-01 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50078 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: Call iso_exit() on module unload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-01 16:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50079 | 中危 | 4.19.194-3 |  | kernel: io_uring/sqpoll: ensure task state is TASK_RUNNING when running task_work 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50079 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50080 | 中危 | 4.19.194-3 |  | kernel: ublk: don't allow user copy for unprivileged device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50080 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50081 | 中危 | 4.19.194-3 |  | kernel: blk-mq: setup queue ->tag_set before initializing hctx 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50081 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 15:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50082 | 中危 | 4.19.194-3 |  | kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50082 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50084 | 中危 | 4.19.194-3 |  | kernel: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50085 | 中危 | 4.19.194-3 |  | kernel: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50087 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix uninitialized pointer free on read_alloc_one_name() error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-29 01:15 修改: 2024-10-30 14:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50090 | 中危 | 4.19.194-3 |  | kernel: drm/xe/oa: Fix overflow in oa batch buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-12 21:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50091 | 中危 | 4.19.194-3 |  | kernel: dm vdo: don't refer to dedupe_context after releasing it 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-12 21:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50093 | 中危 | 4.19.194-3 |  | kernel: thermal: intel: int340x: processor: Fix warning during module unload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50093 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-08 16:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50094 | 中危 | 4.19.194-3 |  | kernel: sfc: Don't invoke xdp_do_flush() from netpoll. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50094 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-13 00:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50095 | 中危 | 4.19.194-3 |  | kernel: RDMA/mad: Improve handling of timed out WRs of mad agent 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-12 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50096 | 中危 | 4.19.194-3 |  | kernel: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-12 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50097 | 中危 | 4.19.194-3 |  | kernel: net: fec: don't save PTP state if PTP is unsupported 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50097 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-12 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50098 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50098 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 16:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50099 | 中危 | 4.19.194-3 |  | kernel: arm64: probes: Remove broken LDR (literal) uprobe support 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50099 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 16:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50100 | 中危 | 4.19.194-3 |  | kernel: USB: gadget: dummy-hcd: Fix "task hung" problem 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50100 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 14:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50101 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50101 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 14:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50102 | 中危 | 4.19.194-3 |  | kernel: x86: fix user address masking non-canonical speculation issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50102 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 15:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50103 | 中危 | 4.19.194-3 |  | kernel: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50103 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50104 | 中危 | 4.19.194-3 |  | kernel: ASoC: qcom: sdm845: add missing soundwire runtime stream alloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50104 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 15:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50105 | 中危 | 4.19.194-3 |  | kernel: ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50105 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-12 15:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50107 | 中危 | 4.19.194-3 |  | kernel: platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50108 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50108 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50109 | 中危 | 4.19.194-3 |  | kernel: md/raid10: fix null ptr dereference in raid10_size() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50109 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50110 | 中危 | 4.19.194-3 |  | kernel: xfrm: fix one more kernel-infoleak in algo dumping 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50110 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50111 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50111 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 20:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50113 | 中危 | 4.19.194-3 |  | kernel: firewire: core: fix invalid port index for parent device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 20:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50116 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix kernel bug due to missing clearing of buffer delay flag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50116 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 19:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50117 | 中危 | 4.19.194-3 |  | kernel: drm/amd: Guard against bad data for ATIF ACPI method 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50118 | 中危 | 4.19.194-3 |  | kernel: btrfs: reject ro->rw reconfiguration if there are hard ro requirements 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50118 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50119 | 中危 | 4.19.194-3 |  | kernel: cifs: fix warning when destroy 'cifs_io_request_pool' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 18:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50120 | 中危 | 4.19.194-3 |  | kernel: smb: client: Handle kstrdup failures for passwords 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50120 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 18:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50122 | 中危 | 4.19.194-3 |  | kernel: PCI: Hold rescan lock while adding devices during host probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-13 01:06 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50132 | 中危 | 4.19.194-3 |  | kernel: tracing/probes: Fix MAX_TRACE_ARGS limit handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50132 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-07 21:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50133 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Don't crash in stack_top() for tasks without vDSO 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50133 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-07 21:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50134 | 中危 | 4.19.194-3 |  | kernel: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50135 | 中危 | 4.19.194-3 |  | kernel: nvme-pci: fix race condition between reset and nvme_dev_disable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50135 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 14:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50136 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Unregister notifier on eswitch init failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50136 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50137 | 中危 | 4.19.194-3 |  | kernel: reset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50137 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50138 | 中危 | 4.19.194-3 |  | kernel: bpf: Use raw_spinlock_t in ringbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 18:15 修改: 2024-11-08 14:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50139 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Fix shift-out-of-bounds bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50139 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50140 | 中危 | 4.19.194-3 |  | kernel: sched/core: Disable page allocation in task_tick_mm_cid() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50140 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50141 | 中危 | 4.19.194-3 |  | kernel: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50141 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:45 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50142 | 中危 | 4.19.194-3 |  | kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50142 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50144 | 中危 | 4.19.194-3 |  | kernel: drm/xe: fix unbalanced rpm put() with fence_fini() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-18 21:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50145 | 中危 | 4.19.194-3 |  | kernel: octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-15 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50146 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: Don't call cleanup on profile rollback failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50146 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50147 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: Fix command bitmask initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50147 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-18 21:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50148 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50148 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-18 21:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50149 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Don't free job in TDR 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50149 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50152 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix possible double free in smb2_set_ea() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-19 02:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50153 | 中危 | 4.19.194-3 |  | kernel: scsi: target: core: Fix null-ptr-deref in target_alloc_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50153 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50156 | 中危 | 4.19.194-3 |  | kernel: drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50156 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-20 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50157 | 中危 | 4.19.194-3 |  | kernel: RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50157 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-12-04 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50160 | 中危 | 4.19.194-3 |  | kernel: ALSA: hda/cs8409: Fix possible NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 16:13 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50161 | 中危 | 4.19.194-3 |  | kernel: bpf: Check the remaining info_cnt before repeating btf fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50161 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 16:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50162 | 中危 | 4.19.194-3 |  | kernel: bpf: devmap: provide rxq after redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50162 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 20:37 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50163 | 中危 | 4.19.194-3 |  | kernel: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50163 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 17:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50165 | 中危 | 4.19.194-3 |  | kernel: bpf: Preserve param->string when parsing mount options 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50165 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50166 | 中危 | 4.19.194-3 |  | kernel: fsl/fman: Fix refcount handling of fman-related devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50166 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50167 | 中危 | 4.19.194-3 |  | kernel: be2net: fix potential memory leak in be_xmit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50167 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 15:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50168 | 中危 | 4.19.194-3 |  | kernel: net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50168 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50169 | 中危 | 4.19.194-3 |  | kernel: vsock: Update rx_bytes on read_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50169 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50170 | 中危 | 4.19.194-3 |  | kernel: net: bcmasp: fix potential memory leak in bcmasp_xmit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50170 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 16:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50171 | 中危 | 4.19.194-3 |  | kernel: net: systemport: fix potential memory leak in bcm_sysport_xmit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50171 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50172 | 中危 | 4.19.194-3 |  | kernel: RDMA/bnxt_re: Fix a possible memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50172 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-07 10:15 修改: 2024-11-13 15:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50173 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Fix access to uninitialized variable in tick_ctx_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50173 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 20:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50174 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Fix race when converting group handle to group object 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 20:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50175 | 中危 | 4.19.194-3 |  | kernel: media: qcom: camss: Remove use_count guard in stop_streaming 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50175 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 20:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50176 | 中危 | 4.19.194-3 |  | kernel: remoteproc: k3-r5: Fix error handling when power-up failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 20:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50177 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: fix a UBSAN warning in DML2.1 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50177 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-09 23:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50178 | 中危 | 4.19.194-3 |  | kernel: cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50178 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 20:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50179 | 中危 | 4.19.194-3 |  | kernel: ceph: remove the incorrect Fw reference check when dirtying pages 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50179 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50181 | 中危 | 4.19.194-3 |  | kernel: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50181 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50182 | 中危 | 4.19.194-3 |  | kernel: secretmem: disable memfd_secret() if arch cannot set direct map 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50182 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50183 | 中危 | 4.19.194-3 |  | kernel: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50183 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-09 23:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50184 | 中危 | 4.19.194-3 |  | kernel: virtio_pmem: Check device status before requesting flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50184 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-09 23:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50185 | 中危 | 4.19.194-3 |  | kernel: mptcp: handle consistently DSS corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50185 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-09 23:19 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50187 | 中危 | 4.19.194-3 |  | kernel: drm/vc4: Stop the active perfmon before being destroyed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50187 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 21:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50188 | 中危 | 4.19.194-3 |  | kernel: net: phy: dp83869: fix memory corruption when enabling fiber 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50188 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50189 | 中危 | 4.19.194-3 |  | kernel: HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-27 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50190 | 中危 | 4.19.194-3 |  | kernel: ice: fix memleak in ice_init_tx_topology() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50190 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-11 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50191 | 中危 | 4.19.194-3 |  | kernel: ext4: don't set SB_RDONLY after filesystem errors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50191 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-12-11 15:36 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50192 | 中危 | 4.19.194-3 |  | kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50194 | 中危 | 4.19.194-3 |  | kernel: arm64: probes: Fix uprobes for big-endian kernels 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50195 | 中危 | 4.19.194-3 |  | kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50196 | 中危 | 4.19.194-3 |  | kernel: pinctrl: ocelot: fix system hang on level based interrupts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50196 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50197 | 中危 | 4.19.194-3 |  | kernel: pinctrl: intel: platform: fix error path in device_for_each_child_node() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50198 | 中危 | 4.19.194-3 |  | kernel: iio: light: veml6030: fix IIO device retrieval from embedded device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-29 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50199 | 中危 | 4.19.194-3 |  | kernel: mm/swapfile: skip HugeTLB pages for unuse_vma 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50199 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-08 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50200 | 中危 | 4.19.194-3 |  | kernel: maple_tree: correct tree corruption on spanning store 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50200 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-08 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50201 | 中危 | 4.19.194-3 |  | kernel: drm/radeon: Fix encoder->possible_clones 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50201 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50202 | 中危 | 4.19.194-3 |  | kernel: nilfs2: propagate directory read errors from nilfs_find_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50202 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50204 | 中危 | 4.19.194-3 |  | kernel: fs: don't try and remove empty rbtree node 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50205 | 中危 | 4.19.194-3 |  | kernel: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-13 17:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50206 | 中危 | 4.19.194-3 |  | kernel: net: ethernet: mtk_eth_soc: fix memory corruption during fq dma init 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-13 16:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50207 | 中危 | 4.19.194-3 |  | kernel: ring-buffer: Fix reader locking when changing the sub buffer order 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50207 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50208 | 中危 | 4.19.194-3 |  | kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50208 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50210 | 中危 | 4.19.194-3 |  | kernel: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-19 16:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50212 | 中危 | 4.19.194-3 |  | kernel: lib: alloc_tag_module_unload must wait for pending kfree_rcu calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-12 13:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50213 | 中危 | 4.19.194-3 |  | kernel: drm/tests: hdmi: Fix memory leaks in drm_display_mode_from_cea_vic() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50213 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50214 | 中危 | 4.19.194-3 |  | kernel: drm/connector: hdmi: Fix memory leak in drm_display_mode_from_cea_vic() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50216 | 中危 | 4.19.194-3 |  | kernel: xfs: fix finding a last resort AG in xfs_filestream_pick_ag 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50216 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-12 13:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50218 | 中危 | 4.19.194-3 |  | kernel: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-12 13:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50220 | 中危 | 4.19.194-3 |  | kernel: fork: do not invoke uffd on fork if error occurs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50220 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-09 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50223 | 中危 | 4.19.194-3 |  | kernel: sched/numa: Fix the potential null pointer dereference in task_numa_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50223 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50224 | 中危 | 4.19.194-3 |  | kernel: spi: spi-fsl-dspi: Fix crash when not using GPIO chip select 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50225 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix error propagation of split bios 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50225 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 19:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50229 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix potential deadlock with newly created symlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50229 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50231 | 中危 | 4.19.194-3 |  | kernel: iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50232 | 中危 | 4.19.194-3 |  | kernel: iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50233 | 中危 | 4.19.194-3 |  | kernel: staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50236 | 中危 | 4.19.194-3 |  | kernel: wifi: ath10k: Fix memory leak in management tx 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 16:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50237 | 中危 | 4.19.194-3 |  | kernel: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50237 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50238 | 中危 | 4.19.194-3 |  | kernel: phy: qcom: qmp-usbc: fix NULL-deref on runtime suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50238 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50239 | 中危 | 4.19.194-3 |  | kernel: phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 16:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50240 | 中危 | 4.19.194-3 |  | kernel: phy: qcom: qmp-usb: fix NULL-deref on runtime suspend 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50241 | 中危 | 4.19.194-3 |  | kernel: NFSD: Initialize struct nfsd4_copy earlier 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50243 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Fix general protection fault in run_is_mapped_full 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-17 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50244 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Additional check in ni_clear() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50245 | 中危 | 4.19.194-3 |  | kernel: fs/ntfs3: Fix possible deadlock in mi_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 17:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50248 | 中危 | 4.19.194-3 |  | kernel: ntfs3: Add bounds checking to mi_enum_attr() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50248 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50249 | 中危 | 4.19.194-3 |  | kernel: ACPI: CPPC: Make rmw_lock a raw_spin_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50249 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 17:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50251 | 中危 | 4.19.194-3 |  | kernel: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50251 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 17:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50252 | 中危 | 4.19.194-3 |  | kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50253 | 中危 | 4.19.194-3 |  | kernel: bpf: Check the validity of nr_words in bpf_iter_bits_new() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50253 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50254 | 中危 | 4.19.194-3 |  | kernel: bpf: Free dynamically allocated bits in bpf_iter_bits_destroy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50254 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50255 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50255 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50256 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50258 | 中危 | 4.19.194-3 |  | kernel: net: fix crash when config small gso_max_size/gso_ipv4_max_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50258 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50259 | 中危 | 4.19.194-3 |  | kernel: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50259 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50260 | 中危 | 4.19.194-3 |  | kernel: sock_map: fix a NULL pointer dereference in sock_map_link_update_prog() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50260 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-09 11:15 修改: 2024-11-13 18:47 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50263 | 中危 | 4.19.194-3 |  | kernel: fork: only invoke khugepaged, ksm hooks if no error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50263 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-11 14:15 修改: 2024-12-09 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50265 | 中危 | 4.19.194-3 |  | kernel: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50265 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 19:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50266 | 中危 | 4.19.194-3 |  | kernel: clk: qcom: videocc-sm8350: use HW_CTRL_TRIGGER for vcodec GDSCs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50266 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-22 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50270 | 中危 | 4.19.194-3 |  | kernel: mm/damon/core: avoid overflow in damon_feed_loop_next_input() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50270 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-26 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50271 | 中危 | 4.19.194-3 |  | kernel: signal: restore the override_rlimit logic 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50271 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50272 | 中危 | 4.19.194-3 |  | kernel: filemap: Fix bounds checking in filemap_read() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50272 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:54 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50273 | 中危 | 4.19.194-3 |  | kernel: btrfs: reinitialize delayed ref list after deleting it from the list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50273 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50277 | 中危 | 4.19.194-3 |  | kernel: dm: fix a crash if blk_alloc_disk fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50281 | 中危 | 4.19.194-3 |  | kernel: KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50284 | 中危 | 4.19.194-3 |  | kernel: ksmbd: Fix the missing xa_store error check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 16:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50285 | 中危 | 4.19.194-3 |  | kernel: ksmbd: check outstanding simultaneous SMB operations 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50287 | 中危 | 4.19.194-3 |  | kernel: media: v4l2-tpg: prevent the risk of a division by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50287 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 21:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50288 | 中危 | 4.19.194-3 |  | kernel: media: vivid: fix buffer overwrite when using > 32 buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50288 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:32 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50289 | 中危 | 4.19.194-3 |  | kernel: media: av7110: fix a spectre vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50289 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50290 | 中危 | 4.19.194-3 |  | kernel: media: cx24116: prevent overflows on SNR calculus 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50290 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50291 | 中危 | 4.19.194-3 |  | kernel: media: dvb-core: add missing buffer index check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50291 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50292 | 中危 | 4.19.194-3 |  | kernel: ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50292 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50293 | 中危 | 4.19.194-3 |  | kernel: net/smc: do not leave a dangling sk pointer in __smc_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50293 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50294 | 中危 | 4.19.194-3 |  | kernel: rxrpc: Fix missing locking causing hanging calls 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50295 | 中危 | 4.19.194-3 |  | kernel: net: arc: fix the device for dma_map_single/dma_unmap_single 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50295 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-19 21:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50296 | 中危 | 4.19.194-3 |  | kernel: net: hns3: fix kernel crash when uninstalling driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50297 | 中危 | 4.19.194-3 |  | kernel: net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50297 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50298 | 中危 | 4.19.194-3 |  | kernel: net: enetc: allocate vf_state during PF probes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50298 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:25 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50299 | 中危 | 4.19.194-3 |  | kernel: sctp: properly validate chunk size in sctp_sf_ootb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50299 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 21:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50300 | 中危 | 4.19.194-3 |  | kernel: regulator: rtq2208: Fix uninitialized use of regulator_config 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50300 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-21 21:11 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50302 | 中危 | 4.19.194-3 |  | kernel: HID: core: zero-initialize the report buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50302 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-11-27 15:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50303 | 中危 | 4.19.194-3 |  | kernel: resource,kexec: walk_system_ram_res_rev must retain resource flags 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50303 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 21:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50304 | 中危 | 4.19.194-3 |  | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 21:20 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53042 | 中危 | 4.19.194-3 |  | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 21:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53043 | 中危 | 4.19.194-3 |  | kernel: mctp i2c: handle NULL header address 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 22:22 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53044 | 中危 | 4.19.194-3 |  | kernel: net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53044 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 16:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53045 | 中危 | 4.19.194-3 |  | kernel: ASoC: dapm: fix bounds checker error in dapm_widget_list_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53045 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 16:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53046 | 中危 | 4.19.194-3 |  | kernel: arm64: dts: imx8ulp: correct the flexspi compatible string 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53046 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:29 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53047 | 中危 | 4.19.194-3 |  | kernel: mptcp: init: protect sched with rcu_read_lock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53047 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53048 | 中危 | 4.19.194-3 |  | kernel: ice: fix crash on probe for DPLL enabled E810 LOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53049 | 中危 | 4.19.194-3 |  | kernel: slub/kunit: fix a WARNING due to unwrapped __kmalloc_cache_noprof 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53049 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53050 | 中危 | 4.19.194-3 |  | kernel: drm/i915/hdcp: Add encoder check in hdcp2_get_capability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53050 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-20 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53051 | 中危 | 4.19.194-3 |  | kernel: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53051 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-20 16:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53052 | 中危 | 4.19.194-3 |  | kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53052 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53053 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Fix another deadlock during RTC update 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53053 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53055 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: fix 6 GHz scan construction 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53055 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53056 | 中危 | 4.19.194-3 |  | kernel: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53058 | 中危 | 4.19.194-3 |  | kernel: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 17:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53060 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53060 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-03 20:49 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53063 | 中危 | 4.19.194-3 |  | kernel: media: dvbdev: prevent the risk of out of memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 21:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53064 | 中危 | 4.19.194-3 |  | kernel: idpf: fix idpf_vc_core_init error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 21:05 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53065 | 中危 | 4.19.194-3 |  | kernel: mm/slab: fix warning caused by duplicate kmem_cache creation in kmem_buckets_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 21:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53066 | 中危 | 4.19.194-3 |  | kernel: nfs: Fix KMSAN warning in decode_getfattr_attrs() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53066 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 21:03 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53067 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Start the RTC update work later 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53067 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 21:00 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53069 | 中危 | 4.19.194-3 |  | kernel: firmware: qcom: scm: fix a NULL-pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53069 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 22:26 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53070 | 中危 | 4.19.194-3 |  | kernel: usb: dwc3: fix fault at system suspend if device was already runtime suspended 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53071 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Be stricter about IO mapping flags 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-26 22:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53072 | 中危 | 4.19.194-3 |  | kernel: platform/x86/amd/pmc: Detect when STB is not available 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53072 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 20:43 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53073 | 中危 | 4.19.194-3 |  | kernel: NFSD: Never decrement pending_async_copies on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53074 | 中危 | 4.19.194-3 |  | kernel: wifi: iwlwifi: mvm: don't leak a link on AP removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53075 | 中危 | 4.19.194-3 |  | kernel: riscv: Prevent a bad reference count on CPU nodes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53076 | 中危 | 4.19.194-3 |  | kernel: iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53076 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-22 22:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53077 | 中危 | 4.19.194-3 |  | kernel: rpcrdma: Always release the rpcrdma_device's xa_array 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 20:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53078 | 中危 | 4.19.194-3 |  | kernel: drm/tegra: Fix NULL vs IS_ERR() check in probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53079 | 中危 | 4.19.194-3 |  | kernel: mm/thp: fix deferred split unqueue naming and locking 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53079 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 16:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53080 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Lock XArray when getting entries for the VM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53080 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-17 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53081 | 中危 | 4.19.194-3 |  | kernel: media: ar0521: don't overflow when checking PLL values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53081 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 16:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53083 | 中危 | 4.19.194-3 |  | kernel: usb: typec: qcom-pmic: init value of hdr_len/txbuf_len earlier 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:09 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53084 | 中危 | 4.19.194-3 |  | kernel: drm/imagination: Break an object reference loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 19:41 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53085 | 中危 | 4.19.194-3 |  | kernel: tpm: Lock TPM chip in tpm_pm_suspend() first 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-12-09 13:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53086 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53087 | 中危 | 4.19.194-3 |  | kernel: drm/xe: Fix possible exec queue leak in exec IOCTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-27 20:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53088 | 中危 | 4.19.194-3 |  | kernel: i40e: fix race condition by adding filter's intermediate sync state 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53088 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53089 | 中危 | 4.19.194-3 |  | kernel: LoongArch: KVM: Mark hrtimer to expire in hard interrupt context 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53089 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 14:48 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53090 | 中危 | 4.19.194-3 |  | kernel: afs: Fix lock recursion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53091 | 中危 | 4.19.194-3 |  | kernel: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53091 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 14:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53092 | 中危 | 4.19.194-3 |  | kernel: virtio_pci: Fix admin vq cleanup by using correct info pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53092 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 14:57 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53093 | 中危 | 4.19.194-3 |  | kernel: nvme-multipath: defer partition scanning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53093 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53094 | 中危 | 4.19.194-3 |  | kernel: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53094 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-24 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53095 | 中危 | 4.19.194-3 |  | kernel: smb: client: Fix use-after-free of network namespace. