| libksba8 | CVE-2022-3515 | 高危 | 1.3.5-2 | 1.3.5-2ubuntu0.18.04.1 | libksba: integer overflow may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libsasl2-2 | CVE-2022-24407 | 高危 | 2.1.27~101-g0780600+dfsg-3ubuntu2.3 | 2.1.27~101-g0780600+dfsg-3ubuntu2.4 | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libsasl2-modules-db | CVE-2022-24407 | 高危 | 2.1.27~101-g0780600+dfsg-3ubuntu2.3 | 2.1.27~101-g0780600+dfsg-3ubuntu2.4 | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libssl-dev | CVE-2023-0286 | 高危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-0286 | 高危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.11 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0286 | 高危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libudev1 | CVE-2021-33910 | 高危 | 237-3ubuntu10.44 | 237-3ubuntu10.49 | systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33910 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-20 19:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | linux-libc-dev | CVE-2020-27170 | 高危 | 4.15.0-136.140 | 4.15.0-140.144 | kernel: Speculation on pointer arithmetic against bpf_context pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27170 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-20 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | linux-libc-dev | CVE-2020-27171 | 高危 | 4.15.0-136.140 | 4.15.0-140.144 | kernel: Integer underflow when restricting speculative pointer arithmetic 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27171 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-20 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0920 | 高危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: Use After Free in unix_gc() which could result in a local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0920 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-15 19:15 修改: 2024-02-02 16:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-22555 | 高危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22555 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-07 12:15 修改: 2022-03-31 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-22600 | 高危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: double free in packet_set_ring() in net/packet/af_packet.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22600 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-26 14:15 修改: 2023-06-26 18:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-27365 | 高危 | 4.15.0-136.140 | 4.15.0-139.143 | kernel: heap buffer overflow in the iSCSI subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27365 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-07 05:15 修改: 2021-12-10 18:13 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29154 | 高危 | 4.15.0-136.140 | 4.15.0-142.146 | kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29154 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-08 21:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33909 | 高危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: size_t-to-int conversion vulnerability in the filesystem layer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33909 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-20 19:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3493 | 高危 | 4.15.0-136.140 | 4.15.0-142.146 | kernel: overlayfs file system caps privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3493 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-17 05:15 修改: 2023-07-07 19:10 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3600 | 高危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: eBPF 32-bit source register truncation on div/mod 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3600 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-01-08 19:15 修改: 2024-09-04 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3609 | 高危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: race condition in net/can/bcm.c leads to local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3609 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-03 19:15 修改: 2023-08-11 19:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3653 | 高危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: SVM nested virtualization issue in KVM (AVIC support) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3653 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-09-29 20:15 修改: 2023-05-16 10:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3656 | 高危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3656 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-04 19:15 修改: 2023-01-19 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4002 | 高危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: possible leak or coruption of data residing on hugetlbfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4002 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-03 22:15 修改: 2023-02-22 17:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0001 | 高危 | 4.15.0-136.140 | 4.15.0-171.180 | hw: cpu: intel: Branch History Injection (BHI) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0001 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-11 18:15 修改: 2024-04-09 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0002 | 高危 | 4.15.0-136.140 | 4.15.0-171.180 | hw: cpu: intel: Intra-Mode BTI 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0002 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-11 18:15 修改: 2022-08-19 12:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0492 | 高危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: cgroups v1 release_agent feature may allow privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0492 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-03 19:15 修改: 2023-12-07 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23960 | 高危 | 4.15.0-136.140 | 4.15.0-184.194 | hw: cpu: arm64: Spectre-BHB 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23960 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-13 00:15 修改: 2023-01-20 02:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2586 | 高危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2586 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-01-08 18:15 修改: 2024-06-27 01:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2588 | 高危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-01-08 18:15 修改: 2024-08-22 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29581 | 高危 | 4.15.0-136.140 | 4.15.0-180.189 | kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29581 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-17 17:15 修改: 2023-06-28 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-32250 | 高危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32250 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-02 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-34918 | 高危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: heap overflow in nft_set_elem_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34918 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-04 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42703 | 高危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: use-after-free related to leaf anon_vma double reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42703 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-09 23:15 修改: 2023-02-03 20:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42896 | 高危 | 4.15.0-136.140 | 4.15.0-202.213 | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42896 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-11-23 15:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-43945 | 高危 | 4.15.0-136.140 | 4.15.0-202.213 | kernel: nfsd buffer overflow by RPC message over TCP with garbage data 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43945 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-11-04 19:15 修改: 2023-03-08 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0266 | 高危 | 4.15.0-136.140 | 4.15.0-208.220 | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0266 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-30 14:15 修改: 2023-08-29 17:59 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0461 | 高危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net/ulp: use-after-free in listening ULP sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0461 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-02-28 15:15 修改: 2023-06-06 19:16 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1281 | 高危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1281 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-22 14:15 修改: 2023-06-26 16:57 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1380 | 高危 | 4.15.0-136.140 | 4.15.0-212.223 | Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-27 21:15 修改: 2023-12-08 20:45 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1829 | 高危 | 4.15.0-136.140 | 4.15.0-210.221 | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1829 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-12 12:15 修改: 2023-10-05 14:52 | 
                            
