docker.io/oven/bun:debian linux/arm64

docker.io/oven/bun:debian - Trivy安全扫描结果 扫描时间: 2026-05-13 17:02 温馨提示: 这是一个 linux/arm64 系统架构镜像
全部漏洞信息
低危漏洞:62 中危漏洞:42 高危漏洞:6 严重漏洞:0

系统OS: debian 13.4 扫描引擎: Trivy 扫描时间: 2026-05-13 17:02

docker.io/oven/bun:debian (debian 13.4) (debian)
低危漏洞:62 中危漏洞:42 高危漏洞:6 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libcap2 CVE-2026-4878 高危 1:2.75-10+b8 libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4878

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-09 16:16 修改: 2026-05-07 22:16

libsystemd0 CVE-2026-29111 高危 257.9-1~deb13u1 systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29111

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-23 22:16 修改: 2026-04-15 16:44

libtinfo6 CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

libudev1 CVE-2026-29111 高危 257.9-1~deb13u1 systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29111

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-23 22:16 修改: 2026-04-15 16:44

ncurses-base CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

ncurses-bin CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

libc-bin CVE-2026-4438 中危 2.41-12+deb13u2 glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40

libc-bin CVE-2026-5435 中危 2.41-12+deb13u2 glibc: glibc: Out-of-bounds write via TSIG record processing

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38

libc-bin CVE-2026-5450 中危 2.41-12+deb13u2 glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc-bin CVE-2026-5928 中危 2.41-12+deb13u2 glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc-bin CVE-2026-6238 中危 2.41-12+deb13u2 glibc: glibc: Application crash or uninitialized memory read via crafted DNS response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6238

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-28 19:37 修改: 2026-05-04 17:57

libc6 CVE-2026-4046 中危 2.41-12+deb13u2 glibc: glibc: Denial of Service via iconv() function with specific character sets

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16

libc6 CVE-2026-4437 中危 2.41-12+deb13u2 glibc: glibc: Incorrect DNS response parsing via crafted DNS server response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41

libc6 CVE-2026-4438 中危 2.41-12+deb13u2 glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40

libc6 CVE-2026-5435 中危 2.41-12+deb13u2 glibc: glibc: Out-of-bounds write via TSIG record processing

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38

libc6 CVE-2026-5450 中危 2.41-12+deb13u2 glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc6 CVE-2026-5928 中危 2.41-12+deb13u2 glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc6 CVE-2026-6238 中危 2.41-12+deb13u2 glibc: glibc: Application crash or uninitialized memory read via crafted DNS response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6238

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-28 19:37 修改: 2026-05-04 17:57

bsdutils CVE-2026-27456 中危 1:2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

liblastlog2-2 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

liblastlog2-2 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

liblzma5 CVE-2026-34743 中危 5.8.1-1 xz: XZ Utils: Denial of Service via buffer overflow in index decoding

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34743

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-02 19:21 修改: 2026-04-15 17:33

libmount1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libmount1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libsmartcols1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libsmartcols1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

bsdutils CVE-2026-3184 中危 1:2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libsystemd0 CVE-2026-40225 中危 257.9-1~deb13u1 systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40225

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-04-27 19:00

libsystemd0 CVE-2026-40226 中危 257.9-1~deb13u1 systemd: systemd nspawn: Escape-to-host action via crafted config file

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40226

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-04-17 22:02

libsystemd0 CVE-2026-4105 中危 257.9-1~deb13u1 systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4105

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-13 19:55 修改: 2026-04-30 17:16

libblkid1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libblkid1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libudev1 CVE-2026-40225 中危 257.9-1~deb13u1 systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40225

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-04-27 19:00

libudev1 CVE-2026-40226 中危 257.9-1~deb13u1 systemd: systemd nspawn: Escape-to-host action via crafted config file

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40226

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-04-17 22:02

libudev1 CVE-2026-4105 中危 257.9-1~deb13u1 systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4105

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-13 19:55 修改: 2026-04-30 17:16

libuuid1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libuuid1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

login CVE-2026-27456 中危 1:4.16.0-2+really2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

login CVE-2026-3184 中危 1:4.16.0-2+really2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

mount CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

mount CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libc-bin CVE-2026-4046 中危 2.41-12+deb13u2 glibc: glibc: Denial of Service via iconv() function with specific character sets

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16

libc-bin CVE-2026-4437 中危 2.41-12+deb13u2 glibc: glibc: Incorrect DNS response parsing via crafted DNS server response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41

sed CVE-2026-5958 中危 4.9-2+b1 When sed is invoked with both -i (in-place edit) and --follow-symlinks ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5958

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-20 12:16 修改: 2026-04-20 19:05

tar CVE-2026-5704 中危 1.35+dfsg-3.1 tar: tar: Hidden file injection via crafted archives

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5704

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-06 16:16 修改: 2026-04-22 20:08

util-linux CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

util-linux CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

zlib1g CVE-2026-27171 中危 1:1.3.dfsg+really1.3.1-1+b1 zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27

libc-bin CVE-2019-1010023 低危 2.41-12+deb13u2 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libmount1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libmount1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2019-1010024 低危 2.41-12+deb13u2 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc-bin CVE-2019-1010025 低危 2.41-12+deb13u2 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libsmartcols1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libsmartcols1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libsqlite3-0 CVE-2021-45346 低危 3.46.1-7+deb13u1 sqlite: crafted SQL query allows a malicious user to obtain sensitive information