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53095 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-21 19:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53096 | 中危 | 4.19.194-3 |  | kernel: mm: resolve faulty mmap_region() error path behaviour 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2024-12-24 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53097 | 中危 | 4.19.194-3 |  | kernel: mm: krealloc: Fix MTE false alarm in __do_krealloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53097 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2024-12-24 15:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53100 | 中危 | 4.19.194-3 |  | kernel: nvme: tcp: avoid race between queue_lock lock and destroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53100 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2024-12-24 15:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53101 | 中危 | 4.19.194-3 |  | kernel: fs: Fix uninitialized value issue in from_kuid and from_kgid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53101 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-25 22:15 修改: 2024-12-19 18:08 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53103 | 中危 | 4.19.194-3 |  | kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53103 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 08:15 修改: 2024-12-02 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53104 | 中危 | 4.19.194-3 |  | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53104 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 08:15 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53105 | 中危 | 4.19.194-3 |  | kernel: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53105 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53106 | 中危 | 4.19.194-3 |  | kernel: ima: fix buffer overrun in ima_eventdigest_init_common 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53106 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53107 | 中危 | 4.19.194-3 |  | kernel: fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53107 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-12 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53109 | 中危 | 4.19.194-3 |  | kernel: nommu: pass NULL argument to vma_iter_prealloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53109 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53110 | 中危 | 4.19.194-3 |  | kernel: vp_vdpa: fix id_table array not null terminated error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53110 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53111 | 中危 | 4.19.194-3 |  | kernel: mm/mremap: fix address wraparound in move_page_tables() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53111 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53112 | 中危 | 4.19.194-3 |  | kernel: ocfs2: uncache inode which has failed entering the group 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53112 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53113 | 中危 | 4.19.194-3 |  | kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53114 | 中危 | 4.19.194-3 |  | kernel: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53114 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53115 | 中危 | 4.19.194-3 |  | kernel: drm/vmwgfx: avoid null_ptr_deref in vmw_framebuffer_surface_create_handle 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53116 | 中危 | 4.19.194-3 |  | kernel: drm/panthor: Fix handling of partial GPU mapping of BOs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53116 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53117 | 中危 | 4.19.194-3 |  | kernel: virtio/vsock: Improve MSG_ZEROCOPY error handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53118 | 中危 | 4.19.194-3 |  | kernel: vsock: Fix sk_error_queue memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53118 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 20:52 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53119 | 中危 | 4.19.194-3 |  | kernel: virtio/vsock: Fix accept_queue memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53119 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53120 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53120 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53121 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: fs, lock FTE when checking if active 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53121 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53122 | 中危 | 4.19.194-3 |  | kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53122 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53123 | 中危 | 4.19.194-3 |  | kernel: mptcp: error out earlier on disconnect 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53123 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 21:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53124 | 中危 | 4.19.194-3 |  | kernel: net: fix data-races around sk->sk_forward_alloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53124 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-02 14:15 修改: 2024-12-11 21:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53125 | 中危 | 4.19.194-3 |  | kernel: bpf: sync_linked_regs() must preserve subreg_def 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53125 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 14:15 修改: 2024-12-19 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53127 | 中危 | 4.19.194-3 |  | kernel: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53127 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53128 | 中危 | 4.19.194-3 |  | kernel: sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53128 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53129 | 中危 | 4.19.194-3 |  | kernel: drm/rockchip: vop: Fix a dereferenced before check warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53130 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53130 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53131 | 中危 | 4.19.194-3 |  | kernel: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53131 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53132 | 中危 | 4.19.194-3 |  | kernel: drm/xe/oa: Fix "Missing outer runtime PM protection" warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53132 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 17:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53134 | 中危 | 4.19.194-3 |  | kernel: pmdomain: imx93-blk-ctrl: correct remove path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 17:10 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53135 | 中危 | 4.19.194-3 |  | kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53135 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53136 | 中危 | 4.19.194-3 |  | kernel: mm: revert "mm: shmem: fix data-race in shmem_getattr()" 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53136 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53137 | 中危 | 4.19.194-3 |  | kernel: ARM: fix cacheflush with PAN 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53137 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-11 17:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53138 | 中危 | 4.19.194-3 |  | kernel: net/mlx5e: kTLS, Fix incorrect page refcounting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53140 | 中危 | 4.19.194-3 |  | kernel: netlink: terminate outstanding dump on socket close 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53140 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-04 15:15 修改: 2024-12-14 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53143 | 中危 | 4.19.194-3 |  | kernel: fsnotify: Fix ordering of iput() and watched_objects decrement 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-07 07:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53144 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53144 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-17 16:15 修改: 2024-12-18 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53145 | 中危 | 4.19.194-3 |  | kernel: um: Fix potential integer overflow during physmem setup 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53145 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53146 | 中危 | 4.19.194-3 |  | kernel: NFSD: Prevent a potential integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53146 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53147 | 中危 | 4.19.194-3 |  | kernel: exfat: fix out-of-bounds access of directory entries 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53147 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53148 | 中危 | 4.19.194-3 |  | kernel: comedi: Flush partial mappings in error case 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53148 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53149 | 中危 | 4.19.194-3 |  | kernel: usb: typec: ucsi: glink: fix off-by-one in connector_status 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53149 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53150 | 中危 | 4.19.194-3 |  | kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53150 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53151 | 中危 | 4.19.194-3 |  | kernel: svcrdma: Address an integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53151 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53152 | 中危 | 4.19.194-3 |  | kernel: PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53153 | 中危 | 4.19.194-3 |  | kernel: PCI: qcom-ep: Move controller cleanups to qcom_pcie_perst_deassert() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53153 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53154 | 中危 | 4.19.194-3 |  | kernel: clk: clk-apple-nco: Add NULL check in applnco_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53154 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53155 | 中危 | 4.19.194-3 |  | kernel: ocfs2: fix uninitialized value in ocfs2_file_read_iter() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53157 | 中危 | 4.19.194-3 |  | kernel: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53157 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53158 | 中危 | 4.19.194-3 |  | kernel: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53158 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53159 | 中危 | 4.19.194-3 |  | kernel: hwmon: (nct6775-core) Fix overflows seen when writing limit attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53159 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53160 | 中危 | 4.19.194-3 |  | kernel: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53160 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53162 | 中危 | 4.19.194-3 |  | kernel: crypto: qat/qat_4xxx - fix off by one in uof_get_name() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53162 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53163 | 中危 | 4.19.194-3 |  | kernel: crypto: qat/qat_420xx - fix off by one in uof_get_name() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53163 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53166 | 中危 | 4.19.194-3 |  | kernel: block, bfq: fix bfqq uaf in bfq_limit_depth() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53166 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53167 | 中危 | 4.19.194-3 |  | kernel: nfs/blocklayout: Don't attempt unregister for invalid block device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53167 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53168 | 中危 | 4.19.194-3 |  | kernel: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53168 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53169 | 中危 | 4.19.194-3 |  | kernel: nvme-fabrics: fix kernel crash while shutting down controller 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53169 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53170 | 中危 | 4.19.194-3 |  | kernel: block: fix uaf for flush rq while iterating tags 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53170 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53171 | 中危 | 4.19.194-3 |  | kernel: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53171 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53172 | 中危 | 4.19.194-3 |  | kernel: ubi: fastmap: Fix duplicate slab cache names while attaching 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53172 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53173 | 中危 | 4.19.194-3 |  | kernel: NFSv4.0: Fix a use-after-free problem in the asynchronous open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53173 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53174 | 中危 | 4.19.194-3 |  | kernel: SUNRPC: make sure cache entry active before cache_show 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53175 | 中危 | 4.19.194-3 |  | kernel: ipc: fix memleak if msg_init_ns failed in create_ipc_ns 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53175 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53176 | 中危 | 4.19.194-3 |  | kernel: smb: During unmount, ensure all cached dir instances drop their dentry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53176 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53177 | 中危 | 4.19.194-3 |  | kernel: smb: prevent use-after-free due to open_cached_dir error paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53177 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53178 | 中危 | 4.19.194-3 |  | kernel: smb: Don't leak cfid when reconnect races with open_cached_dir 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53178 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53179 | 中危 | 4.19.194-3 |  | kernel: smb: client: fix use-after-free of signing key 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53179 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53180 | 中危 | 4.19.194-3 |  | kernel: ALSA: pcm: Add sanity NULL check for the default mmap fault handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53181 | 中危 | 4.19.194-3 |  | kernel: um: vector: Do not use drvdata in release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53181 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53183 | 中危 | 4.19.194-3 |  | kernel: um: net: Do not use drvdata in release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53183 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53186 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix use-after-free in SMB request handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53186 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53187 | 中危 | 4.19.194-3 |  | kernel: io_uring: check for overflows in io_pin_pages 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53187 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53188 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix crash when unbinding 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53188 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53189 | 中危 | 4.19.194-3 |  | kernel: wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53190 | 中危 | 4.19.194-3 |  | kernel: wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53190 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53191 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix warning when unbinding 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53191 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53192 | 中危 | 4.19.194-3 |  | kernel: clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53193 | 中危 | 4.19.194-3 |  | kernel: clk: clk-loongson2: Fix memory corruption bug in struct loongson2_clk_provider 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53193 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53194 | 中危 | 4.19.194-3 |  | kernel: PCI: Fix use-after-free of slot->bus on hot remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53194 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53195 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Get rid of userspace_irqchip_in_use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53196 | 中危 | 4.19.194-3 |  | kernel: KVM: arm64: Don't retire aborted MMIO instruction 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53196 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53197 | 中危 | 4.19.194-3 |  | kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53198 | 中危 | 4.19.194-3 |  | kernel: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53198 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53199 | 中危 | 4.19.194-3 |  | kernel: ASoC: imx-audmix: Add NULL check in imx_audmix_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53199 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53200 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53200 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53201 | 中危 | 4.19.194-3 |  | kernel: drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53201 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53202 | 中危 | 4.19.194-3 |  | kernel: firmware_loader: Fix possible resource leak in fw_log_firmware_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53202 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53203 | 中危 | 4.19.194-3 |  | kernel: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53203 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53204 | 中危 | 4.19.194-3 |  | kernel: phy: realtek: usb: fix NULL deref in rtk_usb3phy_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53205 | 中危 | 4.19.194-3 |  | kernel: phy: realtek: usb: fix NULL deref in rtk_usb2phy_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53207 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: MGMT: Fix possible deadlocks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53207 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53208 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53208 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53209 | 中危 | 4.19.194-3 |  | kernel: bnxt_en: Fix receive ring space parameters when XDP is active 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53209 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53210 | 中危 | 4.19.194-3 |  | kernel: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53211 | 中危 | 4.19.194-3 |  | kernel: net/l2tp: fix warning in l2tp_exit_net found by syzbot 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53212 | 中危 | 4.19.194-3 |  | kernel: netlink: fix false positive warning in extack during dumps 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53213 | 中危 | 4.19.194-3 |  | kernel: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53213 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53214 | 中危 | 4.19.194-3 |  | kernel: vfio/pci: Properly hide first-in-list PCIe extended capability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53215 | 中危 | 4.19.194-3 |  | kernel: svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53215 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53217 | 中危 | 4.19.194-3 |  | kernel: NFSD: Prevent NULL dereference in nfsd4_process_cb_update() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53218 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix race in concurrent f2fs_stop_gc_thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53218 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53220 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to account dirty data in __get_secs_required() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53220 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53221 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix null-ptr-deref in f2fs_submit_page_bio() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53221 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53222 | 中危 | 4.19.194-3 |  | kernel: zram: fix NULL pointer in comp_algorithm_show() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53222 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53223 | 中危 | 4.19.194-3 |  | kernel: clk: ralink: mtmips: fix clocks probe order in oldest ralink SoCs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53223 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53224 | 中危 | 4.19.194-3 |  | kernel: RDMA/mlx5: Move events notifier registration to be after device registration 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53225 | 中危 | 4.19.194-3 |  | kernel: iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53225 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53226 | 中危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53226 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53227 | 中危 | 4.19.194-3 |  | kernel: scsi: bfa: Fix use-after-free in bfad_im_module_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53227 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53228 | 中危 | 4.19.194-3 |  | kernel: riscv: kvm: Fix out-of-bounds array access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53230 | 中危 | 4.19.194-3 |  | kernel: cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53230 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53231 | 中危 | 4.19.194-3 |  | kernel: cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53232 | 中危 | 4.19.194-3 |  | kernel: iommu/s390: Implement blocking domain 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53233 | 中危 | 4.19.194-3 |  | kernel: unicode: Fix utf8_load() error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53234 | 中危 | 4.19.194-3 |  | kernel: erofs: handle NONHEAD !delta[1] lclusters gracefully 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53234 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53235 | 中危 | 4.19.194-3 |  | kernel: erofs: fix file-backed mounts over FUSE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53235 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53236 | 中危 | 4.19.194-3 |  | kernel: xsk: Free skb when TX metadata options are invalid 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53236 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53237 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: fix use-after-free in device_for_each_child() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53237 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53238 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btmtk: adjust the position to init iso data anchor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53238 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53239 | 中危 | 4.19.194-3 |  | kernel: ALSA: 6fire: Release resources at card release 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53239 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53240 | 中危 | 4.19.194-3 |  | kernel: xen: netfront: Backend can crash Linux netfront (Xen Security Advisory 465) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53240 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 10:15 修改: 2024-12-24 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53241 | 中危 | 4.19.194-3 |  | kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 10:15 修改: 2025-01-05 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56531 | 中危 | 4.19.194-3 |  | kernel: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56531 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56532 | 中危 | 4.19.194-3 |  | kernel: ALSA: us122l: Use snd_card_free_when_closed() at disconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56532 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56533 | 中危 | 4.19.194-3 |  | kernel: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56534 | 中危 | 4.19.194-3 |  | kernel: isofs: avoid memory leak in iocharset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56534 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56535 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56535 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56536 | 中危 | 4.19.194-3 |  | kernel: wifi: cw1200: Fix potential NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56536 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56537 | 中危 | 4.19.194-3 |  | kernel: drm: xlnx: zynqmp_disp: layer may be null while releasing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56537 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56539 | 中危 | 4.19.194-3 |  | kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56539 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56540 | 中危 | 4.19.194-3 |  | kernel: accel/ivpu: Prevent recovery invocation during probe and resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56540 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56541 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix use-after-free in ath12k_dp_cc_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56543 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: Skip Rx TID cleanup for self peer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56543 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56544 | 中危 | 4.19.194-3 |  | kernel: udmabuf: change folios array from kmalloc to kvmalloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56544 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56545 | 中危 | 4.19.194-3 |  | kernel: HID: hyperv: streamline driver probe to avoid devres issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56545 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56546 | 中危 | 4.19.194-3 |  | kernel: drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56547 | 中危 | 4.19.194-3 |  | kernel: rcu/nocb: Fix missed RCU barrier on deoffloading 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56547 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56548 | 中危 | 4.19.194-3 |  | kernel: hfsplus: don't query the device logical block size multiple times 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56548 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56549 | 中危 | 4.19.194-3 |  | kernel: cachefiles: Fix NULL pointer dereference in object->file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56550 | 中危 | 4.19.194-3 |  | kernel: s390/stacktrace: Use break instead of return statement 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56550 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56551 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix usage slab after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56551 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56552 | 中危 | 4.19.194-3 |  | kernel: drm/xe/guc_submit: fix race around suspend_pending 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56552 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56553 | 中危 | 4.19.194-3 |  | kernel: binder: fix memleak of proc->delivered_freeze 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56553 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56554 | 中危 | 4.19.194-3 |  | kernel: binder: fix freeze UAF in binder_release_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56554 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56555 | 中危 | 4.19.194-3 |  | kernel: binder: fix OOB in binder_add_freeze_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56555 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56556 | 中危 | 4.19.194-3 |  | kernel: binder: fix node UAF in binder_add_freeze_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56556 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56557 | 中危 | 4.19.194-3 |  | kernel: iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56557 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56558 | 中危 | 4.19.194-3 |  | kernel: nfsd: make sure exp active before svc_export_show 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56558 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56559 | 中危 | 4.19.194-3 |  | kernel: mm/vmalloc: combine all TLB flush operations of KASAN shadow virtual address into one operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56559 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56560 | 中危 | 4.19.194-3 |  | kernel: slab: Fix too strict alignment check in create_cache() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56561 | 中危 | 4.19.194-3 |  | kernel: PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56561 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56562 | 中危 | 4.19.194-3 |  | kernel: i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56562 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56563 | 中危 | 4.19.194-3 |  | kernel: ceph: fix cred leak in ceph_mds_check_access() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56564 | 中危 | 4.19.194-3 |  | kernel: ceph: pass cred pointer to ceph_mds_auth_match() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56565 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to drop all discards after creating snapshot on lvm device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56565 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56566 | 中危 | 4.19.194-3 |  | kernel: mm/slub: Avoid list corruption when removing a slab from the full list 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56567 | 中危 | 4.19.194-3 |  | kernel: ad7780: fix division by zero in ad7780_write_raw() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56567 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56568 | 中危 | 4.19.194-3 |  | kernel: iommu/arm-smmu: Defer probe of clients after smmu device bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56568 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56569 | 中危 | 4.19.194-3 |  | kernel: ftrace: Fix regression with module command in stack_trace_filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56569 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56571 | 中危 | 4.19.194-3 |  | kernel: media: uvcvideo: Require entities to have a non-zero unique ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56571 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56572 | 中危 | 4.19.194-3 |  | kernel: media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56572 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56573 | 中危 | 4.19.194-3 |  | kernel: efi/libstub: Free correct pointer on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56573 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56575 | 中危 | 4.19.194-3 |  | kernel: media: imx-jpeg: Ensure power suppliers be suspended before detach them 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56575 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56576 | 中危 | 4.19.194-3 |  | kernel: media: i2c: tc358743: Fix crash in the probe error path when using polling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56578 | 中危 | 4.19.194-3 |  | kernel: media: imx-jpeg: Set video drvdata before register video device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56578 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56579 | 中危 | 4.19.194-3 |  | kernel: media: amphion: Set video drvdata before register video device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56580 | 中危 | 4.19.194-3 |  | kernel: media: qcom: camss: fix error path on configuration of power domains 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56580 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56582 | 中危 | 4.19.194-3 |  | kernel: btrfs: fix use-after-free in btrfs_encoded_read_endio() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56582 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56583 | 中危 | 4.19.194-3 |  | kernel: sched/deadline: Fix warning in migrate_enable for boosted tasks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56583 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56584 | 中危 | 4.19.194-3 |  | kernel: io_uring/tctx: work around xa_store() allocation error issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56585 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Fix sleeping in atomic context for PREEMPT_RT 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56586 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56587 | 中危 | 4.19.194-3 |  | kernel: leds: class: Protect brightness_show() with led_cdev->led_access mutex 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56587 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56588 | 中危 | 4.19.194-3 |  | kernel: scsi: hisi_sas: Create all dump files during debugfs initialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56589 | 中危 | 4.19.194-3 |  | kernel: scsi: hisi_sas: Add cond_resched() for no forced preemption model 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56590 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56591 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_conn: Use disable_delayed_work_sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56592 | 中危 | 4.19.194-3 |  | kernel: bpf: Call free_htab_elem() after htab_unlock_bucket() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56592 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56593 | 中危 | 4.19.194-3 |  | kernel: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56594 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: set the right AMDGPU sg segment limitation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56594 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56595 | 中危 | 4.19.194-3 |  | kernel: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56595 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56596 | 中危 | 4.19.194-3 |  | kernel: jfs: fix array-index-out-of-bounds in jfs_readdir 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56596 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56597 | 中危 | 4.19.194-3 |  | kernel: jfs: fix shift-out-of-bounds in dbSplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56598 | 中危 | 4.19.194-3 |  | kernel: jfs: array-index-out-of-bounds fix in dtReadFirst 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56599 | 中危 | 4.19.194-3 |  | kernel: wifi: ath10k: avoid NULL pointer error during sdio remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56600 | 中危 | 4.19.194-3 |  | kernel: net: inet6: do not leave a dangling sk pointer in inet6_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56602 | 中危 | 4.19.194-3 |  | kernel: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56602 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56603 | 中危 | 4.19.194-3 |  | kernel: net: af_can: do not leave a dangling sk pointer in can_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56603 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56604 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56605 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56606 | 中危 | 4.19.194-3 |  | kernel: af_packet: avoid erroring out after sock_init_data() in packet_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56607 | 中危 | 4.19.194-3 |  | kernel: wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56609 | 中危 | 4.19.194-3 |  | kernel: wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56609 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56610 | 中危 | 4.19.194-3 |  | kernel: kcsan: Turn report_filterlist_lock into a raw_spinlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56610 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56611 | 中危 | 4.19.194-3 |  | kernel: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56611 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56613 | 中危 | 4.19.194-3 |  | kernel: sched/numa: fix memory leak due to the overwritten vma->numab_state 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56613 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56614 | 中危 | 4.19.194-3 |  | kernel: xsk: fix OOB map writes when deleting elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56614 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56615 | 中危 | 4.19.194-3 |  | kernel: bpf: fix OOB devmap writes when deleting elements 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56616 | 中危 | 4.19.194-3 |  | kernel: drm/dp_mst: Fix MST sideband message body length check 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56616 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56617 | 中危 | 4.19.194-3 |  | kernel: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56617 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56618 | 中危 | 4.19.194-3 |  | kernel: pmdomain: imx: gpcv2: Adjust delay after power up handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56620 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56620 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56621 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: Cancel RTC work during ufshcd_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56622 | 中危 | 4.19.194-3 |  | kernel: scsi: ufs: core: sysfs: Prevent div by zero 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56623 | 中危 | 4.19.194-3 |  | kernel: scsi: qla2xxx: Fix use after free on unload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56625 | 中危 | 4.19.194-3 |  | kernel: can: dev: can_set_termination(): allow sleeping GPIOs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56625 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56626 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56626 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56627 | 中危 | 4.19.194-3 |  | kernel: ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56628 | 中危 | 4.19.194-3 |  | kernel: LoongArch: Add architecture specific huge_pte_clear() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56628 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56629 | 中危 | 4.19.194-3 |  | kernel: HID: wacom: fix when get product name maybe null pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56629 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56630 | 中危 | 4.19.194-3 |  | kernel: ocfs2: free inode when ocfs2_get_init_inode() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56631 | 中危 | 4.19.194-3 |  | kernel: scsi: sg: Fix slab-use-after-free read in sg_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56631 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56632 | 中危 | 4.19.194-3 |  | kernel: nvme-tcp: fix the memleak while create new ctrl failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56632 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56633 | 中危 | 4.19.194-3 |  | kernel: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56634 | 中危 | 4.19.194-3 |  | kernel: gpio: grgpio: Add NULL check in grgpio_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56634 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56635 | 中危 | 4.19.194-3 |  | kernel: net: avoid potential UAF in default_operstate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56635 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56636 | 中危 | 4.19.194-3 |  | kernel: geneve: do not assume mac header is set in geneve_xmit_skb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56636 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56637 | 中危 | 4.19.194-3 |  | kernel: netfilter: ipset: Hold module reference while requesting a module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56637 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56638 | 中危 | 4.19.194-3 |  | kernel: netfilter: nft_inner: incorrect percpu area handling under softirq 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56638 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56639 | 中危 | 4.19.194-3 |  | kernel: net: hsr: must allocate more bytes for RedBox support 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56639 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56640 | 中危 | 4.19.194-3 |  | kernel: net/smc: fix LGR and link use-after-free issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56641 | 中危 | 4.19.194-3 |  | kernel: net/smc: initialize close_work early to avoid warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56641 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56643 | 中危 | 4.19.194-3 |  | kernel: dccp: Fix memory leak in dccp_feat_change_recv 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56643 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56644 | 中危 | 4.19.194-3 |  | kernel: net/ipv6: release expired exception dst cached in socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56644 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56645 | 中危 | 4.19.194-3 |  | kernel: can: j1939: j1939_session_new(): fix skb reference counting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56646 | 中危 | 4.19.194-3 |  | kernel: ipv6: avoid possible NULL deref in modify_prefix_route() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56646 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56647 | 中危 | 4.19.194-3 |  | kernel: net: Fix icmp host relookup triggering ip_rt_bug 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56647 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56648 | 中危 | 4.19.194-3 |  | kernel: net: hsr: avoid potential out-of-bound access in fill_frame_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56648 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56649 | 中危 | 4.19.194-3 |  | kernel: net: enetc: Do not configure preemptible TCs if SIs do not support 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56649 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56650 | 中危 | 4.19.194-3 |  | kernel: netfilter: x_tables: fix LED ID check in led_tg_check() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56650 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56651 | 中危 | 4.19.194-3 |  | kernel: can: hi311x: hi3110_can_ist(): fix potential use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56652 | 中危 | 4.19.194-3 |  | kernel: drm/xe/reg_sr: Remove register pool 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56652 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56653 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: btmtk: avoid UAF in btmtk_process_coredump 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56653 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56654 | 中危 | 4.19.194-3 |  | kernel: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56654 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56655 | 中危 | 4.19.194-3 |  | kernel: netfilter: nf_tables: do not defer rule destruction via call_rcu 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56656 | 中危 | 4.19.194-3 |  | kernel: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56657 | 中危 | 4.19.194-3 |  | kernel: ALSA: control: Avoid WARN() for symlink errors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56657 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56658 | 中危 | 4.19.194-3 |  | kernel: net: defer final 'struct net' free in netns dismantle 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56659 | 中危 | 4.19.194-3 |  | kernel: net: lapb: increase LAPB_HEADER_LEN 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56660 | 中危 | 4.19.194-3 |  | kernel: net/mlx5: DR, prevent potential error pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56660 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56661 | 中危 | 4.19.194-3 |  | kernel: tipc: fix NULL deref in cleanup_bearer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56662 | 中危 | 4.19.194-3 |  | kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56663 | 中危 | 4.19.194-3 |  | kernel: wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56664 | 中危 | 4.19.194-3 |  | kernel: bpf, sockmap: Fix race between element replace and close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56665 | 中危 | 4.19.194-3 |  | kernel: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56666 | 中危 | 4.19.194-3 |  | kernel: drm/amdkfd: Dereference null return value 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56667 | 中危 | 4.19.194-3 |  | kernel: drm/i915: Fix NULL pointer dereference in capture_engine 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56668 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Fix qi_batch NULL pointer with nested parent domain 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56669 | 中危 | 4.19.194-3 |  | kernel: iommu/vt-d: Remove cache tags before disabling ATS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56669 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56670 | 中危 | 4.19.194-3 |  | kernel: usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56670 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56671 | 中危 | 4.19.194-3 |  | kernel: gpio: graniterapids: Fix vGPIO driver crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56672 | 中危 | 4.19.194-3 |  | kernel: blk-cgroup: Fix UAF in blkcg_unpin_online() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56672 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56673 | 中危 | 4.19.194-3 |  | kernel: riscv: mm: Do not call pmd dtor on vmemmap page table teardown 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56674 | 中危 | 4.19.194-3 |  | kernel: virtio_net: correct netdev_tx_reset_queue() invocation point 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56675 | 中危 | 4.19.194-3 |  | kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56677 | 中危 | 4.19.194-3 |  | kernel: powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56677 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56678 | 中危 | 4.19.194-3 |  | kernel: powerpc/mm/fault: Fix kfence page fault reporting 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56679 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56679 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56681 | 中危 | 4.19.194-3 |  | kernel: crypto: bcm - add error check in the ahash_hmac_init function 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56681 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56682 | 中危 | 4.19.194-3 |  | kernel: irqchip/riscv-aplic: Prevent crash when MSI domain is missing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56682 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56683 | 中危 | 4.19.194-3 |  | kernel: drm/vc4: hdmi: Avoid hang with debug registers when suspended 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56683 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56684 | 中危 | 4.19.194-3 |  | kernel: mailbox: mtk-cmdq: fix wrong use of sizeof in cmdq_get_clocks() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56684 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56685 | 中危 | 4.19.194-3 |  | kernel: ASoC: mediatek: Check num_codecs is not zero to avoid panic during probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56685 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56686 | 中危 | 4.19.194-3 |  | kernel: ext4: fix race in buffer_head read fault injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56686 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56687 | 中危 | 4.19.194-3 |  | kernel: usb: musb: Fix hardware lockup on first Rx endpoint request 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56688 | 中危 | 4.19.194-3 |  | kernel: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56688 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56689 | 中危 | 4.19.194-3 |  | kernel: PCI: endpoint: epf-mhi: Avoid NULL dereference if DT lacks 'mmio' 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56689 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56691 | 中危 | 4.19.194-3 |  | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56691 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56692 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to do sanity check on node blkaddr in truncate_node() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56692 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56693 | 中危 | 4.19.194-3 |  | kernel: brd: defer automatic disk creation until module initialization succeeds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56694 | 中危 | 4.19.194-3 |  | kernel: bpf: fix recursive lock when verdict program return SK_PASS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56694 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56696 | 中危 | 4.19.194-3 |  | kernel: ALSA: core: Fix possible NULL dereference caused by kunit_kzalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56697 | 中危 | 4.19.194-3 |  | kernel: drm/amdgpu: Fix the memory allocation issue in amdgpu_discovery_get_nps_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56699 | 中危 | 4.19.194-3 |  | kernel: s390/pci: Fix potential double remove of hotplug slot 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56700 | 中危 | 4.19.194-3 |  | kernel: media: wl128x: Fix atomicity violation in fmc_send_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56701 | 中危 | 4.19.194-3 |  | kernel: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56702 | 中危 | 4.19.194-3 |  | kernel: bpf: Mark raw_tp arguments with PTR_MAYBE_NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56702 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56703 | 中危 | 4.19.194-3 |  | kernel: ipv6: Fix soft lockups in fib6_select_path under high next hop churn 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56705 | 中危 | 4.19.194-3 |  | kernel: media: atomisp: Add check for rgby_data memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56705 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56707 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56707 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56708 | 中危 | 4.19.194-3 |  | kernel: EDAC/igen6: Avoid segmentation fault on module unload 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56708 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56709 | 中危 | 4.19.194-3 |  | kernel: io_uring: check if iowq is killed before queuing 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56710 | 中危 | 4.19.194-3 |  | kernel: ceph: fix memory leak in ceph_direct_read_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56710 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2025-01-02 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56711 | 中危 | 4.19.194-3 |  | kernel: drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56711 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56712 | 中危 | 4.19.194-3 |  | kernel: udmabuf: fix memory leak on last export_udmabuf() error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56713 | 中危 | 4.19.194-3 |  | kernel: net: netdevsim: fix nsim_pp_hold_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56713 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56714 | 中危 | 4.19.194-3 |  | kernel: ionic: no double destroy workqueue 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56714 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56715 | 中危 | 4.19.194-3 |  | kernel: ionic: Fix netdev notifier unregister on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56715 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56716 | 中危 | 4.19.194-3 |  | kernel: netdevsim: prevent bad user input in nsim_dev_health_break_write() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56717 | 中危 | 4.19.194-3 |  | kernel: net: mscc: ocelot: fix incorrect IFH SRC_PORT field in ocelot_ifh_set_basic() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56717 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56718 | 中危 | 4.19.194-3 |  | kernel: net/smc: protect link down work from execute after lgr freed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56718 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56719 | 中危 | 4.19.194-3 |  | kernel: net: stmmac: fix TSO DMA API usage causing oops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56719 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 09:15 修改: 2024-12-29 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56720 | 中危 | 4.19.194-3 |  | kernel: bpf, sockmap: Several fixes to bpf_msg_pop_data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56720 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56721 | 中危 | 4.19.194-3 |  | kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56721 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56722 | 中危 | 4.19.194-3 |  | kernel: RDMA/hns: Fix cpu stuck caused by printings during reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56722 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56723 | 中危 | 4.19.194-3 |  | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56723 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56724 | 中危 | 4.19.194-3 |  | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56725 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56725 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56726 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56727 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56728 | 中危 | 4.19.194-3 |  | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56728 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56729 | 中危 | 4.19.194-3 |  | kernel: smb: Initialize cfid->tcon before performing network ops 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56729 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56739 | 中危 | 4.19.194-3 |  | kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56739 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56741 | 中危 | 4.19.194-3 |  | kernel: apparmor: test: Fix memory leak for aa_unpack_strdup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56741 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56742 | 中危 | 4.19.194-3 |  | kernel: vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56742 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56744 | 中危 | 4.19.194-3 |  | kernel: f2fs: fix to avoid potential deadlock in f2fs_record_stop_reason() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56744 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56745 | 中危 | 4.19.194-3 |  | kernel: PCI: Fix reset_method_store() memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56746 | 中危 | 4.19.194-3 |  | kernel: fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56746 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56747 | 中危 | 4.19.194-3 |  | kernel: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56747 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56748 | 中危 | 4.19.194-3 |  | kernel: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56748 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56749 | 中危 | 4.19.194-3 |  | kernel: dlm: fix dlm_recover_members refcount on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56749 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56751 | 中危 | 4.19.194-3 |  | kernel: ipv6: release nexthop on device removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56752 | 中危 | 4.19.194-3 |  | kernel: drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56752 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56755 | 中危 | 4.19.194-3 |  | kernel: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56756 | 中危 | 4.19.194-3 |  | kernel: nvme-pci: fix freeing of the HMB descriptor table 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | login | CVE-2023-4641 | 中危 | 1:4.5-1.1 |  | shadow-utils: possible password leak during passwd(1) change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15 | 
                            