                            
                                | linux-libc-dev | CVE-2023-30456 | 高危 | 4.15.0-136.140 | 4.15.0-212.223 | kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30456 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-10 02:15 修改: 2023-07-26 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-31436 | 高危 | 4.15.0-136.140 | 4.15.0-212.223 | kernel: out-of-bounds write in qfq_change_class function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31436 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-28 02:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2023-32233 | 高危 | 4.15.0-136.140 | 4.15.0-212.223 | kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32233 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-05-08 20:15 修改: 2023-09-28 19:07 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3567 | 高危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-07-24 16:15 修改: 2024-09-13 19:15 | 
                            
                            
                                | openssl | CVE-2021-3449 | 高危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.9 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2021-3711 | 高危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.13 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-0778 | 高危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.15 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2023-0286 | 高危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | git-man | CVE-2022-39260 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.13 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-41903 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.15 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-22490 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.16 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-23946 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.16 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-25652 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2023-25815 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2023-29007 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | gnupg | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gnupg-l10n | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gnupg-utils | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gnupg2 | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-agent | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-wks-client | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-wks-server | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgconf | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgsm | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgv | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | krb5-locales | CVE-2018-20217 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: Reachable assertion in the KDC using S4U2Self requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | krb5-locales | CVE-2021-36222 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | krb5-locales | CVE-2021-37750 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | krb5-locales | CVE-2022-42898 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libbinutils | CVE-2022-38533 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.8 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libbinutils | CVE-2022-47673 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | libbinutils | CVE-2022-47696 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | libbinutils | CVE-2023-25584 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | libbinutils | CVE-2023-25585 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libbinutils | CVE-2023-25588 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libc-bin | CVE-2021-3999 | 中危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc-dev-bin | CVE-2021-3999 | 中危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc6 | CVE-2021-3999 | 中危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc6-dev | CVE-2021-3999 | 中危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libcom-err2 | CVE-2022-1304 | 中危 | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libcups2 | CVE-2022-26691 | 中危 | 2.2.7-1ubuntu2.8 | 2.2.7-1ubuntu2.9 | cups: authorization bypass when using "local" authorization 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26691 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-26 18:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | libcups2 | CVE-2023-32324 | 中危 | 2.2.7-1ubuntu2.8 | 2.2.7-1ubuntu2.10 | cups: heap buffer overflow may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32324 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-06-01 17:15 修改: 2023-06-08 14:32 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27782 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32206 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32208 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32221 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.21 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-43552 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.22 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-09 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-23916 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.23 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27535 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libcurl4 | CVE-2022-27782 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2022-32206 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-32208 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-32221 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.21 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-43552 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.22 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-09 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl4 | CVE-2023-23916 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.23 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27535 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42010 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42011 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42012 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdpkg-perl | CVE-2022-1664 | 中危 | 1.19.0.5ubuntu2.3 | 1.19.0.5ubuntu2.4 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | libexpat1 | CVE-2022-40674 | 中危 | 2.2.5-3ubuntu0.7 | 2.2.5-3ubuntu0.8 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libexpat1 | CVE-2022-43680 | 中危 | 2.2.5-3ubuntu0.7 | 2.2.5-3ubuntu0.8 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | libexpat1-dev | CVE-2022-40674 | 中危 | 2.2.5-3ubuntu0.7 | 2.2.5-3ubuntu0.8 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:7f7a4583fcde820f7663d73f13e0c248dded001045965fdd76ff77ef49300626 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libexpat1-dev | CVE-2022-43680 | 中危 | 2.2.5-3ubuntu0.7 | 2.2.5-3ubuntu0.8 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:7f7a4583fcde820f7663d73f13e0c248dded001045965fdd76ff77ef49300626 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | libext2fs2 | CVE-2022-1304 | 中危 | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libfreetype6 | CVE-2022-27404 | 中危 | 2.8.1-2ubuntu2.1 | 2.8.1-2ubuntu2.2 | FreeType: Buffer overflow in sfnt_init_face 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6 | CVE-2022-31782 | 中危 | 2.8.1-2ubuntu2.1 | 2.8.1-2ubuntu2.2 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31782 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2022-06-10 18:08 | 
                            