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-14 19:15 修改: 2024-11-21 06:32

libsqlite3-0 CVE-2025-70873 低危 3.46.1-7+deb13u1 sqlite: SQLite: Information Disclosure via Crafted ZIP File

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-70873

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-03-12 19:16 修改: 2026-04-16 21:15

libc-bin CVE-2019-9192 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-02-26 18:29 修改: 2024-11-21 04:51

libblkid1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libblkid1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

bsdutils CVE-2022-0563 低危 1:2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libsystemd0 CVE-2013-4392 低危 257.9-1~deb13u1 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2013-10-28 22:55 修改: 2026-04-29 01:13

libsystemd0 CVE-2023-31437 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15

libsystemd0 CVE-2023-31438 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libsystemd0 CVE-2023-31439 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libsystemd0 CVE-2026-40228 低危 257.9-1~deb13u1 systemd: systemd-journald: Unintended output to user terminals via logger command

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40228

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-05-05 02:16

bsdutils CVE-2025-14104 低危 1:2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libtinfo6 CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

coreutils CVE-2017-18018 低危 9.7-3 coreutils: race condition vulnerability in chown and chgrp

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2018-01-04 04:29 修改: 2025-06-09 16:15

coreutils CVE-2025-5278 低危 9.7-3 coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-05-27 21:15 修改: 2026-04-15 00:35

libapt-pkg7.0 CVE-2011-3374 低危 3.0.3 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-11-26 00:15 修改: 2024-11-21 01:30

libc6 CVE-2010-4756 低危 2.41-12+deb13u2 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2011-03-02 20:00 修改: 2026-04-29 01:13

libudev1 CVE-2013-4392 低危 257.9-1~deb13u1 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2013-10-28 22:55 修改: 2026-04-29 01:13

libudev1 CVE-2023-31437 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15

libudev1 CVE-2023-31438 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libudev1 CVE-2023-31439 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libudev1 CVE-2026-40228 低危 257.9-1~deb13u1 systemd: systemd-journald: Unintended output to user terminals via logger command

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40228

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2026-04-10 16:16 修改: 2026-05-05 02:16

libc6 CVE-2018-20796 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-02-26 02:29 修改: 2024-11-21 04:02

libc6 CVE-2019-1010022 低危 2.41-12+deb13u2 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libuuid1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libuuid1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc6 CVE-2019-1010023 低危 2.41-12+deb13u2 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc6 CVE-2019-1010024 低危 2.41-12+deb13u2 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

login CVE-2022-0563 低危 1:4.16.0-2+really2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

login CVE-2025-14104 低危 1:4.16.0-2+really2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

login.defs CVE-2007-5686 低危 1:4.17.4-2 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2007-10-28 17:08 修改: 2026-04-23 00:35

login.defs CVE-2024-56433 低危 1:4.17.4-2 shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2024-12-26 09:15 修改: 2026-04-15 00:35

login.defs TEMP-0628843-DBAD28 低危 1:4.17.4-2 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libc6 CVE-2019-1010025 低危 2.41-12+deb13u2 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc6 CVE-2019-9192 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-02-26 18:29 修改: 2024-11-21 04:51

mount CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

mount CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

apt CVE-2011-3374 低危 3.0.3 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-11-26 00:15 修改: 2024-11-21 01:30

ncurses-base CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

bash TEMP-0841856-B18BAF 低危 5.2.37-2+b8 [Privilege escalation possible to other user than root]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

ncurses-bin CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

passwd CVE-2007-5686 低危 1:4.17.4-2 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2007-10-28 17:08 修改: 2026-04-23 00:35

passwd CVE-2024-56433 低危 1:4.17.4-2 shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2024-12-26 09:15 修改: 2026-04-15 00:35

passwd TEMP-0628843-DBAD28 低危 1:4.17.4-2 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

perl-base CVE-2011-4116 低危 5.40.1-6 perl: File:: Temp insecure temporary file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2020-01-31 18:15 修改: 2025-08-04 19:04

libc-bin CVE-2010-4756 低危 2.41-12+deb13u2 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2011-03-02 20:00 修改: 2026-04-29 01:13

sysvinit-utils TEMP-0517018-A83CE6 低危 3.14-4 [sysvinit: no-root option in expert installer exposes locally exploitable security flaw]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

liblastlog2-2 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

tar CVE-2005-2541 低危 1.35+dfsg-3.1 tar: does not properly warn the user when extracting setuid or setgid files

漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2005-08-10 04:00 修改: 2026-04-16 00:27

tar TEMP-0290435-0B57B5 低危 1.35+dfsg-3.1 [tar's rmt command may have undesired side effects]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

liblastlog2-2 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2018-20796 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-02-26 02:29 修改: 2024-11-21 04:02

util-linux CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

util-linux CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2019-1010022 低危 2.41-12+deb13u2 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:1c8868ba9e0d404e2f5b1e5637d0c330bf563b5edd327668baa31afe3e3cc917

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17