                            
                                | libtiff-dev | CVE-2022-0562 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0562 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-0865 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: reachable assertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-0907 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: NULL Pointer Dereference in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-0908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-0909 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Divide By Zero error in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-0924 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Out-of-bounds Read error in tiffcp 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff-dev | CVE-2022-1354 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1354 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:50 | 
                            
                            
                                | libtiff-dev | CVE-2022-1355 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: stack-buffer-overflow in tiffcp.c in main() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:52 | 
                            
                            
                                | libtiff-dev | CVE-2022-2056 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff-dev | CVE-2022-2057 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff-dev | CVE-2022-2058 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff-dev | CVE-2022-22844 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-11-16 19:07 | 
                            
                            
                                | libtiff-dev | CVE-2022-2867 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff-dev | CVE-2022-2868 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff-dev | CVE-2022-2869 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff-dev | CVE-2022-34526 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34526 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-29 23:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libtiff-dev | CVE-2022-3570 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap Buffer overflows in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3570 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:02 | 
                            
                            
                                | libtiff-dev | CVE-2022-3597 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:04 | 
                            
                            
                                | libtiff-dev | CVE-2022-3598 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:05 | 
                            
                            
                                | libtiff-dev | CVE-2022-3599 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:06 | 
                            
                            
                                | libtiff-dev | CVE-2022-3626 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3626 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:06 | 
                            
                            
                                | libtiff-dev | CVE-2022-3627 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:07 | 
                            
                            
                                | libtiff-dev | CVE-2022-40090 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: infinite loop via a crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:13 | 
                            
                            
                                | libtiff-dev | CVE-2022-4645 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | libtiff-dev | CVE-2022-48281 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u6 | libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-23 03:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0795 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0795 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0796 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0797 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0797 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | mariadb-common | CVE-2021-35604 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35604 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-10-20 11:17 修改: 2023-11-07 03:36 | 
                            
                            
                                | mariadb-common | CVE-2021-46657 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46657 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | mariadb-common | CVE-2021-46658 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: save_window_function_values triggers an abort during IN subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46658 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | mariadb-common | CVE-2021-46659 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash executing query with VIEW, aggregate and subquery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46661 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46662 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46662 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:49 | 
                            
                            
                                | mariadb-common | CVE-2021-46663 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46664 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46665 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46666 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2022-04-13 16:57 | 
                            
                            
                                | mariadb-common | CVE-2021-46667 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: Integer overflow in sql_lex.cc integer leading to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46667 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2021-46668 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | mariadb-common | CVE-2022-21427 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21427 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-19 21:15 修改: 2022-10-27 13:57 | 
                            
                            
                                | mariadb-common | CVE-2022-31621 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-10-30 14:35 | 
                            
                            
                                | mariadb-common | CVE-2022-31622 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31622 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-03 08:15 | 
                            
                            
                                | mariadb-common | CVE-2022-31623 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2024-08-12 13:38 | 
                            
                            
                                | mariadb-common | CVE-2022-31624 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.34-0+deb10u1 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-05-25 21:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | mariadb-common | CVE-2022-38791 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u1 | mariadb: compress_write() fails to release mutex on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38791 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-27 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | mariadb-common | CVE-2022-47015 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u1 | mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47015 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-20 19:15 修改: 2024-06-06 19:45 | 
                            
                            
                                | mariadb-common | CVE-2023-22084 | 中危 | 1:10.3.29-0+deb10u1 | 1:10.3.39-0+deb10u2 | mysql: InnoDB unspecified vulnerability (CPU Oct 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-17 22:15 修改: 2024-01-27 09:15 | 
                            
                            
                                | mariadb-common | CVE-2024-21096 | 中危 | 1:10.3.29-0+deb10u1 |  | mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21096 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-16 22:15 修改: 2024-12-06 21:35 | 
                            
                            
                                | libtiff-dev | CVE-2023-0798 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0798 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | mount | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-0799 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0800 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0801 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | ncurses-base | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | ncurses-base | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-0802 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0803 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff-dev | CVE-2023-0804 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01 | 
                            
                            
                                | ncurses-bin | CVE-2020-19189 | 中危 | 6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u4 | ncurses: Heap buffer overflow in postprocess_terminfo function in tinfo/parse_entry.c:997 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19189 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-08-22 19:16 修改: 2023-12-13 01:15 | 
                            
                            
                                | ncurses-bin | CVE-2023-50495 | 中危 | 6.1+20181013-2+deb10u2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | nginx | CVE-2020-36309 | 中危 | 1.17.10-1~buster |  | ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36309 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2021-04-06 19:15 修改: 2021-06-03 19:10 | 
                            
                            
                                | nginx | CVE-2024-7347 | 中危 | 1.17.10-1~buster |  | nginx: specially crafted MP4 file may cause denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7347 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2024-08-14 15:15 修改: 2024-08-20 19:25 | 
                            
                            
                                | libtiff-dev | CVE-2023-25433 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25433 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-25435 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: tiffcrop: heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-21 20:15 修改: 2024-12-06 20:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-26965 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 21:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | openssh-client | CVE-2023-48795 | 中危 | 1:7.9p1-10+deb10u2 | 1:7.9p1-10+deb10u4 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-12-18 16:15 修改: 2024-12-02 14:54 | 
                            
                            
                                | openssh-client | CVE-2023-51385 | 中危 | 1:7.9p1-10+deb10u2 | 1:7.9p1-10+deb10u4 | openssh: potential command injection via shell metacharacters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51385 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-12-18 19:15 修改: 2024-03-13 21:15 | 
                            
                            
                                | passwd | CVE-2023-4641 | 中危 | 1:4.5-1.1 |  | shadow-utils: possible password leak during passwd(1) change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-26966 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow in uv_encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-2908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: null pointer dereference in tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-30 22:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | libtiff-dev | CVE-2023-30086 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Heap buffer overflow in tiffcp() at tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-09 16:15 修改: 2023-06-16 15:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-30774 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2024-01-09 02:51 | 
                            
                            
                                | libtiff-dev | CVE-2023-3316 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: tiffcrop: null pointer dereference in TIFFClose() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3316 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-19 12:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-3576 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: memory leak in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-04 19:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-3618 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: segmentation fault in Fax3Encode in libtiff/tif_fax3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-12 15:15 修改: 2024-03-23 11:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-40745 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: integer overflow in tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40745 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-09-16 17:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-41175 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: potential integer overflow in raw2tiff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41175 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-05 19:15 修改: 2024-12-04 08:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-6277 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Out-of-memory in TIFFOpen via a craft file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6277 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-24 19:15 修改: 2024-09-17 01:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20224 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in ExportIndexQuantum() in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20224 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20241 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20241 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20243 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20243 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20244 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20245 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20246 | 中危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 19:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libtiff5 | CVE-2020-19143 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u3 | libtiff: buffer overflow in TIFFVGetField() in libtiff/tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-09 15:15 修改: 2021-11-30 19:38 | 
                            
                            
                                | libtiff5 | CVE-2022-0561 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0561 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python2.7 | CVE-2020-8492 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | python2.7 | CVE-2021-23336 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | python2.7 | CVE-2021-3733 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7 | CVE-2021-4189 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7 | CVE-2022-48566 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | python2.7 | CVE-2023-27043 | 中危 | 2.7.16-2+deb10u1 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python2.7 | CVE-2023-40217 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python2.7 | CVE-2024-0397 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python2.7 | CVE-2024-0450 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python2.7 | CVE-2024-6923 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libtiff5 | CVE-2022-0562 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0562 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0865 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: reachable assertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0865 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0907 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: NULL Pointer Dereference in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0907 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0909 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | tiff: Divide By Zero error in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0924 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: Out-of-bounds Read error in tiffcp 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-1354 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1354 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:50 | 
                            
                            
                                | libtiff5 | CVE-2022-1355 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: stack-buffer-overflow in tiffcp.c in main() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1355 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:52 | 
                            
                            
                                | libtiff5 | CVE-2022-2056 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2057 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2058 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2058 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-22844 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u4 | libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22844 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-10 14:12 修改: 2022-11-16 19:07 | 
                            
                            
                                | python2.7-minimal | CVE-2020-8492 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | python2.7-minimal | CVE-2021-23336 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | python2.7-minimal | CVE-2021-3733 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7-minimal | CVE-2021-4189 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python2.7-minimal | CVE-2022-48566 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | python2.7-minimal | CVE-2023-27043 | 中危 | 2.7.16-2+deb10u1 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python2.7-minimal | CVE-2023-40217 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u3 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python2.7-minimal | CVE-2024-0397 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python2.7-minimal | CVE-2024-0450 | 中危 | 2.7.16-2+deb10u1 | 2.7.16-2+deb10u4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python2.7-minimal | CVE-2024-6923 | 中危 | 2.7.16-2+deb10u1 |  | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libtiff5 | CVE-2022-2867 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2867 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2868 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2868 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2869 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2869 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-34526 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34526 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-29 23:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libtiff5 | CVE-2022-3570 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap Buffer overflows in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3570 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:02 | 
                            
                            
                                | libtiff5 | CVE-2022-3597 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3597 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:04 | 
                            
                            
                                | libtiff5 | CVE-2022-3598 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3598 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:05 | 
                            
                            
                                | libtiff5 | CVE-2022-3599 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:06 | 
                            
                            
                                | libtiff5 | CVE-2022-3626 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3626 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:06 | 
                            
                            
                                | libtiff5 | CVE-2022-3627 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3627 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:07 | 
                            
                            
                                | libtiff5 | CVE-2022-40090 | 中危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: infinite loop via a crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40090 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:13 | 
                            
                            
                                | python3.7 | CVE-2021-23336 | 中危 | 3.7.3-2+deb10u3 |  | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | python3.7 | CVE-2021-3426 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.7 | CVE-2021-3733 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7 | CVE-2021-4189 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7 | CVE-2022-48564 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: DoS when processing malformed Apple Property List files in binary format 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-15 15:56 | 
                            
                            
                                | python3.7 | CVE-2022-48566 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | python3.7 | CVE-2023-27043 | 中危 | 3.7.3-2+deb10u3 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3.7 | CVE-2023-40217 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python3.7 | CVE-2024-0397 | 中危 | 3.7.3-2+deb10u3 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python3.7 | CVE-2024-0450 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libtiff5 | CVE-2022-4645 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | libtiff5 | CVE-2022-48281 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u6 | libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48281 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-23 03:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0795 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0795 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0796 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0797 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0797 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0798 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0798 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0799 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0799 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0800 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0801 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0802 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0803 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | python3.7-minimal | CVE-2021-23336 | 中危 | 3.7.3-2+deb10u3 |  | python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | python3.7-minimal | CVE-2021-3426 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.7-minimal | CVE-2021-3733 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7-minimal | CVE-2021-4189 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u5 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.7-minimal | CVE-2022-48564 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: DoS when processing malformed Apple Property List files in binary format 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-12-15 15:56 | 
                            
                            
                                | python3.7-minimal | CVE-2022-48566 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48566 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-13 17:04 | 
                            
                            
                                | python3.7-minimal | CVE-2023-27043 | 中危 | 3.7.3-2+deb10u3 |  | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3.7-minimal | CVE-2023-40217 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python3.7-minimal | CVE-2024-0397 | 中危 | 3.7.3-2+deb10u3 |  | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python3.7-minimal | CVE-2024-0450 | 中危 | 3.7.3-2+deb10u3 | 3.7.3-2+deb10u7 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libtiff5 | CVE-2023-0804 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01 | 
                            
                            
                                | subversion | CVE-2021-28544 | 中危 | 1.10.4-1+deb10u2 | 1.10.4-1+deb10u3 | subversion: SVN authz protected copyfrom paths regression 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28544 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-04-12 18:15 修改: 2023-02-11 17:44 | 
                            
                            
                                | unzip | CVE-2022-0529 | 中危 | 6.0-23+deb10u2 | 6.0-23+deb10u3 | unzip: Heap out-of-bound writes and reads during conversion of wide string to local string 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0529 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-09 20:55 | 
                            
                            
                                | unzip | CVE-2022-0530 | 中危 | 6.0-23+deb10u2 | 6.0-23+deb10u3 | unzip: SIGSEGV during the conversion of an utf-8 string to a local string 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-09 23:15 修改: 2023-11-09 20:55 | 
                            
                            
                                | libtiff5 | CVE-2023-25433 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25433 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | util-linux | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-25435 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u7 | libtiff: tiffcrop: heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25435 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-21 20:15 修改: 2024-12-06 20:15 | 
                            
                            
                                | uuid-dev | CVE-2021-37600 | 中危 | 2.33.1-0.1 | 2.33.1-0.1+deb10u1 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-26965 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26965 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-14 21:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | wget | CVE-2021-31879 | 中危 | 1.20.1-1.1 |  | wget: authorization header disclosure on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52 | 
                            
                            
                                | wget | CVE-2024-10524 | 中危 | 1.20.1-1.1 |  | wget: GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10524 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-11-19 15:15 修改: 2024-11-19 21:57 | 
                            
                            
                                | libtiff5 | CVE-2023-26966 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: Buffer Overflow in uv_encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26966 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-2908 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: null pointer dereference in tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2908 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-30 22:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | libtiff5 | CVE-2023-30086 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: Heap buffer overflow in tiffcp() at tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-09 16:15 修改: 2023-06-16 15:15 | 
                            
                            
                                | libtiff5 | CVE-2023-30774 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u5 | libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2024-01-09 02:51 | 
                            
                            
                                | libtiff5 | CVE-2023-3316 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: tiffcrop: null pointer dereference in TIFFClose() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3316 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-06-19 12:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3576 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u9 | libtiff: memory leak in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3576 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-04 19:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3618 | 中危 | 4.1.0+git191117-2~deb10u2 | 4.1.0+git191117-2~deb10u8 | libtiff: segmentation fault in Fax3Encode in libtiff/tif_fax3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3618 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-12 15:15 修改: 2024-03-23 11:15 | 
                            
                            
                                | libtasn1-6-dev | CVE-2018-1000654 | 低危 | 4.13-3 |  | libtasn1: Infinite loop in _asn1_expand_object_id(ptree) leads to memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000654 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51 | 
                            