                            
                                | libgcrypt20 | CVE-2021-40528 | 中危 | 1.8.1-4ubuntu1.2 | 1.8.1-4ubuntu1.3 | libgcrypt: ElGamal implementation allows plaintext recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40528 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-06 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libgnutls30 | CVE-2022-2509 | 中危 | 3.5.18-1ubuntu1.4 | 3.5.18-1ubuntu1.6 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2018-20217 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: Reachable assertion in the KDC using S4U2Self requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2021-36222 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2021-37750 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2022-42898 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhogweed4 | CVE-2021-20305 | 中危 | 3.4-1 | 3.4-1ubuntu0.1 | nettle: Out of bounds memory access in signature verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20305 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-04-05 22:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libhogweed4 | CVE-2021-3580 | 中危 | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | nettle: Remote crash in RSA decryption via manipulated ciphertext 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libjpeg-turbo8 | CVE-2020-35538 | 中危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39 | 
                            
                            
                                | libjpeg-turbo8-dev | CVE-2020-35538 | 中危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39 | 
                            
                            
                                | libk5crypto3 | CVE-2018-20217 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: Reachable assertion in the KDC using S4U2Self requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libk5crypto3 | CVE-2021-36222 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libk5crypto3 | CVE-2021-37750 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libk5crypto3 | CVE-2022-42898 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-3 | CVE-2018-20217 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: Reachable assertion in the KDC using S4U2Self requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libkrb5-3 | CVE-2021-36222 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkrb5-3 | CVE-2021-37750 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkrb5-3 | CVE-2022-42898 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5support0 | CVE-2018-20217 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: Reachable assertion in the KDC using S4U2Self requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libkrb5support0 | CVE-2021-36222 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19 | 
                            
                            
                                | libkrb5support0 | CVE-2021-37750 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.4 | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libkrb5support0 | CVE-2022-42898 | 中危 | 1.16-2ubuntu0.2 | 1.16-2ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | binutils | CVE-2022-38533 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.8 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libksba8 | CVE-2022-47629 | 中危 | 1.3.5-2 | 1.3.5-2ubuntu0.18.04.2 | libksba: integer overflow to code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | libldap-2.4-2 | CVE-2022-29155 | 中危 | 2.4.45+dfsg-1ubuntu1.10 | 2.4.45+dfsg-1ubuntu1.11 | openldap: OpenLDAP SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-05-04 20:15 修改: 2022-10-06 15:56 | 
                            
                            
                                | libldap-common | CVE-2022-29155 | 中危 | 2.4.45+dfsg-1ubuntu1.10 | 2.4.45+dfsg-1ubuntu1.11 | openldap: OpenLDAP SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29155 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-05-04 20:15 修改: 2022-10-06 15:56 | 
                            
                            
                                | liblz4-1 | CVE-2021-3520 | 中危 | 0.0~r131-2ubuntu3 | 0.0~r131-2ubuntu3.1 | lz4: memory corruption due to an integer overflow bug caused by memmove argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3520 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-06-02 13:15 修改: 2024-06-06 20:25 | 
                            
                            
                                | liblzma5 | CVE-2022-1271 | 中危 | 5.2.2-1.3 | 5.2.2-1.3ubuntu0.1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | libmysqlclient20 | CVE-2022-21589 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.40-0ubuntu0.18.04.1 | mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21589 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-18 21:15 修改: 2022-11-04 16:52 | 
                            
                            
                                | libmysqlclient20 | CVE-2022-21592 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.40-0ubuntu0.18.04.1 | mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21592 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-18 21:15 修改: 2022-11-04 16:54 | 
                            
                            
                                | libmysqlclient20 | CVE-2022-21608 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.40-0ubuntu0.18.04.1 | mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21608 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-18 21:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | libmysqlclient20 | CVE-2022-21617 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.40-0ubuntu0.18.04.1 | mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21617 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-18 21:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | libmysqlclient20 | CVE-2023-21840 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.41-0ubuntu0.18.04.1 | mysql: Server: PS unspecified vulnerability (CPU Jan 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-21840 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-18 00:15 修改: 2023-01-24 19:25 | 
                            
                            
                                | libmysqlclient20 | CVE-2023-21912 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.42-0ubuntu0.18.04.1 | mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-21912 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-18 20:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | libmysqlclient20 | CVE-2023-21963 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.41-0ubuntu0.18.04.1 | mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-21963 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-18 20:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | libmysqlclient20 | CVE-2023-21980 | 中危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.42-0ubuntu0.18.04.1 | mysql: Client programs unspecified vulnerability (CPU Apr 2023) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-21980 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-18 20:15 修改: 2024-09-16 15:35 | 
                            
                            
                                | libncurses5 | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncursesw5 | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libnettle6 | CVE-2021-20305 | 中危 | 3.4-1 | 3.4-1ubuntu0.1 | nettle: Out of bounds memory access in signature verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20305 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-04-05 22:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | libnettle6 | CVE-2021-3580 | 中危 | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | nettle: Remote crash in RSA decryption via manipulated ciphertext 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15 | 
                            
                            
                                | libperl5.26 | CVE-2020-16156 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.6 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libperl5.26 | CVE-2023-31484 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.7 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | libpixman-1-0 | CVE-2022-44638 | 中危 | 0.34.0-2 | 0.34.0-2ubuntu0.1 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44638 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-03 06:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython2.7 | CVE-2022-45061 | 中危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.10 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython2.7-minimal | CVE-2022-45061 | 中危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.10 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2022-45061 | 中危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.10 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.6 | CVE-2022-37454 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.10 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.6 | CVE-2022-45061 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.9 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.6 | CVE-2023-24329 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.13 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.6-minimal | CVE-2022-37454 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.10 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.6-minimal | CVE-2022-45061 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.9 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.6-minimal | CVE-2023-24329 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.13 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.6-stdlib | CVE-2022-37454 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.10 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.6-stdlib | CVE-2022-45061 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.9 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.6-stdlib | CVE-2023-24329 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.13 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libroken18-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libroken18-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | binutils | CVE-2022-47673 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils | CVE-2022-47696 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | libsqlite3-0 | CVE-2020-35525 | 中危 | 3.22.0-1ubuntu0.4 | 3.22.0-1ubuntu0.6 | sqlite: Null pointer derreference in src/select.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35525 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-09-01 18:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2022-35737 | 中危 | 3.22.0-1ubuntu0.4 | 3.22.0-1ubuntu0.7 | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35737 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-08-03 06:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libss2 | CVE-2022-1304 | 中危 | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | binutils | CVE-2023-25584 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | libssl-dev | CVE-2022-2068 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.19 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libssl-dev | CVE-2022-2097 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.20 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2022-4304 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2022-4450 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0215 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2023-2650 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.23 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | binutils | CVE-2023-25585 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libssl1.0.0 | CVE-2022-2068 | 中危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.10 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-0215 | 中危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.11 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-2650 | 中危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.13 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | binutils | CVE-2023-25588 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | libssl1.1 | CVE-2022-2068 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.19 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libssl1.1 | CVE-2022-2097 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.20 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4304 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4450 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0215 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-2650 | 中危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.23 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libtiff5 | CVE-2022-0865 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: reachable assertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0865 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0891 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: heap buffer overflow in extractImageSection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0891 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0907 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.6 | tiff: NULL Pointer Dereference in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0907 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0908 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.6 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0908 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0909 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.6 | tiff: Divide By Zero error in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0909 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0924 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.6 | libtiff: Out-of-bounds Read error in tiffcp 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0924 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-1056 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35 | 
                            
                            
                                | libtiff5 | CVE-2022-1355 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: stack-buffer-overflow in tiffcp.c in main() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1355 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:52 | 
                            
                            
                                | libtiff5 | CVE-2022-34266 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | Use of Uninitialized Resource 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34266 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-19 20:15 修改: 2022-09-23 15:19 | 
                            
                            
                                | libtiff5 | CVE-2022-34526 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34526 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-29 23:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libtiff5 | CVE-2022-3570 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: heap Buffer overflows in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3570 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:02 | 
                            
                            
                                | libtiff5 | CVE-2022-3598 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3598 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:05 | 
                            
                            
                                | libtiff5 | CVE-2022-3599 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3599 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:06 | 
                            
                            
                                | libtiff5 | CVE-2022-3970 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.9 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3970 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-13 08:15 修改: 2023-11-17 19:04 | 
                            