                            
                                | libtcl8.6 | CVE-2021-35331 | 低危 | 8.6.9+dfsg-2 |  | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-19724 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_data() in nm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-19726 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-21490 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_field() in microblaze-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35342 | 低危 | 2.31.1-16 |  | binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35448 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35493 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35494 | 低危 | 2.31.1-16 |  | binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35495 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35496 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-35507 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-20197 | 低危 | 2.31.1-16 |  | binutils: Race window allows users to own arbitrary files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-20284 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-20294 | 低危 | 2.31.1-16 |  | binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-32256 | 低危 | 2.31.1-16 |  | binutils: stack-overflow issue in demangle_type in rust-demangle.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-3530 | 低危 | 2.31.1-16 |  | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-3549 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-headers | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-3826 | 低危 | 2.31.1-16 |  | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-45078 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-46174 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9797 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer over-read in l2cap_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9797 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | libtiff-dev | CVE-2017-16232 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff-dev | CVE-2017-17973 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-29 21:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff-dev | CVE-2017-5563 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiff-dev | CVE-2017-9117 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-based buffer over-read in bmp2tiff 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-21 19:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiff-dev | CVE-2018-10126 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-21 21:29 修改: 2024-08-20 05:15 | 
                            
                            
                                | libtiff-dev | CVE-2020-35521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff-dev | CVE-2020-35522 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff-dev | CVE-2022-1056 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35 | 
                            
                            
                                | libtiff-dev | CVE-2022-1210 | 低危 | 4.1.0+git191117-2~deb10u2 |  | tiff: Malicious file leads to a denial of service in TIFF File Handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46 | 
                            
                            
                                | libtiff-dev | CVE-2022-2519 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2519 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:57 | 
                            
                            
                                | libtiff-dev | CVE-2022-2520 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Assertion fail in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2520 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-28 15:39 | 
                            
                            
                                | libtiff-dev | CVE-2022-2521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:59 | 
                            
                            
                                | libtiff-dev | CVE-2022-2953 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-02-23 16:01 | 
                            
                            
                                | libtiff-dev | CVE-2023-1916 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-10 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-30775 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | libtiff-dev | CVE-2023-3164 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-buffer-overflow in extractImageSection() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-02 12:15 修改: 2024-03-08 19:38 | 
                            
                            
                                | libtiff-dev | CVE-2023-6228 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9798 | 低危 | 5.50-1.2~deb10u1 |  | bluez: use-after-free in conf_opt() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9798 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9799 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in pklg_read_hci() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9799 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:34 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9800 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in pin_code_reply_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9800 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9801 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in set_ext_ctrl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9801 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9802 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer over-read in l2cap_packet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9802 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9803 | 低危 | 5.50-1.2~deb10u1 |  | bluez: out-of-bounds read in le_meta_ev_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9803 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:28 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9804 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in commands_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9804 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:29 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9917 | 低危 | 5.50-1.2~deb10u1 |  | bluez: Heap-based buffer overflow vulnerability in read_n() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9917 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-08 08:59 修改: 2019-12-19 17:46 | 
                            
                            
                                | libbluetooth3 | CVE-2016-9918 | 低危 | 5.50-1.2~deb10u1 |  | bluez: Out of bounds stack read in packet_hexdump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9918 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-08 08:59 修改: 2019-04-12 13:29 | 
                            
                            
                                | libbluetooth3 | CVE-2018-10910 | 低危 | 5.50-1.2~deb10u1 |  | bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10910 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2019-01-28 15:29 修改: 2023-02-13 04:51 | 
                            
                            
                                | libbluetooth3 | CVE-2023-51594 | 低危 | 5.50-1.2~deb10u1 |  | bluez: OBEX library out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51594 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2021-46195 | 低危 | 2.31.1-16 |  | gcc: uncontrolled recursion in libiberty/rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-35205 | 低危 | 2.31.1-16 |  | binutils: reachable assertion in display_debug_names() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-29 15:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-35206 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-38533 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-4285 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-44840 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in find_section_in_set() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-45703 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in display_debug_section() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47007 | 低危 | 2.31.1-16 |  | binutils: memory leak in stab_demangle_v3_arg() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47008 | 低危 | 2.31.1-16 |  | binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47010 | 低危 | 2.31.1-16 |  | binutils: memory leak in pr_function_type() in prdbg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47011 | 低危 | 2.31.1-16 |  | binutils: memory leak in parse_stab_struct_fields() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47673 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47695 | 低危 | 2.31.1-16 |  | binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47696 | 低危 | 2.31.1-16 |  | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-48063 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-48064 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-48065 | 低危 | 2.31.1-16 |  | binutils: memory leak in find_abstract_instance() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-1579 | 低危 | 2.31.1-16 |  | binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-1972 | 低危 | 2.31.1-16 |  | binutils: Illegal memory access when accessing a zer0-lengthverdef table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25584 | 低危 | 2.31.1-16 |  | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libtiff5 | CVE-2017-16232 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff5 | CVE-2017-17973 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-29 21:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff5 | CVE-2017-5563 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiff5 | CVE-2017-9117 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-based buffer over-read in bmp2tiff 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-21 19:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiff5 | CVE-2018-10126 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-21 21:29 修改: 2024-08-20 05:15 | 
                            
                            
                                | libtiff5 | CVE-2020-35521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff5 | CVE-2020-35522 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff5 | CVE-2022-1056 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35 | 
                            
                            
                                | libtiff5 | CVE-2022-1210 | 低危 | 4.1.0+git191117-2~deb10u2 |  | tiff: Malicious file leads to a denial of service in TIFF File Handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2519 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2519 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:57 | 
                            
                            
                                | libtiff5 | CVE-2022-2520 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Assertion fail in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2520 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-28 15:39 | 
                            
                            
                                | libtiff5 | CVE-2022-2521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:59 | 
                            
                            
                                | libtiff5 | CVE-2022-2953 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-02-23 16:01 | 
                            
                            
                                | libtiff5 | CVE-2023-1916 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-10 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | libtiff5 | CVE-2023-30775 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3164 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-buffer-overflow in extractImageSection() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-02 12:15 修改: 2024-03-08 19:38 | 
                            
                            
                                | libtiff5 | CVE-2023-6228 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-6 | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libc-bin | CVE-2010-4756 | 低危 | 2.28-10 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc-bin | CVE-2018-20796 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc-bin | CVE-2019-1010022 | 低危 | 2.28-10 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010023 | 低危 | 2.28-10 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010024 | 低危 | 2.28-10 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010025 | 低危 | 2.28-10 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-19126 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-11-19 22:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libc-bin | CVE-2019-9192 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libc-bin | CVE-2021-27645 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-02-24 15:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25585 | 低危 | 2.31.1-16 |  | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25586 | 低危 | 2.31.1-16 |  | binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25588 | 低危 | 2.31.1-16 |  | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2024-53589 | 低危 | 2.31.1-16 |  | binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-05 20:15 修改: 2024-12-11 17:15 | 
                            
                            
                                | apt | CVE-2011-3374 | 低危 | 1.8.2.3 |  | It was found that apt-key in apt, all versions, do not correctly valid ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08 | 
                            
                            
                                | bash | CVE-2019-18276 | 低危 | 5.0-4 |  | bash: when effective UID is not equal to its real UID the saved UID is not dropped 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18276 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-11-28 01:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | bsdutils | CVE-2022-0563 | 低危 | 1:2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | bash | TEMP-0841856-B18BAF | 低危 | 5.0-4 |  | [Privilege escalation possible to other user than root] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | coreutils | CVE-2016-2781 | 低危 | 8.30-3 |  | coreutils: Non-privileged session can escape to the parent session in chroot 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32 | 
                            
                            
                                | coreutils | CVE-2017-18018 | 低危 | 8.30-3 |  | coreutils: race condition vulnerability in chown and chgrp 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2018-01-04 04:29 修改: 2018-01-19 15:46 | 
                            
                            
                                | binutils | CVE-2017-13716 | 低危 | 2.31.1-16 |  | binutils: Memory leak with the C++ symbol demangler routine in libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils | CVE-2018-1000876 | 低危 | 2.31.1-16 |  | binutils: integer overflow leads to heap-based buffer overflow in objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | cpp-8 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils | CVE-2018-12697 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | binutils | CVE-2018-12698 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in demangle_template in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils | CVE-2018-12699 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in finish_stab in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | binutils | CVE-2018-12934 | 低危 | 2.31.1-16 |  | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils | CVE-2018-17358 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils | CVE-2018-17359 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in bfd_zalloc in opncls.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils | CVE-2018-17360 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libc-dev-bin | CVE-2010-4756 | 低危 | 2.28-10 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc-dev-bin | CVE-2018-20796 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc-dev-bin | CVE-2019-1010022 | 低危 | 2.28-10 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-dev-bin | CVE-2019-1010023 | 低危 | 2.28-10 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-dev-bin | CVE-2019-1010024 | 低危 | 2.28-10 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-dev-bin | CVE-2019-1010025 | 低危 | 2.28-10 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libtiffxx5 | CVE-2017-16232 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiffxx5 | CVE-2017-17973 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17973 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-29 21:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiffxx5 | CVE-2017-5563 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiffxx5 | CVE-2017-9117 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap-based buffer over-read in bmp2tiff 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-21 19:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiffxx5 | CVE-2018-10126 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-21 21:29 修改: 2024-08-20 05:15 | 
                            
                            
                                | libtiffxx5 | CVE-2020-35521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiffxx5 | CVE-2020-35522 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiffxx5 | CVE-2022-1056 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35 | 
                            
                            
                                | libtiffxx5 | CVE-2022-1210 | 低危 | 4.1.0+git191117-2~deb10u2 |  | tiff: Malicious file leads to a denial of service in TIFF File Handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2519 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2519 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:57 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2520 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Assertion fail in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2520 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-28 15:39 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2521 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:59 | 
                            
                            
                                | libtiffxx5 | CVE-2022-2953 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2953 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-02-23 16:01 | 
                            
                            
                                | libtiffxx5 | CVE-2023-1916 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-10 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-30775 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | libtiffxx5 | CVE-2023-3164 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-buffer-overflow in extractImageSection() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-11-02 12:15 修改: 2024-03-08 19:38 | 
                            
                            
                                | libtiffxx5 | CVE-2023-6228 | 低危 | 4.1.0+git191117-2~deb10u2 |  | libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libtsan0 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libubsan1 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libudev1 | CVE-2013-4392 | 低危 | 241-7~deb10u8 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | libudev1 | CVE-2019-20386 | 低危 | 241-7~deb10u8 |  | systemd: memory leak in button_open() in login/logind-button.c when udev events are received 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | libudev1 | CVE-2020-13529 | 低危 | 241-7~deb10u8 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libudev1 | CVE-2023-31437 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libudev1 | CVE-2023-31438 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libudev1 | CVE-2023-31439 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libunbound8 | CVE-2019-18934 | 低危 | 1.9.0-2+deb10u2 |  | unbound: command injection with data coming from a specially crafted IPSECKEY answer 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-19 18:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libunbound8 | CVE-2019-25031 | 低危 | 1.9.0-2+deb10u2 |  | unbound: configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25031 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25032 | 低危 | 1.9.0-2+deb10u2 |  | unbound: integer overflow in the regional allocator via regional_alloc 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25033 | 低危 | 1.9.0-2+deb10u2 |  | unbound: integer overflow in the regional allocator via the ALIGN_UP macro 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25033 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25034 | 低危 | 1.9.0-2+deb10u2 |  | unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25034 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25035 | 低危 | 1.9.0-2+deb10u2 |  | unbound: out-of-bounds write in sldns_bget_token_par 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25035 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25036 | 低危 | 1.9.0-2+deb10u2 |  | unbound: assertion failure and denial of service in synth_cname 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25036 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25037 | 低危 | 1.9.0-2+deb10u2 |  | unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25037 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25038 | 低危 | 1.9.0-2+deb10u2 |  | unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25038 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25039 | 低危 | 1.9.0-2+deb10u2 |  | unbound: integer overflow in a size calculation in respip/respip.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25040 | 低危 | 1.9.0-2+deb10u2 |  | unbound: infinite loop via a compressed name in dname_pkt_copy 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25040 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25041 | 低危 | 1.9.0-2+deb10u2 |  | unbound: assertion failure via a compressed name in dname_pkt_copy 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25041 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2019-25042 | 低危 | 1.9.0-2+deb10u2 |  | unbound: out-of-bounds write via a compressed name in rdata_copy 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25042 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-27 06:15 修改: 2024-08-05 03:16 | 
                            
                            
                                | libunbound8 | CVE-2024-33655 | 低危 | 1.9.0-2+deb10u2 |  | unbound: DNSBomb vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-06 17:15 修改: 2024-08-22 19:35 | 
                            
                            
                                | libunbound8 | CVE-2024-43167 | 低危 | 1.9.0-2+deb10u2 |  | unbound: NULL Pointer Dereference in Unbound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43167 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 13:38 修改: 2024-10-21 12:15 | 
                            
                            
                                | libunbound8 | CVE-2024-43168 | 低危 | 1.9.0-2+deb10u2 |  | unbound: Heap-Buffer-Overflow in Unbound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43168 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-12 13:38 修改: 2024-10-21 12:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libc-dev-bin | CVE-2019-19126 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-19 22:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libuuid1 | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libc-dev-bin | CVE-2019-9192 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libc-dev-bin | CVE-2021-27645 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-24 15:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | binutils | CVE-2018-17794 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils | CVE-2018-17985 | 低危 | 2.31.1-16 |  | binutils: Stack consumption problem caused by the cplus_demangle_type 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils | CVE-2018-18309 | 低危 | 2.31.1-16 |  | binutils: invalid memory address dereference in read_reloc in reloc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils | CVE-2018-18483 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils | CVE-2018-18484 | 低危 | 2.31.1-16 |  | binutils: Stack exhaustion in cp-demangle.c allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils | CVE-2018-18605 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libwmf-dev | CVE-2007-3476 | 低危 | 0.2.8.4-14 |  | libgd Denial of service by corrupted GIF images 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-06-28 18:30 修改: 2018-10-16 16:50 | 
                            
                            
                                | libwmf-dev | CVE-2007-3477 | 低危 | 0.2.8.4-14 |  | gd: arc drawing functions can consume large amount of CPU time 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-06-28 18:30 修改: 2018-10-16 16:50 | 
                            
                            
                                | libwmf-dev | CVE-2007-3996 | 低危 | 0.2.8.4-14 |  | php multiple integer overflows in gd 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-09-04 18:17 修改: 2017-09-29 01:29 | 
                            
                            
                                | libwmf-dev | CVE-2009-3546 | 低危 | 0.2.8.4-14 |  | gd: insufficient input validation in _gdGetColors() 漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2009-10-19 20:00 修改: 2023-02-13 02:20 | 
                            
                            
                                | libwmf-dev | TEMP-0601525-BEBB65 | 低危 | 0.2.8.4-14 |  | [libgd2: gdImageColorTransparent can write outside buffer] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0601525-BEBB65 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libwmf0.2-7 | CVE-2007-3476 | 低危 | 0.2.8.4-14 |  | libgd Denial of service by corrupted GIF images 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3476 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-06-28 18:30 修改: 2018-10-16 16:50 | 
                            
                            
                                | libwmf0.2-7 | CVE-2007-3477 | 低危 | 0.2.8.4-14 |  | gd: arc drawing functions can consume large amount of CPU time 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3477 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-06-28 18:30 修改: 2018-10-16 16:50 | 
                            
                            
                                | libwmf0.2-7 | CVE-2007-3996 | 低危 | 0.2.8.4-14 |  | php multiple integer overflows in gd 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-09-04 18:17 修改: 2017-09-29 01:29 | 
                            
                            
                                | libwmf0.2-7 | CVE-2009-3546 | 低危 | 0.2.8.4-14 |  | gd: insufficient input validation in _gdGetColors() 漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2009-10-19 20:00 修改: 2023-02-13 02:20 | 
                            
                            
                                | libwmf0.2-7 | TEMP-0601525-BEBB65 | 低危 | 0.2.8.4-14 |  | [libgd2: gdImageColorTransparent can write outside buffer] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0601525-BEBB65 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | binutils | CVE-2018-18606 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils | CVE-2018-18607 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils | CVE-2018-18700 | 低危 | 2.31.1-16 |  | binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils | CVE-2018-18701 | 低危 | 2.31.1-16 |  | binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils | CVE-2018-19931 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils | CVE-2018-19932 | 低危 | 2.31.1-16 |  | binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils | CVE-2018-20002 | 低危 | 2.31.1-16 |  | binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils | CVE-2018-20623 | 低危 | 2.31.1-16 |  | binutils: Use-after-free in the error function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils | CVE-2018-20651 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils | CVE-2018-20671 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in load_specific_debug_section function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils | CVE-2018-20673 | 低危 | 2.31.1-16 |  | libiberty: Integer overflow in demangle_template() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils | CVE-2018-20712 | 低危 | 2.31.1-16 |  | libiberty: heap-based buffer over-read in d_expression_1 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils | CVE-2018-9138 | 低危 | 2.31.1-16 |  | binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | curl | CVE-2020-19909 | 低危 | 7.64.0-4+deb10u2 |  | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15 | 
                            
                            
                                | libc6 | CVE-2010-4756 | 低危 | 2.28-10 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc6 | CVE-2018-20796 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc6 | CVE-2019-1010022 | 低危 | 2.28-10 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6 | CVE-2019-1010023 | 低危 | 2.28-10 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6 | CVE-2019-1010024 | 低危 | 2.28-10 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6 | CVE-2019-1010025 | 低危 | 2.28-10 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6 | CVE-2019-19126 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-11-19 22:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libc6 | CVE-2019-9192 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libc6 | CVE-2021-27645 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-02-24 15:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | curl | CVE-2021-22898 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | curl | CVE-2021-22922 | 低危 | 7.64.0-4+deb10u2 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libxml2 | CVE-2024-34459 | 低危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35 | 
                            
                            
                                | curl | CVE-2021-22923 | 低危 | 7.64.0-4+deb10u2 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libxml2-dev | CVE-2024-34459 | 低危 | 2.9.4+dfsg1-7+deb10u2 |  | libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libxslt1-dev | CVE-2015-9019 | 低危 | 1.1.32-2.2~deb10u1 |  | libxslt: math.random() in xslt uses unseeded randomness 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-04-05 21:59 修改: 2017-04-11 19:57 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libxslt1.1 | CVE-2015-9019 | 低危 | 1.1.32-2.2~deb10u1 |  | libxslt: math.random() in xslt uses unseeded randomness 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9019 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-04-05 21:59 修改: 2017-04-11 19:57 | 
                            
                            
                                | libxtables12 | CVE-2012-2663 | 低危 | 1.8.2-4 |  | iptables: --syn flag bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2014-02-15 14:57 修改: 2023-11-07 02:10 | 
                            
                            
                                | libxtables12 | CVE-2019-11360 | 低危 | 1.8.2-4 |  | iptables: buffer overflow in iptables-restore 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11360 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-07-12 14:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6.q16-dev | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | curl | CVE-2021-22924 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | curl | CVE-2022-35252 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2023-28320 | 低危 | 7.64.0-4+deb10u2 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42 | 
                            
                            
                                | curl | CVE-2023-28322 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | curl | CVE-2023-38546 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | curl | CVE-2024-2379 | 低危 | 7.64.0-4+deb10u2 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | binutils | CVE-2018-9996 | 低危 | 2.31.1-16 |  | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | dirmngr | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | dirmngr | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2019-1010180 | 低危 | 2.31.1-16 |  | gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | binutils | CVE-2019-1010204 | 低危 | 2.31.1-16 |  | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02 | 
                            
                            
                                | binutils | CVE-2019-12972 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in setup_group in bfd/elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | binutils | CVE-2019-14250 | 低危 | 2.31.1-16 |  | binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01 | 
                            
                            
                                | binutils | CVE-2019-14444 | 低危 | 2.31.1-16 |  | binutils: integer overflow in function apply_relocation in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58 | 
                            
                            
                                | fdisk | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | binutils | CVE-2019-17450 | 低危 | 2.31.1-16 |  | binutils: denial of service via crafted ELF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32 | 
                            
                            
                                | binutils | CVE-2019-17451 | 低危 | 2.31.1-16 |  | binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libc6-dev | CVE-2010-4756 | 低危 | 2.28-10 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc6-dev | CVE-2018-20796 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc6-dev | CVE-2019-1010022 | 低危 | 2.28-10 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6-dev | CVE-2019-1010023 | 低危 | 2.28-10 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6-dev | CVE-2019-1010024 | 低危 | 2.28-10 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6-dev | CVE-2019-1010025 | 低危 | 2.28-10 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6-dev | CVE-2019-19126 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19126 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-19 22:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libc6-dev | CVE-2019-9192 | 低危 | 2.28-10 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libc6-dev | CVE-2021-27645 | 低危 | 2.28-10 | 2.28-10+deb10u2 | glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27645 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-24 15:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | libcairo-gobject2 | CVE-2017-7475 | 低危 | 1.16.0-4+deb10u1 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libcairo-gobject2 | CVE-2018-18064 | 低危 | 1.16.0-4+deb10u1 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo-gobject2 | CVE-2019-6461 | 低危 | 1.16.0-4+deb10u1 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo-gobject2 | CVE-2019-6462 | 低危 | 1.16.0-4+deb10u1 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo-script-interpreter2 | CVE-2017-7475 | 低危 | 1.16.0-4+deb10u1 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libcairo-script-interpreter2 | CVE-2018-18064 | 低危 | 1.16.0-4+deb10u1 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo-script-interpreter2 | CVE-2019-6461 | 低危 | 1.16.0-4+deb10u1 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo-script-interpreter2 | CVE-2019-6462 | 低危 | 1.16.0-4+deb10u1 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo2 | CVE-2017-7475 | 低危 | 1.16.0-4+deb10u1 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libmagickcore-dev | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-dev | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-dev | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-dev | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-dev | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-dev | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-dev | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickcore-dev | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-dev | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-dev | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libcairo2 | CVE-2018-18064 | 低危 | 1.16.0-4+deb10u1 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo2 | CVE-2019-6461 | 低危 | 1.16.0-4+deb10u1 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo2 | CVE-2019-6462 | 低危 | 1.16.0-4+deb10u1 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo2-dev | CVE-2017-7475 | 低危 | 1.16.0-4+deb10u1 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libcairo2-dev | CVE-2018-18064 | 低危 | 1.16.0-4+deb10u1 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo2-dev | CVE-2019-6461 | 低危 | 1.16.0-4+deb10u1 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo2-dev | CVE-2019-6462 | 低危 | 1.16.0-4+deb10u1 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | g++-8 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils | CVE-2019-9070 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | libcc1-0 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils | CVE-2019-9071 | 低危 | 2.31.1-16 |  | binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32 | 
                            
                            
                                | libcroco3 | CVE-2017-8834 | 低危 | 0.6.12-3 |  | libcroco: Memory allocation failure in the cr_tknzr_parse_comment function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8834 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-06-12 06:29 修改: 2020-08-19 19:17 | 
                            
                            
                                | libcroco3 | CVE-2017-8871 | 低危 | 0.6.12-3 |  | libcroco: Infinite loop in the cr_parser_parse_selector_core function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8871 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-06-12 06:29 修改: 2020-08-19 19:12 | 
                            
                            
                                | libcroco3 | CVE-2020-12825 | 低危 | 0.6.12-3 |  | libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12825 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-05-12 18:15 修改: 2022-10-27 01:04 | 
                            
                            
                                | gcc-8 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils | CVE-2019-9073 | 低危 | 2.31.1-16 |  | binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09 | 
                            
                            
                                | binutils | CVE-2019-9074 | 低危 | 2.31.1-16 |  | binutils: out-of-bound read in function bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11 | 
                            
                            
                                | gcc-8-base | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils | CVE-2019-9075 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19 | 
                            
                            
                                | binutils | CVE-2019-9077 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function process_mips_specific in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | binutils | CVE-2020-16590 | 低危 | 2.31.1-16 |  | binutils: double free vulnerability in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils | CVE-2020-16591 | 低危 | 2.31.1-16 |  | binutils: invalid read in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils | CVE-2020-16592 | 低危 | 2.31.1-16 |  | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils | CVE-2020-16593 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils | CVE-2020-16599 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils | CVE-2020-19724 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_data() in nm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils | CVE-2020-19726 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36 | 
                            
                            
                                | binutils | CVE-2020-21490 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_field() in microblaze-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils | CVE-2020-35342 | 低危 | 2.31.1-16 |  | binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils | CVE-2020-35448 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils | CVE-2020-35493 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils | CVE-2020-35494 | 低危 | 2.31.1-16 |  | binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils | CVE-2020-35495 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils | CVE-2020-35496 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils | CVE-2020-35507 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6-headers | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils | CVE-2021-20197 | 低危 | 2.31.1-16 |  | binutils: Race window allows users to own arbitrary files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | git | CVE-2018-1000021 | 低危 | 1:2.20.1-2+deb10u3 |  | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58 | 
                            
                            
                                | git | CVE-2022-24975 | 低危 | 1:2.20.1-2+deb10u3 |  | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24975 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-11 20:15 修改: 2024-08-03 05:15 | 
                            
                            
                                | git | CVE-2023-25815 | 低危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2024-32020 | 低危 | 1:2.20.1-2+deb10u3 |  | git: insecure hardlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2020-19909 | 低危 | 7.64.0-4+deb10u2 |  | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22898 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22922 | 低危 | 7.64.0-4+deb10u2 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22923 | 低危 | 7.64.0-4+deb10u2 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22924 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-35252 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28320 | 低危 | 7.64.0-4+deb10u2 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28322 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-38546 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-2379 | 低危 | 7.64.0-4+deb10u2 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | git | CVE-2024-32021 | 低危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: symlink bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | binutils | CVE-2021-20284 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | binutils | CVE-2021-20294 | 低危 | 2.31.1-16 |  | binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | binutils | CVE-2021-32256 | 低危 | 2.31.1-16 |  | binutils: stack-overflow issue in demangle_type in rust-demangle.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | binutils | CVE-2021-3530 | 低危 | 2.31.1-16 |  | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03 | 
                            
                            
                                | binutils | CVE-2021-3549 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28 | 
                            
                            
                                | binutils | CVE-2021-3826 | 低危 | 2.31.1-16 |  | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01 | 
                            
                            
                                | binutils | CVE-2021-45078 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | binutils | CVE-2021-46174 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40 | 
                            
                            
                                | binutils | CVE-2021-46195 | 低危 | 2.31.1-16 |  | gcc: uncontrolled recursion in libiberty/rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38 | 
                            
                            
                                | binutils | CVE-2022-35205 | 低危 | 2.31.1-16 |  | binutils: reachable assertion in display_debug_names() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-29 15:35 | 
                            
                            
                                | binutils | CVE-2022-35206 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36 | 
                            
                            
                                | binutils | CVE-2022-38533 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | binutils | CVE-2022-4285 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | binutils | CVE-2022-44840 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in find_section_in_set() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils | CVE-2022-45703 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in display_debug_section() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils | CVE-2022-47007 | 低危 | 2.31.1-16 |  | binutils: memory leak in stab_demangle_v3_arg() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | git-man | CVE-2018-1000021 | 低危 | 1:2.20.1-2+deb10u3 |  | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58 | 
                            
                            
                                | git-man | CVE-2022-24975 | 低危 | 1:2.20.1-2+deb10u3 |  | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24975 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-02-11 20:15 修改: 2024-08-03 05:15 | 
                            
                            
                                | git-man | CVE-2023-25815 | 低危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-6 | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | git-man | CVE-2024-32020 | 低危 | 1:2.20.1-2+deb10u3 |  | git: insecure hardlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | git-man | CVE-2024-32021 | 低危 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u9 | git: symlink bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | binutils | CVE-2022-47008 | 低危 | 2.31.1-16 |  | binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | gnupg | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gnupg | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-47010 | 低危 | 2.31.1-16 |  | binutils: memory leak in pr_function_type() in prdbg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libcurl4 | CVE-2020-19909 | 低危 | 7.64.0-4+deb10u2 |  | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15 | 
                            
                            
                                | libcurl4 | CVE-2021-22898 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl4 | CVE-2021-22922 | 低危 | 7.64.0-4+deb10u2 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4 | CVE-2021-22923 | 低危 | 7.64.0-4+deb10u2 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4 | CVE-2021-22924 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4 | CVE-2022-35252 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2023-28320 | 低危 | 7.64.0-4+deb10u2 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42 | 
                            
                            
                                | libcurl4 | CVE-2023-28322 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl4 | CVE-2023-38546 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libcurl4 | CVE-2024-2379 | 低危 | 7.64.0-4+deb10u2 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | gnupg-l10n | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gnupg-l10n | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-47011 | 低危 | 2.31.1-16 |  | binutils: memory leak in parse_stab_struct_fields() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | gnupg-utils | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gnupg-utils | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-47673 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | gpg | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpg | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-47695 | 低危 | 2.31.1-16 |  | binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | gpg-agent | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpg-agent | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-47696 | 低危 | 2.31.1-16 |  | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | gpg-wks-client | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpg-wks-client | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-48063 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | gpg-wks-server | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpg-wks-server | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-48064 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | gpgconf | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-6.q16-dev | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | gpgconf | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2022-48065 | 低危 | 2.31.1-16 |  | binutils: memory leak in find_abstract_instance() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36 | 
                            
                            
                                | gpgsm | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpgsm | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | binutils | CVE-2023-1579 | 低危 | 2.31.1-16 |  | binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | gpgv | CVE-2019-14855 | 低危 | 2.2.12-1+deb10u1 |  | gnupg2: OpenPGP Key Certification Forgeries with SHA-1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28 | 
                            
                            
                                | gpgv | CVE-2022-3219 | 低危 | 2.2.12-1+deb10u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2020-19909 | 低危 | 7.64.0-4+deb10u2 |  | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22898 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22922 | 低危 | 7.64.0-4+deb10u2 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22923 | 低危 | 7.64.0-4+deb10u2 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2021-22924 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u3 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2022-35252 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u4 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-28320 | 低危 | 7.64.0-4+deb10u2 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-28322 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u8 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2023-38546 | 低危 | 7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libcurl4-openssl-dev | CVE-2024-2379 | 低危 | 7.64.0-4+deb10u2 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | binutils | CVE-2023-1972 | 低危 | 2.31.1-16 |  | binutils: Illegal memory access when accessing a zer0-lengthverdef table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15 | 
                            
                            
                                | binutils | CVE-2023-25584 | 低危 | 2.31.1-16 |  | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | binutils | CVE-2023-25585 | 低危 | 2.31.1-16 |  | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils | CVE-2023-25586 | 低危 | 2.31.1-16 |  | binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils | CVE-2023-25588 | 低危 | 2.31.1-16 |  | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils | CVE-2024-53589 | 低危 | 2.31.1-16 |  | binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-05 20:15 修改: 2024-12-11 17:15 | 
                            
                            
                                | binutils-common | CVE-2017-13716 | 低危 | 2.31.1-16 |  | binutils: Memory leak with the C++ symbol demangler routine in libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-common | CVE-2018-1000876 | 低危 | 2.31.1-16 |  | binutils: integer overflow leads to heap-based buffer overflow in objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | binutils-common | CVE-2018-12697 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | binutils-common | CVE-2018-12698 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in demangle_template in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-common | CVE-2018-12699 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in finish_stab in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | binutils-common | CVE-2018-12934 | 低危 | 2.31.1-16 |  | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-common | CVE-2018-17358 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-17359 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in bfd_zalloc in opncls.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-17360 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-17794 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-common | CVE-2018-17985 | 低危 | 2.31.1-16 |  | binutils: Stack consumption problem caused by the cplus_demangle_type 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-18309 | 低危 | 2.31.1-16 |  | binutils: invalid memory address dereference in read_reloc in reloc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libmagickwand-dev | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickwand-dev | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickwand-dev | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickwand-dev | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-dev | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickwand-dev | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickwand-dev | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | libmagickwand-dev | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickwand-dev | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickwand-dev | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils-common | CVE-2018-18483 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-18484 | 低危 | 2.31.1-16 |  | binutils: Stack exhaustion in cp-demangle.c allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils-common | CVE-2018-18605 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-common | CVE-2018-18606 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-common | CVE-2018-18607 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-common | CVE-2018-18700 | 低危 | 2.31.1-16 |  | binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-common | CVE-2018-18701 | 低危 | 2.31.1-16 |  | binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-common | CVE-2018-19931 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-common | CVE-2018-19932 | 低危 | 2.31.1-16 |  | binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-common | CVE-2018-20002 | 低危 | 2.31.1-16 |  | binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils-common | CVE-2018-20623 | 低危 | 2.31.1-16 |  | binutils: Use-after-free in the error function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-common | CVE-2018-20651 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils-common | CVE-2018-20671 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in load_specific_debug_section function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | binutils-common | CVE-2018-20673 | 低危 | 2.31.1-16 |  | libiberty: Integer overflow in demangle_template() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils-common | CVE-2018-20712 | 低危 | 2.31.1-16 |  | libiberty: heap-based buffer over-read in d_expression_1 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-common | CVE-2018-9138 | 低危 | 2.31.1-16 |  | binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-common | CVE-2018-9996 | 低危 | 2.31.1-16 |  | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-common | CVE-2019-1010180 | 低危 | 2.31.1-16 |  | gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | binutils-common | CVE-2019-1010204 | 低危 | 2.31.1-16 |  | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02 | 
                            
                            
                                | imagemagick | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | imagemagick | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | imagemagick | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | imagemagick | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | imagemagick | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | imagemagick | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | imagemagick | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | imagemagick | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | imagemagick | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | imagemagick | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | imagemagick | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | imagemagick | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | imagemagick | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmariadb-dev | CVE-2021-2372 | 低危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2372 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | imagemagick | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | imagemagick | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | imagemagick | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils-common | CVE-2019-12972 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in setup_group in bfd/elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | binutils-common | CVE-2019-14250 | 低危 | 2.31.1-16 |  | binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01 | 
                            
                            
                                | binutils-common | CVE-2019-14444 | 低危 | 2.31.1-16 |  | binutils: integer overflow in function apply_relocation in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58 | 
                            
                            
                                | binutils-common | CVE-2019-17450 | 低危 | 2.31.1-16 |  | binutils: denial of service via crafted ELF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32 | 
                            
                            
                                | binutils-common | CVE-2019-17451 | 低危 | 2.31.1-16 |  | binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | binutils-common | CVE-2019-9070 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | binutils-common | CVE-2019-9071 | 低危 | 2.31.1-16 |  | binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32 | 
                            
                            
                                | binutils-common | CVE-2019-9073 | 低危 | 2.31.1-16 |  | binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09 | 
                            
                            
                                | binutils-common | CVE-2019-9074 | 低危 | 2.31.1-16 |  | binutils: out-of-bound read in function bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11 | 
                            
                            
                                | binutils-common | CVE-2019-9075 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19 | 
                            
                            
                                | binutils-common | CVE-2019-9077 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function process_mips_specific in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | binutils-common | CVE-2020-16590 | 低危 | 2.31.1-16 |  | binutils: double free vulnerability in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-common | CVE-2020-16591 | 低危 | 2.31.1-16 |  | binutils: invalid read in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-common | CVE-2020-16592 | 低危 | 2.31.1-16 |  | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-common | CVE-2020-16593 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-common | CVE-2020-16599 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-common | CVE-2020-19724 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_data() in nm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils-common | CVE-2020-19726 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36 | 
                            
                            
                                | binutils-common | CVE-2020-21490 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_field() in microblaze-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | binutils-common | CVE-2020-35342 | 低危 | 2.31.1-16 |  | binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils-common | CVE-2020-35448 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-common | CVE-2020-35493 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-common | CVE-2020-35494 | 低危 | 2.31.1-16 |  | binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-common | CVE-2020-35495 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libelf1 | CVE-2021-33294 | 低危 | 0.176-1.1 |  | elfutils: an infinite loop was found in the function handle_symtab in readelf.c which causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33294 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:19 | 
                            
                            
                                | libelf1 | CVE-2024-25260 | 低危 | 0.176-1.1 |  | elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-02-20 18:15 修改: 2024-08-01 13:47 | 
                            
                            
                                | binutils-common | CVE-2020-35496 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | binutils-common | CVE-2020-35507 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10 | 
                            
                            
                                | binutils-common | CVE-2021-20197 | 低危 | 2.31.1-16 |  | binutils: Race window allows users to own arbitrary files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | binutils-common | CVE-2021-20284 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | binutils-common | CVE-2021-20294 | 低危 | 2.31.1-16 |  | binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | binutils-common | CVE-2021-32256 | 低危 | 2.31.1-16 |  | binutils: stack-overflow issue in demangle_type in rust-demangle.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | binutils-common | CVE-2021-3530 | 低危 | 2.31.1-16 |  | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03 | 
                            
                            
                                | binutils-common | CVE-2021-3549 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28 | 
                            
                            
                                | binutils-common | CVE-2021-3826 | 低危 | 2.31.1-16 |  | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01 | 
                            
                            
                                | binutils-common | CVE-2021-45078 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | binutils-common | CVE-2021-46174 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40 | 
                            
                            
                                | imagemagick-6-common | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | imagemagick-6-common | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | imagemagick-6-common | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | imagemagick-6-common | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | imagemagick-6-common | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | imagemagick-6-common | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmariadb-dev-compat | CVE-2021-2372 | 低危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2372 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | imagemagick-6-common | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | imagemagick-6-common | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libexpat1 | CVE-2013-0340 | 低危 | 2.2.6-2+deb10u1 |  | expat: internal entity expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-0340 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2014-01-21 18:55 修改: 2023-11-07 02:13 | 
                            
                            
                                | libexpat1 | CVE-2023-52426 | 低危 | 2.2.6-2+deb10u1 |  | expat: recursive XML entity expansion vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | libexpat1 | CVE-2024-28757 | 低危 | 2.2.6-2+deb10u1 |  | expat: XML Entity Expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libexpat1-dev | CVE-2013-0340 | 低危 | 2.2.6-2+deb10u1 |  | expat: internal entity expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-0340 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2014-01-21 18:55 修改: 2023-11-07 02:13 | 
                            
                            
                                | libexpat1-dev | CVE-2023-52426 | 低危 | 2.2.6-2+deb10u1 |  | expat: recursive XML entity expansion vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | libexpat1-dev | CVE-2024-28757 | 低危 | 2.2.6-2+deb10u1 |  | expat: XML Entity Expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | imagemagick-6-common | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6-common | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | libfdisk1 | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | binutils-common | CVE-2021-46195 | 低危 | 2.31.1-16 |  | gcc: uncontrolled recursion in libiberty/rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38 | 
                            
                            
                                | binutils-common | CVE-2022-35205 | 低危 | 2.31.1-16 |  | binutils: reachable assertion in display_debug_names() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-29 15:35 | 
                            
                            
                                | binutils-common | CVE-2022-35206 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36 | 
                            
                            
                                | libfreetype6 | CVE-2022-31782 | 低危 | 2.9.1-3+deb10u2 |  | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2022-06-10 18:08 | 
                            
                            
                                | binutils-common | CVE-2022-38533 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | binutils-common | CVE-2022-4285 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | binutils-common | CVE-2022-44840 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in find_section_in_set() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libfreetype6-dev | CVE-2022-31782 | 低危 | 2.9.1-3+deb10u2 |  | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31782 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-02 14:15 修改: 2022-06-10 18:08 | 
                            
                            
                                | binutils-common | CVE-2022-45703 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in display_debug_section() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | binutils-common | CVE-2022-47007 | 低危 | 2.31.1-16 |  | binutils: memory leak in stab_demangle_v3_arg() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-common | CVE-2022-47008 | 低危 | 2.31.1-16 |  | binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-common | CVE-2022-47010 | 低危 | 2.31.1-16 |  | binutils: memory leak in pr_function_type() in prdbg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libmariadb3 | CVE-2021-2372 | 低危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2372 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | binutils-common | CVE-2022-47011 | 低危 | 2.31.1-16 |  | binutils: memory leak in parse_stab_struct_fields() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libgcc-8-dev | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libmount-dev | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | binutils-common | CVE-2022-47673 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-common | CVE-2022-47695 | 低危 | 2.31.1-16 |  | binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | libmount1 | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libgcc1 | CVE-2023-4039 | 低危 | 1:8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils-common | CVE-2022-47696 | 低危 | 2.31.1-16 |  | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | libmpx2 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils-common | CVE-2022-48063 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | binutils-common | CVE-2022-48064 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libgcrypt20 | CVE-2018-6829 | 低危 | 1.8.4-5+deb10u1 |  | libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6829 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2018-02-07 23:29 修改: 2020-01-15 20:15 | 
                            
                            
                                | binutils-common | CVE-2022-48065 | 低危 | 2.31.1-16 |  | binutils: memory leak in find_abstract_instance() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36 | 
                            
                            
                                | binutils-common | CVE-2023-1579 | 低危 | 2.31.1-16 |  | binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | binutils-common | CVE-2023-1972 | 低危 | 2.31.1-16 |  | binutils: Illegal memory access when accessing a zer0-lengthverdef table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15 | 
                            
                            
                                | binutils-common | CVE-2023-25584 | 低危 | 2.31.1-16 |  | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | libgd3 | CVE-2021-40145 | 低危 | 2.2.5-5.2 |  | gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) throu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40145 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2021-08-26 01:15 修改: 2024-08-04 03:15 | 
                            
                            
                                | binutils-common | CVE-2023-25585 | 低危 | 2.31.1-16 |  | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-common | CVE-2023-25586 | 低危 | 2.31.1-16 |  | binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-common | CVE-2023-25588 | 低危 | 2.31.1-16 |  | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-common | CVE-2024-53589 | 低危 | 2.31.1-16 |  | binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-05 20:15 修改: 2024-12-11 17:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2017-13716 | 低危 | 2.31.1-16 |  | binutils: Memory leak with the C++ symbol demangler routine in libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-1000876 | 低危 | 2.31.1-16 |  | binutils: integer overflow leads to heap-based buffer overflow in objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-12697 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-12698 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in demangle_template in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-12699 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in finish_stab in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2012-0039 | 低危 | 2.58.3-2+deb10u3 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2020-35457 | 低危 | 2.58.3-2+deb10u3 |  | GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2024-34397 | 低危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u6 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-12934 | 低危 | 2.31.1-16 |  | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-17358 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-17359 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in bfd_zalloc in opncls.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-17360 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-17794 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2012-0039 | 低危 | 2.58.3-2+deb10u3 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2020-35457 | 低危 | 2.58.3-2+deb10u3 |  | GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2024-34397 | 低危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u6 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-17985 | 低危 | 2.31.1-16 |  | binutils: Stack consumption problem caused by the cplus_demangle_type 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libglib2.0-data | CVE-2012-0039 | 低危 | 2.58.3-2+deb10u3 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-data | CVE-2020-35457 | 低危 | 2.58.3-2+deb10u3 |  | GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15 | 
                            
                            
                                | libglib2.0-data | CVE-2024-34397 | 低危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u6 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libglib2.0-dev | CVE-2012-0039 | 低危 | 2.58.3-2+deb10u3 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2020-35457 | 低危 | 2.58.3-2+deb10u3 |  | GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15 | 
                            
                            
                                | libglib2.0-dev | CVE-2024-34397 | 低危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u6 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2012-0039 | 低危 | 2.58.3-2+deb10u3 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libopenexr-dev | CVE-2017-14988 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Excessive memory allocation in Header::readfrom 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-10-03 01:29 修改: 2024-08-05 20:15 | 
                            
                            
                                | libopenexr-dev | CVE-2018-18443 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Memory leak in ThreadPool in in IlmBase/IlmThread/IlmThreadPool.cpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18443 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-17 19:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libopenexr-dev | CVE-2021-20304 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Undefined-shift in Imf_2_5::hufDecode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2022-12-07 02:23 | 
                            
                            
                                | libopenexr-dev | CVE-2021-26945 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2022-10-19 13:19 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2020-35457 | 低危 | 2.58.3-2+deb10u3 |  | GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15 | 
                            
                            
                                | libglib2.0-dev-bin | CVE-2024-34397 | 低危 | 2.58.3-2+deb10u3 | 2.58.3-2+deb10u6 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libgnutls-dane0 | CVE-2011-3389 | 低危 | 3.6.7-4+deb10u7 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libgnutls-openssl27 | CVE-2011-3389 | 低危 | 3.6.7-4+deb10u7 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libopenexr23 | CVE-2017-14988 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Excessive memory allocation in Header::readfrom 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-10-03 01:29 修改: 2024-08-05 20:15 | 
                            
                            
                                | libopenexr23 | CVE-2018-18443 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Memory leak in ThreadPool in in IlmBase/IlmThread/IlmThreadPool.cpp 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18443 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-17 19:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libopenexr23 | CVE-2021-20304 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Undefined-shift in Imf_2_5::hufDecode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20304 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2022-12-07 02:23 | 
                            
                            
                                | libopenexr23 | CVE-2021-26945 | 低危 | 2.2.1-4.1+deb10u1 |  | OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26945 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-08 12:15 修改: 2022-10-19 13:19 | 
                            
                            
                                | libgnutls28-dev | CVE-2011-3389 | 低危 | 3.6.7-4+deb10u7 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | imagemagick-6.q16 | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18309 | 低危 | 2.31.1-16 |  | binutils: invalid memory address dereference in read_reloc in reloc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libgnutls30 | CVE-2011-3389 | 低危 | 3.6.7-4+deb10u7 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18483 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18484 | 低危 | 2.31.1-16 |  | binutils: Stack exhaustion in cp-demangle.c allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-10505 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: NULL pointer dereference in imagetopnm function in convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10505 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-30 09:29 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9113 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9114 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9114 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9115 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9116 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9116 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9117 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9580 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9580 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-01 16:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9581 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9581 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-01 14:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7 | CVE-2017-17479 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Stack-buffer overflow in the pgxtoimage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-08 19:29 修改: 2018-11-29 14:51 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-16375 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16375 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-03 00:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-16376 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-03 00:29 修改: 2018-10-31 14:26 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-20845 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-20846 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-5727 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 22:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-7648 | 低危 | 2.3.0-2+deb10u2 |  | An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. Th ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7648 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-02 16:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7 | CVE-2019-6988 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: DoS via memory exhaustion in opj_decompress 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-28 16:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18605 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18606 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18607 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libgnutlsxx28 | CVE-2011-3389 | 低危 | 3.6.7-4+deb10u7 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18700 | 低危 | 2.31.1-16 |  | binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | krb5-multidev | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libgomp1 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | krb5-multidev | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | krb5-multidev | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-10505 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: NULL pointer dereference in imagetopnm function in convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10505 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-30 09:29 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9113 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9113 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9114 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9114 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9115 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9115 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9116 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9116 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9117 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9117 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9580 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9580 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-01 16:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2016-9581 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9581 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-01 14:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2017-17479 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Stack-buffer overflow in the pgxtoimage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17479 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-08 19:29 修改: 2018-11-29 14:51 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-16375 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16375 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-03 00:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-16376 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16376 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-03 00:29 修改: 2018-10-31 14:26 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-20845 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-20846 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20846 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-5727 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5727 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 22:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2018-7648 | 低危 | 2.3.0-2+deb10u2 |  | An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. Th ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7648 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-02 16:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7-dev | CVE-2019-6988 | 低危 | 2.3.0-2+deb10u2 |  | openjpeg: DoS via memory exhaustion in opj_decompress 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6988 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-28 16:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-18701 | 低危 | 2.31.1-16 |  | binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-19931 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libapt-pkg5.0 | CVE-2011-3374 | 低危 | 1.8.2.3 |  | It was found that apt-key in apt, all versions, do not correctly valid ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-19932 | 低危 | 2.31.1-16 |  | binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20002 | 低危 | 2.31.1-16 |  | binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libasan5 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20623 | 低危 | 2.31.1-16 |  | binutils: Use-after-free in the error function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20651 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libatomic1 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libbinutils | CVE-2017-13716 | 低危 | 2.31.1-16 |  | binutils: Memory leak with the C++ symbol demangler routine in libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libpcre16-3 | CVE-2017-11164 | 低危 | 2:8.39-12 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | libpcre16-3 | CVE-2017-16231 | 低危 | 2:8.39-12 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpcre16-3 | CVE-2017-7245 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre16-3 | CVE-2017-7246 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre16-3 | CVE-2019-20838 | 低危 | 2:8.39-12 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libgssrpc4 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libgssrpc4 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libgssrpc4 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-41409 | 低危 | 10.32-5 |  | pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46 | 
                            