                            
                                | libtiff5 | CVE-2022-4645 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | libtiff5 | CVE-2023-0795 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0795 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0796 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0796 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0797 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0797 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0798 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0798 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0799 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0799 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0800 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0801 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0802 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0803 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0804 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01 | 
                            
                            
                                | libtiff5 | CVE-2023-30774 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30774 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-19 15:15 修改: 2024-01-09 02:51 | 
                            
                            
                                | libtiff5 | CVE-2023-30775 | 中危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | libtinfo5 | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | binutils-common | CVE-2022-38533 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.8 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libudev1 | CVE-2022-2526 | 中危 | 237-3ubuntu10.44 | 237-3ubuntu10.56 | systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2526 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-09-09 15:15 修改: 2023-01-20 03:17 | 
                            
                            
                                | libudev1 | CVE-2022-3821 | 中危 | 237-3ubuntu10.44 | 237-3ubuntu10.57 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libwebp6 | CVE-2023-1999 | 中危 | 0.6.1-2ubuntu0.18.04.1 | 0.6.1-2ubuntu0.18.04.2 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2018-16860 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: S4U2Self with unkeyed checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16860 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-07-31 15:15 修改: 2019-08-14 12:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2021-44758 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-3116 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | CVE-2022-3116 affecting package heimdal for versions less than 7.7.1-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3116 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-27 22:15 修改: 2023-05-05 20:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-3437 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-01-12 15:15 修改: 2024-04-22 16:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-41916 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.2 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-42898 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-44640 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.3 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libwind0-heimdal | CVE-2022-45142 | 中危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.4 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libxml2 | CVE-2016-3709 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.7 | libxml2: Incorrect server side include parsing can lead to XSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39 | 
                            
                            
                                | libxml2 | CVE-2022-29824 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.6 | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2 | CVE-2022-40303 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.8 | libxml2: integer overflows with XML_PARSE_HUGE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2022-40304 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.8 | libxml2: dict corruption caused by entity reference cycles 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2023-28484 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.9 | libxml2: NULL dereference in xmlSchemaFixupComplexType 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28484 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-24 21:15 修改: 2024-02-01 17:15 | 
                            
                            
                                | libxml2 | CVE-2023-29469 | 中危 | 2.9.4+dfsg1-6.1ubuntu1.5 | 2.9.4+dfsg1-6.1ubuntu1.9 | libxml2: Hashing of empty dict strings isn't deterministic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29469 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-24 21:15 修改: 2023-06-01 14:15 | 
                            
                            
                                | libxpm4 | CVE-2022-44617 | 中危 | 1:3.5.12-1 | 1:3.5.12-1ubuntu0.18.04.2 | libXpm: Runaway loop on width of 0 and enormous height 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44617 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-06 23:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libxpm4 | CVE-2022-46285 | 中危 | 1:3.5.12-1 | 1:3.5.12-1ubuntu0.18.04.2 | libXpm: Infinite loop on unclosed comments 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46285 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libxpm4 | CVE-2022-4883 | 中危 | 1:3.5.12-1 | 1:3.5.12-1ubuntu0.18.04.2 | libXpm: compression commands depend on $PATH 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4883 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libzstd1 | CVE-2021-24031 | 中危 | 1.3.3+dfsg-2ubuntu1.1 | 1.3.3+dfsg-2ubuntu1.2 | zstd: adds read permissions to files while being compressed or uncompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-24031 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-03-04 21:15 修改: 2021-04-14 15:28 | 
                            
                            
                                | libzstd1 | CVE-2021-24032 | 中危 | 1.3.3+dfsg-2ubuntu1.1 | 1.3.3+dfsg-2ubuntu1.2 | zstd: Race condition allows attacker to access world-readable destination file 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-24032 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-03-04 21:15 修改: 2021-04-28 20:04 | 
                            
                            
                                | binutils-common | CVE-2022-47673 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-common | CVE-2022-47696 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | binutils-common | CVE-2023-25584 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | binutils-common | CVE-2023-25585 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-common | CVE-2023-25588 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-38533 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.8 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47673 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2022-47696 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: segmentation fault in compare_symbols() in objdump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25584 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25585 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `file_table` of `struct module *module` is uninitialized 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2023-25588 | 中危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.9 | binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab` 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09 | 
                            
                            
                                | ca-certificates | CVE-2022-23491 | 中危 | 20210119~18.04.1 | 20211016ubuntu0.18.04.1 | python-certifi: untrusted root certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23491 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-12-07 22:15 修改: 2023-03-24 18:12 | 
                            