                            
                                | libbinutils | CVE-2018-1000876 | 低危 | 2.31.1-16 |  | binutils: integer overflow leads to heap-based buffer overflow in objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | libpcre3 | CVE-2017-11164 | 低危 | 2:8.39-12 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | libpcre3 | CVE-2017-16231 | 低危 | 2:8.39-12 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpcre3 | CVE-2017-7245 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3 | CVE-2017-7246 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3 | CVE-2019-20838 | 低危 | 2:8.39-12 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libbinutils | CVE-2018-12697 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | libpcre3-dev | CVE-2017-11164 | 低危 | 2:8.39-12 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | libpcre3-dev | CVE-2017-16231 | 低危 | 2:8.39-12 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpcre3-dev | CVE-2017-7245 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3-dev | CVE-2017-7246 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3-dev | CVE-2019-20838 | 低危 | 2:8.39-12 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libbinutils | CVE-2018-12698 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in demangle_template in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libpcre32-3 | CVE-2017-11164 | 低危 | 2:8.39-12 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | libpcre32-3 | CVE-2017-16231 | 低危 | 2:8.39-12 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpcre32-3 | CVE-2017-7245 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre32-3 | CVE-2017-7246 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre32-3 | CVE-2019-20838 | 低危 | 2:8.39-12 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libbinutils | CVE-2018-12699 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in finish_stab in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2017-11164 | 低危 | 2:8.39-12 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2017-16231 | 低危 | 2:8.39-12 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2017-7245 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2017-7246 | 低危 | 2:8.39-12 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcrecpp0v5 | CVE-2019-20838 | 低危 | 2:8.39-12 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libbinutils | CVE-2018-12934 | 低危 | 2.31.1-16 |  | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libbinutils | CVE-2018-17358 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libperl5.28 | CVE-2011-4116 | 低危 | 5.28.1-6+deb10u1 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | libperl5.28 | CVE-2023-31486 | 低危 | 5.28.1-6+deb10u1 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libbinutils | CVE-2018-17359 | 低危 | 2.31.1-16 |  | binutils: invalid memory access in bfd_zalloc in opncls.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libpixman-1-0 | CVE-2023-37769 | 低危 | 0.36.0-1 |  | stress-test master commit e4c878 was discovered to contain a FPE vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-17 20:15 修改: 2023-07-28 13:22 | 
                            
                            
                                | libbinutils | CVE-2018-17360 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libpixman-1-dev | CVE-2023-37769 | 低危 | 0.36.0-1 |  | stress-test master commit e4c878 was discovered to contain a FPE vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-17 20:15 修改: 2023-07-28 13:22 | 
                            
                            
                                | libpng-dev | CVE-2018-14048 | 低危 | 1.6.36-6 |  | libpng: Segmentation fault in png.c:png_free_data function causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-07-13 16:29 修改: 2022-06-27 17:35 | 
                            
                            
                                | libpng-dev | CVE-2018-14550 | 低危 | 1.6.36-6 |  | libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14550 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-10 12:15 修改: 2023-03-01 01:57 | 
                            
                            
                                | libpng-dev | CVE-2019-6129 | 低危 | 1.6.36-6 |  | libpng: memory leak of png_info struct in pngcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-11 05:29 修改: 2024-08-04 21:15 | 
                            
                            
                                | libpng-dev | CVE-2021-4214 | 低危 | 1.6.36-6 |  | libpng: hardcoded value leads to heap-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-11-08 02:32 | 
                            
                            
                                | libpng16-16 | CVE-2018-14048 | 低危 | 1.6.36-6 |  | libpng: Segmentation fault in png.c:png_free_data function causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14048 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-07-13 16:29 修改: 2022-06-27 17:35 | 
                            
                            
                                | libpng16-16 | CVE-2018-14550 | 低危 | 1.6.36-6 |  | libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14550 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-10 12:15 修改: 2023-03-01 01:57 | 
                            
                            
                                | libpng16-16 | CVE-2019-6129 | 低危 | 1.6.36-6 |  | libpng: memory leak of png_info struct in pngcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6129 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-11 05:29 修改: 2024-08-04 21:15 | 
                            
                            
                                | libpng16-16 | CVE-2021-4214 | 低危 | 1.6.36-6 |  | libpng: hardcoded value leads to heap-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4214 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-11-08 02:32 | 
                            
                            
                                | libheif1 | CVE-2024-25269 | 低危 | 1.3.2-2~deb10u1 |  | libheif <= 1.17.6 contains a memory leak in the function JpegEncoder:: ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25269 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-05 01:15 修改: 2024-08-01 13:47 | 
                            
                            
                                | libbinutils | CVE-2018-17794 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libbinutils | CVE-2018-17985 | 低危 | 2.31.1-16 |  | binutils: Stack consumption problem caused by the cplus_demangle_type 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libbinutils | CVE-2018-18309 | 低危 | 2.31.1-16 |  | binutils: invalid memory address dereference in read_reloc in reloc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libbinutils | CVE-2018-18483 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libbinutils | CVE-2018-18484 | 低危 | 2.31.1-16 |  | binutils: Stack exhaustion in cp-demangle.c allows for denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libbinutils | CVE-2018-18605 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libitm1 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libjbig-dev | CVE-2017-9937 | 低危 | 2.1-3.1+b2 |  | libtiff: memory malloc failure in tif_jbig.c could cause DOS. 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-06-26 12:29 修改: 2023-11-07 02:50 | 
                            
                            
                                | libjbig0 | CVE-2017-9937 | 低危 | 2.1-3.1+b2 |  | libtiff: memory malloc failure in tif_jbig.c could cause DOS. 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-06-26 12:29 修改: 2023-11-07 02:50 | 
                            
                            
                                | libbinutils | CVE-2018-18606 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libbinutils | CVE-2018-18607 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libjpeg-dev | CVE-2017-15232 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: NULL pointer dereference in jdpostct.c and jquant1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-10-11 03:29 修改: 2018-07-11 01:29 | 
                            
                            
                                | libjpeg-dev | CVE-2018-11813 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15 | 
                            
                            
                                | libjpeg-dev | CVE-2020-17541 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Stack-based buffer overflow in the "transform" component 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29 | 
                            
                            
                                | libbinutils | CVE-2018-18700 | 低危 | 2.31.1-16 |  | binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libbinutils | CVE-2018-18701 | 低危 | 2.31.1-16 |  | binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libjpeg62-turbo | CVE-2017-15232 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: NULL pointer dereference in jdpostct.c and jquant1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-10-11 03:29 修改: 2018-07-11 01:29 | 
                            
                            
                                | libjpeg62-turbo | CVE-2018-11813 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15 | 
                            
                            
                                | libjpeg62-turbo | CVE-2020-17541 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Stack-based buffer overflow in the "transform" component 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29 | 
                            
                            
                                | libbinutils | CVE-2018-19931 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libbinutils | CVE-2018-19932 | 低危 | 2.31.1-16 |  | binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | libjpeg62-turbo-dev | CVE-2017-15232 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: NULL pointer dereference in jdpostct.c and jquant1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-10-11 03:29 修改: 2018-07-11 01:29 | 
                            
                            
                                | libjpeg62-turbo-dev | CVE-2018-11813 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15 | 
                            
                            
                                | libprocps7 | CVE-2023-4016 | 低危 | 2:3.3.15-2 |  | procps: ps buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19 | 
                            
                            
                                | libpython-stdlib | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | libpython2-stdlib | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | libjpeg62-turbo-dev | CVE-2020-17541 | 低危 | 1:1.5.2-2+deb10u1 |  | libjpeg-turbo: Stack-based buffer overflow in the "transform" component 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29 | 
                            
                            
                                | libbinutils | CVE-2018-20002 | 低危 | 2.31.1-16 |  | binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libbinutils | CVE-2018-20623 | 低危 | 2.31.1-16 |  | binutils: Use-after-free in the error function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15 | 
                            
                            
                                | libbinutils | CVE-2018-20651 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libbinutils | CVE-2018-20671 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in load_specific_debug_section function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libbinutils | CVE-2018-20673 | 低危 | 2.31.1-16 |  | libiberty: Integer overflow in demangle_template() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libbinutils | CVE-2018-20712 | 低危 | 2.31.1-16 |  | libiberty: heap-based buffer over-read in d_expression_1 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libk5crypto3 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libk5crypto3 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libk5crypto3 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2018-9138 | 低危 | 2.31.1-16 |  | binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libbinutils | CVE-2018-9996 | 低危 | 2.31.1-16 |  | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libbinutils | CVE-2019-1010180 | 低危 | 2.31.1-16 |  | gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | libbinutils | CVE-2019-1010204 | 低危 | 2.31.1-16 |  | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02 | 
                            
                            
                                | libbinutils | CVE-2019-12972 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in setup_group in bfd/elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libbinutils | CVE-2019-14250 | 低危 | 2.31.1-16 |  | binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkadm5clnt-mit11 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2019-14444 | 低危 | 2.31.1-16 |  | binutils: integer overflow in function apply_relocation in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58 | 
                            
                            
                                | libbinutils | CVE-2019-17450 | 低危 | 2.31.1-16 |  | binutils: denial of service via crafted ELF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32 | 
                            
                            
                                | libbinutils | CVE-2019-17451 | 低危 | 2.31.1-16 |  | binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libpython2.7-minimal | CVE-2013-7040 | 低危 | 2.7.16-2+deb10u1 |  | python: hash secret can be recovered remotely 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53 | 
                            
                            
                                | libpython2.7-minimal | CVE-2017-17522 | 低危 | 2.7.16-2+deb10u1 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2019-18348 | 低危 | 2.7.16-2+deb10u1 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libpython2.7-minimal | CVE-2019-9674 | 低危 | 2.7.16-2+deb10u1 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | libpython2.7-minimal | CVE-2020-27619 | 低危 | 2.7.16-2+deb10u1 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2021-28861 | 低危 | 2.7.16-2+deb10u1 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | libpython2.7-minimal | CVE-2024-5642 | 低危 | 2.7.16-2+deb10u1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libbinutils | CVE-2019-9070 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | libbinutils | CVE-2019-9071 | 低危 | 2.31.1-16 |  | binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32 | 
                            
                            
                                | libbinutils | CVE-2019-9073 | 低危 | 2.31.1-16 |  | binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkadm5srv-mit11 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2019-9074 | 低危 | 2.31.1-16 |  | binutils: out-of-bound read in function bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11 | 
                            
                            
                                | libbinutils | CVE-2019-9075 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19 | 
                            
                            
                                | libbinutils | CVE-2019-9077 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function process_mips_specific in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | libbinutils | CVE-2020-16590 | 低危 | 2.31.1-16 |  | binutils: double free vulnerability in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libbinutils | CVE-2020-16591 | 低危 | 2.31.1-16 |  | binutils: invalid read in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libbinutils | CVE-2020-16592 | 低危 | 2.31.1-16 |  | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libkdb5-9 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkdb5-9 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkdb5-9 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2020-16593 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libbinutils | CVE-2020-16599 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libbinutils | CVE-2020-19724 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_data() in nm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | libbinutils | CVE-2020-19726 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36 | 
                            
                            
                                | libbinutils | CVE-2020-21490 | 低危 | 2.31.1-16 |  | binutils: memory leak in get_field() in microblaze-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | libbinutils | CVE-2020-35342 | 低危 | 2.31.1-16 |  | binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | libkrb5-3 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2013-7040 | 低危 | 2.7.16-2+deb10u1 |  | python: hash secret can be recovered remotely 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2017-17522 | 低危 | 2.7.16-2+deb10u1 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2019-18348 | 低危 | 2.7.16-2+deb10u1 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2019-9674 | 低危 | 2.7.16-2+deb10u1 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2020-27619 | 低危 | 2.7.16-2+deb10u1 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2004-0230 | 低危 | 4.19.194-3 |  | TCP, when using a large Window Size, makes it easier for remote attack ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2004-0230 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2004-08-18 04:00 修改: 2018-10-19 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2005-3660 | 低危 | 4.19.194-3 |  | Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-3660 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-12-22 23:03 修改: 2017-07-11 01:33 | 
                            
                            
                                | linux-libc-dev | CVE-2007-3719 | 低危 | 4.19.194-3 |  | kernel: secretly Monopolizing the CPU Without Superuser Privileges 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-3719 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2007-07-12 16:30 修改: 2008-11-15 06:53 | 
                            
                            
                                | linux-libc-dev | CVE-2008-2544 | 低危 | 4.19.194-3 |  | kernel: mounting proc readonly on a different mount point silently mounts it rw if the /proc mount is rw 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-2544 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-27 13:15 修改: 2021-06-07 17:39 | 
                            
                            
                                | linux-libc-dev | CVE-2008-4609 | 低危 | 4.19.194-3 |  | kernel: TCP protocol vulnerabilities from Outpost24 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4609 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-10-20 17:59 修改: 2022-12-14 16:40 | 
                            
                            
                                | linux-libc-dev | CVE-2010-4563 | 低危 | 4.19.194-3 |  | kernel: ipv6: sniffer detection 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2012-02-02 17:55 修改: 2012-02-03 05:00 | 
                            
                            
                                | linux-libc-dev | CVE-2010-5321 | 低危 | 4.19.194-3 |  | kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-5321 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-04-24 06:59 修改: 2023-11-07 02:06 | 
                            
                            
                                | linux-libc-dev | CVE-2011-4915 | 低危 | 4.19.194-3 |  | fs/proc/base.c in the Linux kernel through 3.1 allows local users to o ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4915 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-20 18:15 修改: 2020-02-25 15:14 | 
                            
                            
                                | linux-libc-dev | CVE-2011-4916 | 低危 | 4.19.194-3 |  | Linux kernel through 3.1 allows local users to obtain sensitive keystr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4916 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-07-12 21:15 修改: 2022-07-20 09:02 | 
                            
                            
                                | linux-libc-dev | CVE-2011-4917 | 低危 | 4.19.194-3 |  | In the Linux kernel through 3.1 there is an information disclosure iss ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4917 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-04-18 17:15 修改: 2022-04-26 18:33 | 
                            
                            
                                | linux-libc-dev | CVE-2012-4542 | 低危 | 4.19.194-3 |  | kernel: block: default SCSI command filter does not accomodate commands overlap across device classes 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-4542 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2013-02-28 19:55 修改: 2023-02-13 00:26 | 
                            
                            
                                | linux-libc-dev | CVE-2014-9892 | 低危 | 4.19.194-3 |  | The snd_compr_tstamp function in sound/core/compress_offload.c in the  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9892 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-08-06 10:59 修改: 2016-11-28 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2014-9900 | 低危 | 4.19.194-3 |  | kernel: Info leak in uninitialized structure ethtool_wolinfo in ethtool_get_wol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9900 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-08-06 10:59 修改: 2016-11-28 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2015-2877 | 低危 | 4.19.194-3 |  | Kernel: Cross-VM ASL INtrospection (CAIN) 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2877 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-03 11:59 修改: 2024-08-06 06:15 | 
                            
                            
                                | linux-libc-dev | CVE-2016-10723 | 低危 | 4.19.194-3 |  | An issue was discovered in the Linux kernel through 4.17.2. Since the  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10723 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-21 13:29 修改: 2024-08-06 04:16 | 
                            
                            
                                | linux-libc-dev | CVE-2016-8660 | 低危 | 4.19.194-3 |  | kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8660 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2016-10-16 21:59 修改: 2016-11-28 20:41 | 
                            
                            
                                | linux-libc-dev | CVE-2017-0630 | 低危 | 4.19.194-3 |  | kernel: Information disclosure vulnerability in kernel trace subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0630 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-05-12 15:29 修改: 2017-05-19 12:41 | 
                            
                            
                                | linux-libc-dev | CVE-2017-13693 | 低危 | 4.19.194-3 |  | kernel: ACPI operand cache leak in dsutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13693 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-25 08:29 修改: 2024-12-18 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2017-13694 | 低危 | 4.19.194-3 |  | kernel: ACPI node and node_ext cache leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13694 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-08-25 08:29 修改: 2024-12-18 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2018-1121 | 低危 | 4.19.194-3 |  | procps: process hiding through race condition enumerating /proc 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1121 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-13 20:29 修改: 2020-06-30 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2018-12928 | 低危 | 4.19.194-3 |  | kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12928 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-06-28 14:29 修改: 2018-08-21 11:55 | 
                            
                            
                                | linux-libc-dev | CVE-2018-17977 | 低危 | 4.19.194-3 |  | kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets resulting in a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17977 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-10-08 17:29 修改: 2018-11-26 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2019-11191 | 低危 | 4.19.194-3 |  | kernel: race condition in load_aout_binary() allows local users to bypass ASLR on setuid a.out programs 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11191 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-04-12 00:29 修改: 2024-08-04 23:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12378 | 低危 | 4.19.194-3 |  | kernel: unchecked kmalloc of new_ra in ip6_ra_control leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-28 03:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12379 | 低危 | 4.19.194-3 |  | kernel: memory leak in con_insert_unipair in drivers/tty/vt/consolemap.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12379 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-28 03:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12380 | 低危 | 4.19.194-3 |  | kernel: memory allocation failure in the efi subsystem leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12380 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-28 03:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12381 | 低危 | 4.19.194-3 |  | kernel: unchecked kmalloc of new_ra in ip_ra_control leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12381 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-28 03:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12382 | 低危 | 4.19.194-3 |  | kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12382 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-28 03:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12455 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12455 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-30 04:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12456 | 低危 | 4.19.194-3 |  | kernel: double fetch in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12456 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-05-30 14:29 修改: 2024-08-05 00:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-12615 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in get_vdev_port_node_info in arch /sparc/kernel/mdesc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12615 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-03 22:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16229 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16229 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2024-08-05 01:16 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16230 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in drivers/gpu/drm/radeon/radeon_display.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16230 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2024-08-05 01:16 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16231 | 低危 | 4.19.194-3 |  | kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16231 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2020-05-04 20:22 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16232 | 低危 | 4.19.194-3 |  | kernel: null-pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16232 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16233 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2020-05-06 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-16234 | 低危 | 4.19.194-3 |  | kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16234 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-11 16:15 修改: 2020-05-05 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19064 | 低危 | 4.19.194-3 |  | kernel: A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c allows for a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-18 06:15 修改: 2024-08-27 19:38 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19070 | 低危 | 4.19.194-3 |  | kernel: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c allows for a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-18 06:15 修改: 2024-08-05 02:15 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19083 | 低危 | 4.19.194-3 |  | kernel: memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19083 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-18 06:15 修改: 2020-08-24 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19378 | 低危 | 4.19.194-3 |  | kernel: out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19378 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-29 17:15 修改: 2020-01-03 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-11725 | 低危 | 4.19.194-3 |  | kernel: improper handling of private_size*count multiplication due to count=info->owner typo 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11725 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-12 22:15 修改: 2024-08-04 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-27820 | 低危 | 4.19.194-3 |  | kernel: use-after-free in nouveau kernel module 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27820 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-11-03 00:15 修改: 2024-01-30 20:48 | 
                            