                            
                                | curl | CVE-2022-27782 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | curl | CVE-2022-32206 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-32208 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.19 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-32221 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.21 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-43552 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.22 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-09 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | curl | CVE-2023-23916 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.23 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | curl | CVE-2023-27535 | 中危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | dbus | CVE-2022-42010 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | dbus | CVE-2022-42011 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | dbus | CVE-2022-42012 | 中危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.4 | dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | dirmngr | CVE-2022-34903 | 中危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.6 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | dpkg | CVE-2022-1664 | 中危 | 1.19.0.5ubuntu2.3 | 1.19.0.5ubuntu2.4 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | dpkg-dev | CVE-2022-1664 | 中危 | 1.19.0.5ubuntu2.3 | 1.19.0.5ubuntu2.4 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19 | 
                            
                            
                                | e2fsprogs | CVE-2022-1304 | 中危 | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | git | CVE-2022-23521 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.15 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2022-29187 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.12 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | git | CVE-2022-39253 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.13 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | git | CVE-2022-39260 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.13 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2022-41903 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.15 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2023-22490 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.16 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2023-23946 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.16 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2023-25652 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2023-25815 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | linux-libc-dev | CVE-2018-25020 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: long jump over an instruction sequence can lead to overflow in the BPF subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25020 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-08 05:15 修改: 2022-04-05 20:55 | 
                            
                            
                                | linux-libc-dev | CVE-2019-25162 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: use after free in i2c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25162 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:38 | 
                            
                            
                                | linux-libc-dev | CVE-2020-24586 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Fragmentation cache not cleared on reconnection 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24586 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-11 20:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-24587 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Reassembling fragments encrypted under different keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24587 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-11 20:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-24588 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: wifi frame payload being parsed incorrectly as an L2 frame 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-11 20:15 修改: 2023-04-01 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-25670 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: refcount leak in llcp_sock_bind() 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25670 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-26 11:15 修改: 2023-02-12 23:40 | 
                            
                            
                                | linux-libc-dev | CVE-2020-25671 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: refcount leak in llcp_sock_connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25671 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-26 11:15 修改: 2023-02-12 23:40 | 
                            
                            
                                | linux-libc-dev | CVE-2020-25672 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: memory leak in llcp_sock_connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25672 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-25 20:15 修改: 2023-02-12 23:40 | 
                            
                            
                                | linux-libc-dev | CVE-2020-25673 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: non-blocking socket in llcp_sock_connect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25673 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-26 11:15 修改: 2023-02-12 23:40 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26139 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Forwarding EAPOL from unauthenticated wifi client 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26139 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-11 20:15 修改: 2022-09-30 03:03 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26147 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: reassembling mixed encrypted/plaintext fragments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26147 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-11 20:15 修改: 2022-07-12 17:14 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26555 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26555 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-24 18:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | linux-libc-dev | CVE-2020-26558 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | bluez: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26558 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-24 18:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36158 | 中危 | 4.15.0-136.140 | 4.15.0-137.141 | kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36158 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-05 05:15 修改: 2023-11-07 03:22 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36322 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36322 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-14 06:15 修改: 2022-10-14 18:56 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36385 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36385 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-06-07 12:15 修改: 2022-10-25 16:42 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36516 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: off-path attacker may inject data or terminate victim's TCP session 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36516 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-26 04:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36694 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: netfilter: use-after-free in the packet processing context 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36694 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-05-21 23:15 修改: 2023-06-22 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2020-36777 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36777 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:32 | 
                            
                            
                                | linux-libc-dev | CVE-2020-3702 | 中危 | 4.15.0-136.140 | 4.15.0-161.169 | kernel: ath9k: information disclosure via specifically timed and handcrafted traffic 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3702 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-09-08 10:15 修改: 2022-01-06 14:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0129 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Improper access control in BlueZ may allow information disclosure vulnerability. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0129 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-06-09 20:15 修改: 2022-10-29 02:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0512 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0512 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-06-21 17:15 修改: 2021-06-23 18:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0937 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0937 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-0941 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0941 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-10-25 14:15 修改: 2021-10-26 14:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20320 | 中危 | 4.15.0-136.140 | 4.15.0-158.166 | kernel: s390 eBPF JIT miscompilation issues fixes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20320 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-18 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20321 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20321 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-18 18:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20322 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20322 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-18 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-21781 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: arm: SIGPAGE information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21781 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-18 15:15 修改: 2023-02-03 14:31 | 
                            