                            
                                | linux-libc-dev | CVE-2020-29374 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: the get_user_pages implementation when used for a copy-on-write page does not properly consider the semantics of read operations and therefore can grant unintended read access 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29374 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-11-28 07:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2020-35501 | 低危 | 4.19.194-3 |  | kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35501 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-03-30 16:15 修改: 2022-12-02 19:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0929 | 低危 | 4.19.194-3 |  | kernel: use-after-free in ion_dma_buf_end_cpu_access and related functions in ion.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0929 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 19:15 修改: 2021-12-17 17:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26934 | 低危 | 4.19.194-3 |  | An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-17 02:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-32078 | 低危 | 4.19.194-3 |  | kernel: out-of-bounds read in arch/arm/mach-footbridge/personal-pci.c due to improper input validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-17 15:15 修改: 2021-09-20 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3655 | 低危 | 4.19.194-3 | 4.19.208-1 | kernel: missing size validations on inbound SCTP packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3655 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-05 21:15 修改: 2022-10-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3714 | 低危 | 4.19.194-3 |  | kernel: Remote Page Deduplication Attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3714 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 16:15 修改: 2024-02-01 18:51 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38204 | 低危 | 4.19.194-3 | 4.19.208-1 | kernel: use-after-free and panic in drivers/usb/host/max3421-hcd.c by removing a MAX-3421 USB device in certain situations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38205 | 低危 | 4.19.194-3 | 4.19.208-1 | kernel: drivers/net/ethernet/xilinx/xilinx_emaclite.c prints the real IOMEM pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3923 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: stack information leak in infiniband RDMA 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3923 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45486 | 低危 | 4.19.194-3 | 4.19.208-1 | kernel: information leak in the IPv4 implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45486 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-25 02:15 修改: 2023-02-24 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46934 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: i2c: validate user data in compat ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46934 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47339 | 低危 | 4.19.194-3 |  | kernel: media: v4l2-core: explicitly clear ioctl input data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47339 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47366 | 低危 | 4.19.194-3 |  | kernel: afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47366 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47410 | 低危 | 4.19.194-3 |  | kernel: drm/amdkfd: fix svm_migrate_fini warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47410 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47431 | 低危 | 4.19.194-3 |  | kernel: drm/amdgpu: fix gart.bo pin_count leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47431 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47523 | 低危 | 4.19.194-3 |  | kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47523 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47538 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47582 | 低危 | 4.19.194-3 |  | kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47582 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47588 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: sit: do not call ipip6_dev_free() from sit_init_net() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0400 | 低危 | 4.19.194-3 |  | kernel: Out of bounds read in the smc protocol stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0400 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2022-09-01 20:18 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1247 | 低危 | 4.19.194-3 |  | kernel: A race condition bug in rose_connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1247 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-31 16:15 修改: 2022-09-06 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24448 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-04 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-25265 | 低危 | 4.19.194-3 |  | kernel: Executable Space Protection Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25265 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-16 21:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2961 | 低危 | 4.19.194-3 |  | kernel: race condition in rose_bind() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2961 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-29 15:15 修改: 2023-06-28 20:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2991 | 低危 | 4.19.194-3 | 4.19.249-1 | kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2991 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-25 18:15 修改: 2022-08-30 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-32296 | 低危 | 4.19.194-3 | 4.19.249-2 | kernel: insufficient TCP source port randomness leads to client identification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32296 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-05 22:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-32981 | 低危 | 4.19.194-3 | 4.19.249-1 | kernel: Linux kernel for powerpc 32-bit buffer overflow in ptrace PEEKUSER/POKEUSER 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-10 20:15 修改: 2022-06-27 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33981 | 低危 | 4.19.194-3 | 4.19.249-2 | kernel: use-after-free in floppy driver may lead to a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33981 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-06-18 16:15 修改: 2022-11-05 02:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3521 | 低危 | 4.19.194-3 | 4.19.269-1 | kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3521 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-16 10:15 修改: 2023-02-23 15:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3629 | 低危 | 4.19.194-3 | 4.19.260-1 | kernel: memory leak in the function vsock_connect of Virtual Socket Protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3629 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-21 06:15 修改: 2024-05-17 02:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41848 | 低危 | 4.19.194-3 |  | kernel: Race condition between mgslpc_ioctl and mgslpc_detach 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41848 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-30 06:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-44032 | 低危 | 4.19.194-3 |  | Kernel: Race between cmm_open() and cm4000_detach() result in UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-30 01:15 修改: 2024-08-01 13:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-44033 | 低危 | 4.19.194-3 |  | Kernel: A race condition between cm4040_open() and reader_detach() may result in UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44033 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-30 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-44034 | 低危 | 4.19.194-3 |  | Kernel: A use-after-free due to race between scr24x_open()  and scr24x_remove() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44034 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-10-30 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4543 | 低危 | 4.19.194-3 |  | kernel: KASLR Prefetch Bypass Breaks KPTI 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4543 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-11 15:15 修改: 2023-01-19 18:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45884 | 低危 | 4.19.194-3 |  | kernel: use-after-free due to race condition occurring in dvb_register_device() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45884 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-25 04:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45885 | 低危 | 4.19.194-3 |  | kernel: use-after-free due to race condition occurring in dvb_frontend.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45885 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-25 04:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45886 | 低危 | 4.19.194-3 | 4.19.289-1 | kernel: use-after-free due to race condition occurring in dvb_net.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45886 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-25 04:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45887 | 低危 | 4.19.194-3 | 4.19.289-1 | kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-25 04:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45919 | 低危 | 4.19.194-3 | 4.19.289-1 | kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45919 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-11-27 02:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48633 | 低危 | 4.19.194-3 |  | kernel: drm/gma500: Fix WARN_ON(lock-->magic != lock) error 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48633 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48757 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: net: fix information leakage in /proc/net/ptype 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48758 | 低危 | 4.19.194-3 | 4.19.232-1 | kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48774 | 低危 | 4.19.194-3 |  | kernel: dmaengine: ptdma: Fix the error handling path in pt_core_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48852 | 低危 | 4.19.194-3 |  | kernel: drm/vc4: hdmi: Unregister codec device on unbind 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48852 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48937 | 低危 | 4.19.194-3 |  | kernel: io_uring: add a schedule point in io_add_buffers() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48937 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 19:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48939 | 低危 | 4.19.194-3 |  | kernel: bpf: Add schedule points in batch ops 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48939 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-22 04:15 修改: 2024-08-22 19:02 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1513 | 低危 | 4.19.194-3 | 4.19.282-1 | kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23000 | 低危 | 4.19.194-3 |  | kernel: incorrect return value for the error case in the tegra_xusb_find_port_node 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23000 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 19:15 修改: 2023-03-31 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23003 | 低危 | 4.19.194-3 |  | kernel: missing check for return value of hashmap__new() in the function expr__ctx_new 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23003 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-03-01 20:15 修改: 2023-08-29 17:56 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23039 | 低危 | 4.19.194-3 |  | kernel: tty: vcc: race condition leading to use-after-free in vcc_open() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-22 17:15 修改: 2023-03-06 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2023-26242 | 低危 | 4.19.194-3 |  | afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26242 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-02-21 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31085 | 低危 | 4.19.194-3 |  | kernel: divide-by-zero error in ctrl_cdev_ioctl when do_div happens and erasesize is 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-24 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3640 | 低危 | 4.19.194-3 |  | Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3640 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-24 16:15 修改: 2023-11-07 04:19 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4134 | 低危 | 4.19.194-3 |  | kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-14 11:15 修改: 2024-11-18 22:08 | 
                            
                            
                                | linux-libc-dev | CVE-2023-45896 | 低危 | 4.19.194-3 |  | kernel: ntfs3: kernel memory read by mounting a filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45896 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-28 05:15 修改: 2024-11-01 08:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52561 | 低危 | 4.19.194-3 |  | kernel: arm64: dts: qcom: sdm845-db845c: unreserved cont splash memory region leads to kernel panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52561 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-11-04 18:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52569 | 低危 | 4.19.194-3 |  | kernel: btrfs: improper BUG() call after failure to insert delayed dir index item 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52569 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52620 | 低危 | 4.19.194-3 | 4.19.316-1 | kernel: netfilter: nf_tables: disallow timeout for anonymous sets 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52620 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-21 11:15 修改: 2024-11-06 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52703 | 低危 | 4.19.194-3 | 4.19.282-1 | kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-21 16:15 修改: 2024-11-07 17:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52887 | 低危 | 4.19.194-3 |  | kernel: net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52887 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 16:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2023-6610 | 低危 | 4.19.194-3 |  | kernel: OOB Access in smb2_dump_detail 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6610 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-12-08 17:15 修改: 2024-07-08 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-0564 | 低危 | 4.19.194-3 |  | kernel: max page sharing of Kernel Samepage Merging (KSM) may cause memory deduplication 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0564 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-01-30 15:15 修改: 2024-11-25 09:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26614 | 低危 | 4.19.194-3 |  | kernel: tcp: make sure init the accept_queue's spinlocks once 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26614 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-03-11 18:15 修改: 2024-11-06 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2024-26765 | 低危 | 4.19.194-3 |  | kernel: LoongArch: Disable IRQ before init_fn() for nonboot CPUs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-33621 | 低危 | 4.19.194-3 | 4.19.316-1 | kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33621 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-35935 | 低危 | 4.19.194-3 | 4.19.316-1 | kernel: btrfs: send: handle path ref underflow in header iterate_inode_ref() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35935 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-19 11:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36940 | 低危 | 4.19.194-3 | 4.19.316-1 | kernel: pinctrl: core: delete incorrect free in pinctrl_enable() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36940 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-11-05 10:17 | 
                            
                            
                                | linux-libc-dev | CVE-2024-36942 | 低危 | 4.19.194-3 |  | kernel: Bluetooth: qca: fix firmware check error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36942 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18 | 
                            
                            
                                | linux-libc-dev | CVE-2024-38580 | 低危 | 4.19.194-3 |  | kernel: epoll: be better about file lifetimes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38580 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40918 | 低危 | 4.19.194-3 |  | kernel: parisc: Try to fix random segmentation faults in package builds 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40918 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-40985 | 低危 | 4.19.194-3 |  | kernel: net/tcp_ao: Don't leak ao_info on error-path 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40985 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41007 | 低危 | 4.19.194-3 |  | kernel: tcp: avoid too many retransmit packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-15 09:15 修改: 2024-07-19 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41021 | 低危 | 4.19.194-3 |  | kernel: s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41021 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 14:15 修改: 2024-08-12 13:38 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41027 | 低危 | 4.19.194-3 |  | kernel: Fix userfaultfd_api to return EINVAL as expected 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41027 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41047 | 低危 | 4.19.194-3 |  | kernel: i40e: Fix XDP program unloading while removing the driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41047 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-41068 | 低危 | 4.19.194-3 |  | kernel: s390/sclp: Fix sclp_init() cleanup on failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41068 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42087 | 低危 | 4.19.194-3 |  | kernel: drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-29 17:15 修改: 2024-07-30 13:33 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42155 | 低危 | 4.19.194-3 |  | kernel: s390/pkey: Wipe copies of protected- and secure-keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42155 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-07-30 08:15 修改: 2024-08-08 15:01 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42233 | 低危 | 4.19.194-3 |  | kernel: filemap: replace pte_offset_map() with pte_offset_map_nolock() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42233 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-42249 | 低危 | 4.19.194-3 |  | kernel: spi: don't unoptimize message in spi_async() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42249 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-07 16:15 修改: 2024-08-08 20:55 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43832 | 低危 | 4.19.194-3 |  | kernel: s390/uv: Don't call folio_wait_writeback() without a folio reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43832 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43841 | 低危 | 4.19.194-3 |  | kernel: wifi: virt_wifi: avoid reporting connection success with wrong SSID 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43841 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-29 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43845 | 低危 | 4.19.194-3 |  | kernel: udf: Fix bogus checksum computation in udf_rename() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43845 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-17 10:15 修改: 2024-10-25 19:51 | 
                            
                            
                                | linux-libc-dev | CVE-2024-43876 | 低危 | 4.19.194-3 |  | kernel: PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43876 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | linux-libc-dev | CVE-2024-46794 | 低危 | 4.19.194-3 |  | kernel: x86/tdx: Fix data leak in mmio_read() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46794 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-09-18 08:15 修改: 2024-11-20 20:56 | 
                            
                            
                                | linux-libc-dev | CVE-2024-47738 | 低危 | 4.19.194-3 |  | kernel: wifi: mac80211: don't use rate mask for offchannel TX either 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47738 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 13:15 修改: 2024-10-23 22:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50044 | 低危 | 4.19.194-3 |  | kernel: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50044 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50057 | 低危 | 4.19.194-3 |  | kernel: usb: typec: tipd: Free IRQ only if it was requested before 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50057 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50092 | 低危 | 4.19.194-3 |  | kernel: net: netconsole: fix wrong warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50092 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-05 17:15 修改: 2024-11-13 00:40 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50211 | 低危 | 4.19.194-3 |  | kernel: udf: refactor inode_bmap() to handle error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50211 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-08 06:15 修改: 2024-11-18 19:04 | 
                            
                            
                                | linux-libc-dev | CVE-2024-50280 | 低危 | 4.19.194-3 |  | kernel: dm cache: fix flushing uninitialized delayed_work on cache_ctr error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50280 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53161 | 低危 | 4.19.194-3 |  | kernel: EDAC/bluefield: Fix potential integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53161 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-24 12:15 修改: 2024-12-24 12:15 | 
                            
                            
                                | linux-libc-dev | TEMP-0000000-F7A20F | 低危 | 4.19.194-3 |  | [Kernel: Unprivileged user can freeze journald] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-F7A20F 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2021-28861 | 低危 | 2.7.16-2+deb10u1 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | login | CVE-2007-5686 | 低危 | 1:4.5-1.1 |  | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45 | 
                            
                            
                                | login | CVE-2013-4235 | 低危 | 1:4.5-1.1 |  | shadow-utils: TOCTOU race conditions by copying and removing directory trees 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28 | 
                            
                            
                                | login | CVE-2018-7169 | 低危 | 1:4.5-1.1 |  | shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | login | CVE-2019-19882 | 低危 | 1:4.5-1.1 |  | shadow-utils: local users can obtain root access because setuid programs are misconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19882 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-12-18 16:15 修改: 2020-08-25 15:15 | 
                            
                            
                                | login | CVE-2023-29383 | 低危 | 1:4.5-1.1 |  | shadow: Improper input validation in shadow-utils package utility chfn 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05 | 
                            
                            
                                | login | CVE-2024-56433 | 低危 | 1:4.5-1.1 |  | shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15 | 
                            
                            
                                | login | TEMP-0628843-DBAD28 | 低危 | 1:4.5-1.1 |  | [more related to CVE-2005-4890] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | m4 | CVE-2008-1687 | 低危 | 1.4.18-2 |  | m4: unquoted output of maketemp and mkstemp 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-1687 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-04-09 19:05 修改: 2017-08-08 01:30 | 
                            
                            
                                | m4 | CVE-2008-1688 | 低危 | 1.4.18-2 |  | m4: code execution via -F argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-1688 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-04-09 19:05 修改: 2017-08-08 01:30 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2024-5642 | 低危 | 2.7.16-2+deb10u1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libkrb5-3 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkrb5-3 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2020-35448 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libbinutils | CVE-2020-35493 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libbinutils | CVE-2020-35494 | 低危 | 2.31.1-16 |  | binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libbinutils | CVE-2020-35495 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libbinutils | CVE-2020-35496 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libbinutils | CVE-2020-35507 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10 | 
                            
                            
                                | libkrb5-dev | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkrb5-dev | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkrb5-dev | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2021-20197 | 低危 | 2.31.1-16 |  | binutils: Race window allows users to own arbitrary files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libbinutils | CVE-2021-20284 | 低危 | 2.31.1-16 |  | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libbinutils | CVE-2021-20294 | 低危 | 2.31.1-16 |  | binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libbinutils | CVE-2021-32256 | 低危 | 2.31.1-16 |  | binutils: stack-overflow issue in demangle_type in rust-demangle.c. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | libbinutils | CVE-2021-3530 | 低危 | 2.31.1-16 |  | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03 | 
                            
                            
                                | libbinutils | CVE-2021-3549 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28 | 
                            
                            
                                | libkrb5support0 | CVE-2018-5709 | 低危 | 1.17-3+deb10u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkrb5support0 | CVE-2024-26458 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkrb5support0 | CVE-2024-26461 | 低危 | 1.17-3+deb10u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libbinutils | CVE-2021-3826 | 低危 | 2.31.1-16 |  | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01 | 
                            
                            
                                | libpython3.7-minimal | CVE-2017-17522 | 低危 | 3.7.3-2+deb10u3 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2019-18348 | 低危 | 3.7.3-2+deb10u3 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libpython3.7-minimal | CVE-2019-9674 | 低危 | 3.7.3-2+deb10u3 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | libpython3.7-minimal | CVE-2020-27619 | 低危 | 3.7.3-2+deb10u3 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2021-28861 | 低危 | 3.7.3-2+deb10u3 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | libpython3.7-minimal | CVE-2024-4032 | 低危 | 3.7.3-2+deb10u3 |  | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | libpython3.7-minimal | CVE-2024-5642 | 低危 | 3.7.3-2+deb10u3 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libbinutils | CVE-2021-45078 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libbinutils | CVE-2021-46174 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40 | 
                            
                            
                                | libbinutils | CVE-2021-46195 | 低危 | 2.31.1-16 |  | gcc: uncontrolled recursion in libiberty/rust-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38 | 
                            
                            
                                | libldap-2.4-2 | CVE-2015-3276 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: incorrect multi-keyword mode cipherstring parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28 | 
                            
                            
                                | libldap-2.4-2 | CVE-2017-14159 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: Privilege escalation via PID file manipulation 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18 | 
                            
                            
                                | libldap-2.4-2 | CVE-2017-17740 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10 | 
                            
                            
                                | libldap-2.4-2 | CVE-2020-15719 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: Certificate validation incorrectly matches name against CN-ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01 | 
                            
                            
                                | libbinutils | CVE-2022-35205 | 低危 | 2.31.1-16 |  | binutils: reachable assertion in display_debug_names() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-29 15:35 | 
                            
                            
                                | libbinutils | CVE-2022-35206 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36 | 
                            
                            
                                | libldap-common | CVE-2015-3276 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: incorrect multi-keyword mode cipherstring parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28 | 
                            
                            
                                | libldap-common | CVE-2017-14159 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: Privilege escalation via PID file manipulation 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18 | 
                            
                            
                                | libldap-common | CVE-2017-17740 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10 | 
                            
                            
                                | libldap-common | CVE-2020-15719 | 低危 | 2.4.47+dfsg-3+deb10u6 |  | openldap: Certificate validation incorrectly matches name against CN-ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01 | 
                            
                            
                                | libbinutils | CVE-2022-38533 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libbinutils | CVE-2022-4285 | 低危 | 2.31.1-16 |  | binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | liblsan0 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | liblz4-1 | CVE-2019-17543 | 低危 | 1.8.3-1+deb10u1 |  | lz4: heap-based buffer overflow in LZ4_write32 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17543 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-10-14 02:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libbinutils | CVE-2022-44840 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in find_section_in_set() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libbinutils | CVE-2022-45703 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in display_debug_section() in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | libbinutils | CVE-2022-47007 | 低危 | 2.31.1-16 |  | binutils: memory leak in stab_demangle_v3_arg() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | mariadb-common | CVE-2021-2372 | 低危 | 1:10.3.29-0+deb10u1 | 1:10.3.31-0+deb10u1 | mysql: InnoDB unspecified vulnerability (CPU Jul 2021) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-2372 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-21 15:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libbinutils | CVE-2022-47008 | 低危 | 2.31.1-16 |  | binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2017-17522 | 低危 | 3.7.3-2+deb10u3 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | mount | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2019-18348 | 低危 | 3.7.3-2+deb10u3 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2019-9674 | 低危 | 3.7.3-2+deb10u3 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2020-27619 | 低危 | 3.7.3-2+deb10u3 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2021-28861 | 低危 | 3.7.3-2+deb10u3 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2024-4032 | 低危 | 3.7.3-2+deb10u3 |  | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | libpython3.7-stdlib | CVE-2024-5642 | 低危 | 3.7.3-2+deb10u3 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libbinutils | CVE-2022-47010 | 低危 | 2.31.1-16 |  | binutils: memory leak in pr_function_type() in prdbg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libbinutils | CVE-2022-47011 | 低危 | 2.31.1-16 |  | binutils: memory leak in parse_stab_struct_fields() in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libquadmath0 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libbinutils | CVE-2022-47673 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libbinutils | CVE-2022-47695 | 低危 | 2.31.1-16 |  | binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | libbinutils | CVE-2022-47696 | 低危 | 2.31.1-16 |  | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | nginx | CVE-2009-4487 | 低危 | 1.17.10-1~buster |  | nginx: Absent sanitation of escape sequences in web server log 漏洞详情: https://avd.aquasec.com/nvd/cve-2009-4487 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2010-01-13 20:30 修改: 2021-11-10 15:51 | 
                            
                            
                                | nginx | CVE-2013-0337 | 低危 | 1.17.10-1~buster |  | The default configuration of nginx, possibly 1.3.13 and earlier, uses  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-0337 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2013-10-27 00:55 修改: 2021-11-10 15:57 | 
                            
                            
                                | nginx | CVE-2023-44487 | 低危 | 1.17.10-1~buster |  | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487 镜像层: sha256:4e810b44348c2fa6e30aaa6d3ae5036072f2526d8567f4f8b41e264d6b59977a 发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40 | 
                            
                            
                                | libbinutils | CVE-2022-48063 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libbinutils | CVE-2022-48064 | 低危 | 2.31.1-16 |  | binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56 | 
                            
                            
                                | libseccomp2 | CVE-2019-9893 | 低危 | 2.3.3-4 |  | libseccomp: incorrect generation of syscall filters in libseccomp 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9893 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-03-21 16:01 修改: 2020-08-24 17:37 | 
                            
                            
                                | libsepol1 | CVE-2021-36084 | 低危 | 2.8-1 |  | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36085 | 低危 | 2.8-1 |  | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | openssh-client | CVE-2007-2243 | 低危 | 1:7.9p1-10+deb10u2 |  | OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2243 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2007-04-25 16:19 修改: 2017-07-29 01:31 | 
                            
                            
                                | openssh-client | CVE-2007-2768 | 低危 | 1:7.9p1-10+deb10u2 |  | OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2768 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2007-05-21 20:30 修改: 2021-04-01 15:32 | 
                            
                            
                                | openssh-client | CVE-2008-3234 | 低危 | 1:7.9p1-10+deb10u2 |  | sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3234 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-07-18 16:41 修改: 2017-09-29 01:31 | 
                            
                            
                                | openssh-client | CVE-2016-20012 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: Public key information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20012 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2021-09-15 20:15 修改: 2024-08-06 04:16 | 
                            
                            
                                | openssh-client | CVE-2018-15919 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: User enumeration via malformed packets in authentication requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15919 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2018-08-28 08:29 修改: 2019-03-07 16:29 | 
                            
                            
                                | openssh-client | CVE-2019-16905 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: an integer overflow in the private key parsing code for the XMSS key type 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16905 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-10-09 20:15 修改: 2023-03-01 01:56 | 
                            
                            
                                | openssh-client | CVE-2019-6110 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6110 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-01-31 18:29 修改: 2023-02-23 23:29 | 
                            
                            
                                | openssh-client | CVE-2020-12062 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: scp can send duplicate responses to the server upon a utimes system call failure leading to overwrite of arbitrary files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12062 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-06-01 16:15 修改: 2024-08-04 12:15 | 
                            
                            
                                | openssh-client | CVE-2020-14145 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: Observable discrepancy leading to an information leak in the algorithm negotiation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14145 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-06-29 18:15 修改: 2022-04-28 19:34 | 
                            
                            
                                | openssh-client | CVE-2020-15778 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: scp allows command injection when using backtick characters in the destination argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15778 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-07-24 14:15 修改: 2024-08-04 14:15 | 
                            
                            
                                | openssh-client | CVE-2021-36368 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: possible bypass of fido 2 devices and ssh-askpass 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36368 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-03-13 00:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | openssh-client | CVE-2023-51767 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: authentication bypass via row hammer attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51767 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-12-24 07:15 修改: 2024-02-27 15:51 | 
                            
                            
                                | openssh-client | CVE-2024-39894 | 低危 | 1:7.9p1-10+deb10u2 |  | openssh: Logic error in ObscureKeystrokeTiming 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39894 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-07-02 18:15 修改: 2024-09-11 16:15 | 
                            
                            
                                | libsepol1 | CVE-2021-36086 | 低危 | 2.8-1 |  | libsepol: use-after-free in cil_reset_classpermission() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | passwd | CVE-2007-5686 | 低危 | 1:4.5-1.1 |  | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45 | 
                            
                            
                                | passwd | CVE-2013-4235 | 低危 | 1:4.5-1.1 |  | shadow-utils: TOCTOU race conditions by copying and removing directory trees 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28 | 
                            
                            
                                | passwd | CVE-2018-7169 | 低危 | 1:4.5-1.1 |  | shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | passwd | CVE-2019-19882 | 低危 | 1:4.5-1.1 |  | shadow-utils: local users can obtain root access because setuid programs are misconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19882 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-12-18 16:15 修改: 2020-08-25 15:15 | 
                            
                            
                                | passwd | CVE-2023-29383 | 低危 | 1:4.5-1.1 |  | shadow: Improper input validation in shadow-utils package utility chfn 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05 | 
                            
                            
                                | passwd | CVE-2024-56433 | 低危 | 1:4.5-1.1 |  | shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15 | 
                            
                            
                                | passwd | TEMP-0628843-DBAD28 | 低危 | 1:4.5-1.1 |  | [more related to CVE-2005-4890] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | patch | CVE-2010-4651 | 低危 | 2.7.6-3+deb10u1 |  | patch: directory traversal flaw allows for arbitrary file creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4651 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2011-03-11 22:55 修改: 2016-11-28 19:07 | 
                            
                            
                                | patch | CVE-2018-6951 | 低危 | 2.7.6-3+deb10u1 |  | patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6951 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29 | 
                            
                            
                                | patch | CVE-2018-6952 | 低危 | 2.7.6-3+deb10u1 |  | patch: Double free of memory in pch.c:another_hunk() causes a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6952 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29 | 
                            