                            
                                | linux-libc-dev | CVE-2021-22543 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22543 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-26 11:15 修改: 2024-05-29 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-23133 | 中危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: Race condition in sctp_destroy_sock list_del 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23133 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-22 18:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-23134 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: use-after-free in nfc sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23134 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-12 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26401 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26401 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-11 18:15 修改: 2022-03-18 20:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26932 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | An issue was discovered in the Linux kernel 3.2 through 5.10.16, as us ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26932 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-17 02:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-27363 | 中危 | 4.15.0-136.140 | 4.15.0-139.143 | kernel: iscsi: unrestricted access to sessions and handles 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27363 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-07 04:15 修改: 2022-05-23 16:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-27364 | 中危 | 4.15.0-136.140 | 4.15.0-139.143 | kernel: out-of-bounds read in libiscsi module 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27364 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-07 05:15 修改: 2021-12-08 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28038 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | An issue was discovered in the Linux kernel through 5.11.3, as used wi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28038 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-05 18:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28660 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: buffer overflow in rtw_wx_set_scan function in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28660 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-17 15:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28714 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | Guest can force Linux netback driver to hog large amounts of kernel me ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28714 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-06 18:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28715 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | Guest can force Linux netback driver to hog large amounts of kernel me ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28715 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-06 18:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28964 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: race condition in get_old_root function in fs/btrfs/ctree.c because of a lack of locking on an extent buffer before a cloning operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28964 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-22 09:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28971 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28971 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-22 17:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28972 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: Buffer overflow in hotplug/rpadlpar_sysfs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28972 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-22 17:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29155 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29155 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-20 16:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29264 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: DoS due to negative fragment size calculation in drivers/net/ethernet/freescale/gianfar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29264 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-26 22:15 修改: 2022-05-27 16:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29265 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: race conditions in usbip_sockfd_store function in drivers/usb/usbip/stub_dev.c can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29265 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-26 22:15 修改: 2022-05-27 16:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29650 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29650 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-30 21:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-30002 | 中危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30002 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-02 05:15 修改: 2022-05-16 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-31829 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31829 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-06 16:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-31916 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: out of bounds array access in drivers/md/dm-ioctl.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31916 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-06 17:15 修改: 2022-01-01 17:51 | 
                            
                            
                                | linux-libc-dev | CVE-2021-32399 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: race condition for removal of the HCI controller 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32399 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-10 22:15 修改: 2022-05-13 20:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33033 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33033 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-14 23:15 修改: 2021-06-09 18:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33034 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33034 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-14 23:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33098 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33098 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-11-17 20:15 修改: 2021-12-14 20:18 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3347 | 中危 | 4.15.0-136.140 | 4.15.0-141.145 | kernel: Use after free via PI futex state 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3347 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-29 17:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3348 | 中危 | 4.15.0-136.140 | 4.15.0-141.145 | kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3348 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-01 04:15 修改: 2022-04-26 16:17 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33655 | 中危 | 4.15.0-136.140 | 4.15.0-193.204 | kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33655 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-18 15:15 修改: 2022-10-29 02:52 | 
                            
                            
                                | linux-libc-dev | CVE-2021-33656 | 中危 | 4.15.0-136.140 | 4.15.0-192.203 | kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33656 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-18 15:15 修改: 2022-10-29 02:52 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3483 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: use-after-free in nosy driver in nosy_ioctl() in drivers/firewire/nosy.c when a device is added twice 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3483 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-17 12:15 修改: 2022-05-13 19:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3506 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: Out of bounds memory access bug in get_next_net_page() in fs/f2fs/node.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3506 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-19 22:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3564 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: double free in bluetooth subsystem when the HCI device initialization fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3564 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-06-08 12:15 修改: 2023-02-12 23:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3573 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: use-after-free in function hci_sock_bound_ioctl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3573 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-13 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3612 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3612 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-09 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3640 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: use-after-free vulnerability in function sco_sock_sendmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3640 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-03 23:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3655 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: missing size validations on inbound SCTP packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3655 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-05 21:15 修改: 2022-10-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3659 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3659 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-22 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3732 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3732 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 17:42 修改: 2022-12-13 19:50 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3743 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3743 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-04 16:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3752 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: possible use-after-free in bluetooth module 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3752 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-16 19:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3753 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: a race out-of-bound read in vt 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3753 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-16 19:15 修改: 2022-12-07 01:58 | 
                            