                            
                                | patch | CVE-2021-45261 | 低危 | 2.7.6-3+deb10u1 |  | patch: Invalid Pointer via another_hunk function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45261 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-12-22 18:15 修改: 2021-12-28 14:24 | 
                            
                            
                                | libsepol1 | CVE-2021-36087 | 低危 | 2.8-1 |  | libsepol: heap-based buffer overflow in ebitmap_match_any() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1-dev | CVE-2021-36084 | 低危 | 2.8-1 |  | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | perl | CVE-2011-4116 | 低危 | 5.28.1-6+deb10u1 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl | CVE-2023-31486 | 低危 | 5.28.1-6+deb10u1 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libsepol1-dev | CVE-2021-36085 | 低危 | 2.8-1 |  | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1-dev | CVE-2021-36086 | 低危 | 2.8-1 |  | libsepol: use-after-free in cil_reset_classpermission() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | perl-base | CVE-2011-4116 | 低危 | 5.28.1-6+deb10u1 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl-base | CVE-2023-31486 | 低危 | 5.28.1-6+deb10u1 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libsepol1-dev | CVE-2021-36087 | 低危 | 2.8-1 |  | libsepol: heap-based buffer overflow in ebitmap_match_any() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libbinutils | CVE-2022-48065 | 低危 | 2.31.1-16 |  | binutils: memory leak in find_abstract_instance() in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36 | 
                            
                            
                                | perl-modules-5.28 | CVE-2011-4116 | 低危 | 5.28.1-6+deb10u1 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl-modules-5.28 | CVE-2023-31486 | 低危 | 5.28.1-6+deb10u1 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | procps | CVE-2023-4016 | 低危 | 2:3.3.15-2 |  | procps: ps buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19 | 
                            
                            
                                | python | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | python-minimal | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | python2 | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | python2-minimal | CVE-2008-4108 | 低危 | 2.7.16-1 |  | python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible) 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32 | 
                            
                            
                                | libbinutils | CVE-2023-1579 | 低危 | 2.31.1-16 |  | binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | libsmartcols1 | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libbinutils | CVE-2023-1972 | 低危 | 2.31.1-16 |  | binutils: Illegal memory access when accessing a zer0-lengthverdef table 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15 | 
                            
                            
                                | libbinutils | CVE-2023-25584 | 低危 | 2.31.1-16 |  | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | libbinutils | CVE-2023-25585 | 低危 | 2.31.1-16 |  | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libbinutils | CVE-2023-25586 | 低危 | 2.31.1-16 |  | binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libbinutils | CVE-2023-25588 | 低危 | 2.31.1-16 |  | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libbinutils | CVE-2024-53589 | 低危 | 2.31.1-16 |  | binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53589 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-05 20:15 修改: 2024-12-11 17:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20671 | 低危 | 2.31.1-16 |  | binutils: Integer overflow in load_specific_debug_section function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libsqlite3-0 | CVE-2019-19244 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19244 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2019-11-25 20:15 修改: 2022-04-15 16:12 | 
                            
                            
                                | libsqlite3-0 | CVE-2020-11656 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: use-after-free in the ALTER TABLE implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11656 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34 | 
                            
                            
                                | libsqlite3-0 | CVE-2021-36690 | 低危 | 3.27.2-3+deb10u1 |  | A segmentation fault can occur in the sqlite3.exe command-line compone ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36690 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2021-08-24 14:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2021-45346 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: crafted SQL query allows a malicious user to obtain sensitive information 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-02-14 19:15 修改: 2024-08-04 05:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2022-35737 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35737 镜像层: sha256:5a9a65095453efb15a9b378a3c1e7699e8004744ecd6dd519bdbabd0ca9d2efc 发布日期: 2022-08-03 06:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20673 | 低危 | 2.31.1-16 |  | libiberty: Integer overflow in demangle_template() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libblkid-dev | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-20712 | 低危 | 2.31.1-16 |  | libiberty: heap-based buffer over-read in d_expression_1 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-9138 | 低危 | 2.31.1-16 |  | binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15 | 
                            
                            
                                | libblkid1 | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2018-9996 | 低危 | 2.31.1-16 |  | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-1010180 | 低危 | 2.31.1-16 |  | gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39 | 
                            
                            
                                | libsqlite3-dev | CVE-2019-19244 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19244 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-11-25 20:15 修改: 2022-04-15 16:12 | 
                            
                            
                                | python2.7 | CVE-2013-7040 | 低危 | 2.7.16-2+deb10u1 |  | python: hash secret can be recovered remotely 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53 | 
                            
                            
                                | python2.7 | CVE-2017-17522 | 低危 | 2.7.16-2+deb10u1 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | python2.7 | CVE-2019-18348 | 低危 | 2.7.16-2+deb10u1 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | python2.7 | CVE-2019-9674 | 低危 | 2.7.16-2+deb10u1 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | python2.7 | CVE-2020-27619 | 低危 | 2.7.16-2+deb10u1 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | python2.7 | CVE-2021-28861 | 低危 | 2.7.16-2+deb10u1 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python2.7 | CVE-2024-5642 | 低危 | 2.7.16-2+deb10u1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libsqlite3-dev | CVE-2020-11656 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: use-after-free in the ALTER TABLE implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11656 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34 | 
                            
                            
                                | libsqlite3-dev | CVE-2021-36690 | 低危 | 3.27.2-3+deb10u1 |  | A segmentation fault can occur in the sqlite3.exe command-line compone ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36690 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-08-24 14:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libsqlite3-dev | CVE-2021-45346 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: crafted SQL query allows a malicious user to obtain sensitive information 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-14 19:15 修改: 2024-08-04 05:15 | 
                            
                            
                                | libsqlite3-dev | CVE-2022-35737 | 低危 | 3.27.2-3+deb10u1 |  | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35737 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-03 06:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-1010204 | 低危 | 2.31.1-16 |  | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-12972 | 低危 | 2.31.1-16 |  | binutils: out-of-bounds read in setup_group in bfd/elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-14250 | 低危 | 2.31.1-16 |  | binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-14444 | 低危 | 2.31.1-16 |  | binutils: integer overflow in function apply_relocation in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-17450 | 低危 | 2.31.1-16 |  | binutils: denial of service via crafted ELF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-17451 | 低危 | 2.31.1-16 |  | binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9070 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9071 | 低危 | 2.31.1-16 |  | binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9073 | 低危 | 2.31.1-16 |  | binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9074 | 低危 | 2.31.1-16 |  | binutils: out-of-bound read in function bfd_getl32 in libbfd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2005-0406 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | A design flaw in image processing software that modifies JPEG images m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-0406 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2005-02-14 05:00 修改: 2024-02-15 20:19 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2008-3134 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | GraphicsMagick/ImageMagick: multiple crash or DoS issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3134 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2008-07-10 23:41 修改: 2017-08-08 01:31 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2016-8678 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Heap-buffer overflow in IsPixelMonochrome 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8678 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-02-15 21:59 修改: 2017-02-22 19:12 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2017-11754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2017-11755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-07-30 18:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2017-7275 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for  CVE-2016-8866) 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7275 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-03-27 18:59 修改: 2017-03-30 01:59 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2018-15607 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: CPU Exhaustion via crafted input file 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15607 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2018-08-21 15:29 修改: 2019-06-25 15:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2019-13310 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13310 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-07-05 01:15 修改: 2023-03-02 15:55 | 
                            
                            
                                | python2.7-minimal | CVE-2013-7040 | 低危 | 2.7.16-2+deb10u1 |  | python: hash secret can be recovered remotely 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53 | 
                            
                            
                                | python2.7-minimal | CVE-2017-17522 | 低危 | 2.7.16-2+deb10u1 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | python2.7-minimal | CVE-2019-18348 | 低危 | 2.7.16-2+deb10u1 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | python2.7-minimal | CVE-2019-9674 | 低危 | 2.7.16-2+deb10u1 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | python2.7-minimal | CVE-2020-27619 | 低危 | 2.7.16-2+deb10u1 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | python2.7-minimal | CVE-2021-28861 | 低危 | 2.7.16-2+deb10u1 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python2.7-minimal | CVE-2024-5642 | 低危 | 2.7.16-2+deb10u1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2019-16709 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leak in coders/dps.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16709 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-09-23 12:15 修改: 2022-01-01 20:20 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25666 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type int and signed integer overflow in MagickCore/histogram.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25666 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-25675 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25675 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27560 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero in OptimizeLayerFrames function in MagickCore/layer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27560 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 14:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27751 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow in MagickCore/quantum-export.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27751 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27753 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in AcquireMagickMemory function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27753 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:36 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27754 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27755 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27755 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2021-06-02 19:24 | 
                            
                            
                                | libssl-dev | CVE-2024-2511 | 低危 | 1.1.1d-0+deb10u6 |  | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl-dev | CVE-2024-9143 | 低危 | 1.1.1d-0+deb10u6 |  | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27757 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27757 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27758 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long long' at coders/txt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27758 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-08 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27759 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'int' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27759 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27761 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/palm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27761 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27763 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/resize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27763 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27764 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27764 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-03 17:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27765 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27765 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27767 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27767 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27768 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27768 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-02-23 04:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27769 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'float' at MagickCore/quantize.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27769 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-14 20:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27771 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/pdf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27771 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 15:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | python3.7 | CVE-2017-17522 | 低危 | 3.7.3-2+deb10u3 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | python3.7 | CVE-2019-18348 | 低危 | 3.7.3-2+deb10u3 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | python3.7 | CVE-2019-9674 | 低危 | 3.7.3-2+deb10u3 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | python3.7 | CVE-2020-27619 | 低危 | 3.7.3-2+deb10u3 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | python3.7 | CVE-2021-28861 | 低危 | 3.7.3-2+deb10u3 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python3.7 | CVE-2024-4032 | 低危 | 3.7.3-2+deb10u3 |  | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3.7 | CVE-2024-5642 | 低危 | 3.7.3-2+deb10u3 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27772 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned int' at coders/bmp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27772 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27773 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: division by zero at MagickCore/gem-private.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27773 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 22:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27774 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: integer overflow at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27774 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27775 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27775 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2020-27776 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27776 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-04 21:15 修改: 2023-03-11 23:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-20311 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20311 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-05-11 23:15 修改: 2021-05-17 19:50 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-3574 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u2 | ImageMagick: memory leaks with convert command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-26 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2021-39212 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u5 | ImageMagick: possible read or write in postscript files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39212 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2021-09-13 18:15 修改: 2023-05-22 02:15 | 
                            
                            
                                | libmagickcore-6-arch-config | CVE-2023-34152 | 低危 | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34152 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-05-30 22:15 修改: 2024-12-02 14:34 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9075 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2019-9077 | 低危 | 2.31.1-16 |  | binutils: heap-based buffer overflow in function process_mips_specific in readelf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17 | 
                            
                            
                                | libssl1.1 | CVE-2024-2511 | 低危 | 1.1.1d-0+deb10u6 |  | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-9143 | 低危 | 1.1.1d-0+deb10u6 |  | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:4b0edb23340c111e75557748161eed3ca159584871569ce7ec9b659e1db201b4 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16590 | 低危 | 2.31.1-16 |  | binutils: double free vulnerability in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16591 | 低危 | 2.31.1-16 |  | binutils: invalid read in process_symbol_table could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libstdc++-8-dev | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16592 | 低危 | 2.31.1-16 |  | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16593 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libstdc++6 | CVE-2023-4039 | 低危 | 8.3.0-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16599 | 低危 | 2.31.1-16 |  | binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9797 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer over-read in l2cap_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9797 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | python3.7-minimal | CVE-2017-17522 | 低危 | 3.7.3-2+deb10u3 |  | python: Command injection in Lib/webbrowser.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | python3.7-minimal | CVE-2019-18348 | 低危 | 3.7.3-2+deb10u3 |  | python: CRLF injection via the host part of the url passed to urlopen() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | python3.7-minimal | CVE-2019-9674 | 低危 | 3.7.3-2+deb10u3 |  | python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40 | 
                            
                            
                                | python3.7-minimal | CVE-2020-27619 | 低危 | 3.7.3-2+deb10u3 |  | python: Unsafe use of eval() on data retrieved via HTTP in the test suite 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15 | 
                            
                            
                                | python3.7-minimal | CVE-2021-28861 | 低危 | 3.7.3-2+deb10u3 |  | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python3.7-minimal | CVE-2024-4032 | 低危 | 3.7.3-2+deb10u3 |  | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3.7-minimal | CVE-2024-5642 | 低危 | 3.7.3-2+deb10u3 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9798 | 低危 | 5.50-1.2~deb10u1 |  | bluez: use-after-free in conf_opt() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9798 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9799 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in pklg_read_hci() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9799 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:34 | 
                            
                            
                                | supervisor | CVE-2019-12105 | 低危 | 3.3.5-1 |  | In Supervisor through 4.0.2, an unauthenticated user can read log file ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12105 镜像层: sha256:5938cce5c992f0f6eeee6d2ac75f869548f350644b10416288b17c361e3bce62 发布日期: 2019-09-10 17:15 修改: 2024-08-04 23:15 | 
                            
                            
                                | sysvinit-utils | TEMP-0517018-A83CE6 | 低危 | 2.93-8 |  | [sysvinit: no-root option in expert installer exposes locally exploitable security flaw] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tar | CVE-2005-2541 | 低危 | 1.30+dfsg-6 |  | tar: does not properly warn the user when extracting setuid or setgid files 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2005-08-10 04:00 修改: 2023-11-07 01:57 | 
                            
                            
                                | tar | CVE-2019-9923 | 低危 | 1.30+dfsg-6 |  | tar: null-pointer dereference in pax_decode_header in sparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9923 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2019-03-22 08:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | tar | CVE-2021-20193 | 低危 | 1.30+dfsg-6 |  | tar: Memory leak in read_header() in list.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20193 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-03-26 17:15 修改: 2024-10-24 18:15 | 
                            
                            
                                | tar | CVE-2022-48303 | 低危 | 1.30+dfsg-6 |  | tar: heap buffer overflow at from_header() in list.c via specially crafted checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48303 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-01-30 04:15 修改: 2023-05-30 17:16 | 
                            
                            
                                | tar | CVE-2023-39804 | 低危 | 1.30+dfsg-6 | 1.30+dfsg-6+deb10u1 | tar: Incorrectly handled extension attributes in PAX archives can lead to a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2024-03-27 04:15 修改: 2024-11-12 19:35 | 
                            
                            
                                | tar | TEMP-0290435-0B57B5 | 低危 | 1.30+dfsg-6 |  | [tar's rmt command may have undesired side effects] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tcl8.6 | CVE-2021-35331 | 低危 | 8.6.9+dfsg-2 |  | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | tcl8.6-dev | CVE-2021-35331 | 低危 | 8.6.9+dfsg-2 |  | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9800 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in pin_code_reply_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9800 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9801 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in set_ext_ctrl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9801 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32 | 
                            
                            
                                | unzip | CVE-2021-4217 | 低危 | 6.0-23+deb10u2 |  | unzip: Null pointer dereference in Unicode strings code 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4217 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-08-24 16:15 修改: 2022-11-29 15:45 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9802 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer over-read in l2cap_packet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9802 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9803 | 低危 | 5.50-1.2~deb10u1 |  | bluez: out-of-bounds read in le_meta_ev_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9803 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:28 | 
                            
                            
                                | util-linux | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9804 | 低危 | 5.50-1.2~deb10u1 |  | bluez: buffer overflow in commands_dump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9804 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:29 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9917 | 低危 | 5.50-1.2~deb10u1 |  | bluez: Heap-based buffer overflow vulnerability in read_n() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9917 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-08 08:59 修改: 2019-12-19 17:46 | 
                            
                            
                                | uuid-dev | CVE-2022-0563 | 低危 | 2.33.1-0.1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libbluetooth-dev | CVE-2016-9918 | 低危 | 5.50-1.2~deb10u1 |  | bluez: Out of bounds stack read in packet_hexdump() 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9918 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2016-12-08 08:59 修改: 2019-04-12 13:29 | 
                            
                            
                                | libsystemd0 | CVE-2013-4392 | 低危 | 241-7~deb10u8 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | libsystemd0 | CVE-2019-20386 | 低危 | 241-7~deb10u8 |  | systemd: memory leak in button_open() in login/logind-button.c when udev events are received 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | libsystemd0 | CVE-2020-13529 | 低危 | 241-7~deb10u8 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-31437 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libsystemd0 | CVE-2023-31438 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-31439 | 低危 | 241-7~deb10u8 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libbluetooth-dev | CVE-2018-10910 | 低危 | 5.50-1.2~deb10u1 |  | bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10910 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2019-01-28 15:29 修改: 2023-02-13 04:51 | 
                            
                            
                                | libtasn1-6 | CVE-2018-1000654 | 低危 | 4.13-3 |  | libtasn1: Infinite loop in _asn1_expand_object_id(ptree) leads to memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000654 镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51 | 
                            
                            
                                | libbluetooth-dev | CVE-2023-51594 | 低危 | 5.50-1.2~deb10u1 |  | bluez: OBEX library out-of-bounds read information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51594 镜像层: sha256:515418ad7cad08309843c1321d57b9f07d0aa0c65d79e5b0c9c29fb88801f878 发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48 | 
                            
                            
                                | libopenexr-dev | CVE-2024-31047 | 未知 | 2.2.1-4.1+deb10u1 |  | An issue in Academy Software Foundation openexr v.3.2.3 and before all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31047 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-08 23:15 修改: 2024-08-01 13:50 | 
                            
                            
                                | libsvn1 | CVE-2024-46901 | 未知 | 1.10.4-1+deb10u2 |  | Insufficient validation of filenames against control characters in Apa ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46901 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-12-09 10:15 修改: 2024-12-09 10:15 | 
                            
                            
                                | libmagickcore-6.q16-6-extra | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libpq-dev | DLA-3189-1 | 未知 | 11.12-0+deb10u1 | 11.18-0+deb10u1 | postgresql-11 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libpq-dev | DLA-3316-1 | 未知 | 11.12-0+deb10u1 | 11.19-0+deb10u1 | postgresql-11 - security update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | imagemagick-6-common | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickcore-6-headers | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49034 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  s ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49034 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53164 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  n ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53164 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53165 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  s ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53165 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53182 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  R ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53182 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53184 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  u ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53184 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53185 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  s ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53185 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53216 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  n ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53216 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-53219 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  v ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53219 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56538 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  d ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56538 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56542 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  d ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56542 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 14:15 修改: 2024-12-27 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56570 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  o ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56570 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56574 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56574 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56577 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56577 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56581 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56581 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56601 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  n ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56601 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56608 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  d ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56608 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56612 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56612 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56619 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  n ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56619 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56624 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  i ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56624 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 15:15 修改: 2024-12-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56680 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  m ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56680 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56690 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56690 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56698 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  u ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56698 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56704 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  9 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56704 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-28 10:15 修改: 2024-12-28 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2024-56754 | 未知 | 4.19.194-3 |  | In the Linux kernel, the following vulnerability has been resolved:  c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56754 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-29 12:15 修改: 2024-12-29 12:15 | 
                            
                            
                                | libharfbuzz0b | CVE-2024-56732 | 未知 | 2.3.1-1 |  | HarfBuzz is a text shaping engine. Starting with 8.5.0 through 10.0.1, ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56732 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-12-27 20:15 修改: 2024-12-28 17:15 | 
                            
                            
                                | subversion | CVE-2024-46901 | 未知 | 1.10.4-1+deb10u2 |  | Insufficient validation of filenames against control characters in Apa ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46901 镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 2024-12-09 10:15 修改: 2024-12-09 10:15 | 
                            
                            
                                | mariadb-common | DLA-3114-2 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u2 | mariadb-10.3 - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | mariadb-common | DLA-3337-1 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.38-0+deb10u1 | mariadb-10.3 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickcore-6.q16-6 | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | debian-archive-keyring | DLA-3482-1 | 未知 | 2019.1+deb10u1 | 2019.1+deb10u2 | debian-archive-keyring - security update 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libexpat1-dev | DSA-5085-2 | 未知 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u4 | expat - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libbz2-1.0 | DLA-3112-1 | 未知 | 1.0.6-9.2~deb10u1 | 1.0.6-9.2~deb10u2 | bzip2 - bugfix update 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickwand-dev | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickwand-6.q16-6 | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickcore-6.q16-dev | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libbz2-dev | DLA-3112-1 | 未知 | 1.0.6-9.2~deb10u1 | 1.0.6-9.2~deb10u2 | bzip2 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3134-1 | 未知 | 2021a-0+deb10u1 | 2021a-0+deb10u7 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3161-1 | 未知 | 2021a-0+deb10u1 | 2021a-0+deb10u8 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3366-1 | 未知 | 2021a-0+deb10u1 | 2021a-0+deb10u10 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3412-1 | 未知 | 2021a-0+deb10u1 | 2021a-0+deb10u11 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3684-1 | 未知 | 2021a-0+deb10u1 | 2021a-0+deb10u12 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tzdata | DLA-3788-1 | 未知 | 2021a-0+deb10u1 | 2024a-0+deb10u1 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:afa3e488a0ee76983343f8aa759e4b7b898db65b715eb90abc81c181388374e3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | bzip2 | DLA-3112-1 | 未知 | 1.0.6-9.2~deb10u1 | 1.0.6-9.2~deb10u2 | bzip2 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libpq5 | DLA-3189-1 | 未知 | 11.12-0+deb10u1 | 11.18-0+deb10u1 | postgresql-11 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libpq5 | DLA-3316-1 | 未知 | 11.12-0+deb10u1 | 11.19-0+deb10u1 | postgresql-11 - security update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickcore-6-arch-config | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickwand-6-headers | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb-dev | DLA-3114-2 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u2 | mariadb-10.3 - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb-dev | DLA-3337-1 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.38-0+deb10u1 | mariadb-10.3 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickcore-dev | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | git | DLA-3239-2 | 未知 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u6 | git - regression update 漏洞详情:  镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb3 | DLA-3114-2 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u2 | mariadb-10.3 - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb3 | DLA-3337-1 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.38-0+deb10u1 | mariadb-10.3 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb-dev-compat | DLA-3114-2 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.36-0+deb10u2 | mariadb-10.3 - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmariadb-dev-compat | DLA-3337-1 | 未知 | 1:10.3.29-0+deb10u1 | 1:10.3.38-0+deb10u1 | mariadb-10.3 - bugfix update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libexpat1 | DSA-5085-2 | 未知 | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u4 | expat - regression update 漏洞详情:  镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | imagemagick | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | git-man | DLA-3239-2 | 未知 | 1:2.20.1-2+deb10u3 | 1:2.20.1-2+deb10u6 | git - regression update 漏洞详情:  镜像层: sha256:ad83f0aa5c0abe35b7711f226037a5557292d479c21635b3522e1e5a41e3ce23 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libopenexr23 | CVE-2024-31047 | 未知 | 2.2.1-4.1+deb10u1 |  | An issue in Academy Software Foundation openexr v.3.2.3 and before all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31047 镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 2024-04-08 23:15 修改: 2024-08-01 13:50 | 
                            
                            
                                | imagemagick-6.q16 | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libmagickwand-6.q16-dev | DLA-3357-2 | 未知 | 8:6.9.10.23+dfsg-2.1+deb10u1 | 8:6.9.10.23+dfsg-2.1+deb10u4 | imagemagick - regression update 漏洞详情:  镜像层: sha256:138b36d5a43a20d306eaf3797da44427d83f71eb55540035cfe79256137ba5d3 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 |