                            
                                | linux-libc-dev | CVE-2021-37576 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: powerpc: KVM guest OS users can cause host OS memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37576 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-26 22:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3759 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3759 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3760 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: nfc: Use-After-Free vulnerability of ndev->rf_conn_info object 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3760 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-16 19:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3764 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: DoS in ccp_run_aes_gcm_cmd() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3764 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-23 16:15 修改: 2022-08-25 02:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38160 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38160 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-07 04:15 修改: 2024-08-27 19:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38198 | 中危 | 4.15.0-136.140 | 4.15.0-161.169 | kernel: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38198 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38199 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: incorrect connection-setup ordering allows operators of remote NFSv4 servers to cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38199 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-08 20:15 修改: 2021-12-21 12:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38208 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: NULL pointer dereference in net/nfc/llcp_sock.c by making a getsockname call after a certain type of failure of a bind call 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38208 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-08 20:15 修改: 2021-09-21 18:23 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3923 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: stack information leak in infiniband RDMA 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3923 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39633 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | In gre_handle_offloads of ip_gre.c, there is a possible page fault due ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39633 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-14 20:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39648 | 中危 | 4.15.0-136.140 | 4.15.0-137.141 | kernel: possible disclosure of memory due to a race condition in gadget_dev_desc_UDC_show() of configfs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39648 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-15 19:15 修改: 2022-07-12 17:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39656 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | In __configfs_open_file of file.c, there is a possible use-after-free  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39656 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-15 19:15 修改: 2021-12-20 22:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39657 | 中危 | 4.15.0-136.140 | 4.15.0-141.145 | In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39657 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-15 19:15 修改: 2021-12-20 22:17 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39685 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: USB gadget buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39685 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-16 15:15 修改: 2022-03-23 16:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39698 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: use-after-free in the file polling implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39698 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-16 15:15 修改: 2022-03-23 17:21 | 
                            
                            
                                | linux-libc-dev | CVE-2021-39711 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: out-of-bounds read due to Incorrect size value in bpf_prog_test_run_skb() of test_run.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39711 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-16 15:15 修改: 2022-03-23 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4037 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: security regression for CVE-2018-13405 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4037 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2022-12-08 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-40490 | 中危 | 4.15.0-136.140 | 4.15.0-161.169 | kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40490 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-09-03 01:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4083 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: fget: check that the fd still exists after getting a ref to it 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4083 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-18 17:15 修改: 2023-10-06 18:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4149 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: Improper lock operation in btrfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4149 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-23 20:15 修改: 2023-02-01 15:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4155 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4155 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2022-08-29 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4157 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: Buffer overwrite in decode_nfs_fh function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4157 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4159 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: another kernel ptr leak vulnerability via BPF in coerce_reg_to_size 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4159 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2022-10-06 15:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4197 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: cgroup: Use open-time creds and namespace for migration perm checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4197 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-23 20:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4202 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: Race condition in nci_request() leads to use after free while the device is getting removed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4202 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4203 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4203 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42252 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: memory overwrite in the kernel with potential privileges execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42252 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-10-11 19:15 修改: 2021-12-03 03:07 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42739 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: Heap buffer overflow in firedtv driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42739 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-10-20 07:15 修改: 2024-03-24 23:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43975 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43975 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-11-17 17:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4439 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4439 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-09-18 16:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-4442 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: tcp: add sanity tests to TCP_QUEUE_SEQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4442 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-29 11:15 修改: 2024-09-12 16:58 | 
                            
                            
                                | linux-libc-dev | CVE-2021-44733 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: use-after-free in the TEE subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44733 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-22 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45095 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: refcount leak in pep_sock_accept() in net/phonet/pep.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45095 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-16 04:15 修改: 2022-04-06 13:56 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45469 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: out-of-bounds memory access in __f2fs_setxattr() in fs/f2fs/xattr.c when an inode has an invalid last xattr entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45469 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-23 19:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45485 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: information leak in the IPv6 implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45485 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-25 02:15 修改: 2023-02-24 15:07 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45486 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: information leak in the IPv4 implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45486 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-25 02:15 修改: 2023-02-24 14:45 | 
                            
                            
                                | linux-libc-dev | CVE-2021-45868 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45868 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-18 07:15 修改: 2023-02-04 00:00 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46904 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: null-ptr-deref during tty device unregistration 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46904 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-26 16:27 修改: 2024-04-17 19:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46905 | 中危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: NULL-deref on disconnect regression 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46905 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-26 16:27 修改: 2024-04-17 19:30 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46906 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: info leak in hid_submit_ctrl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46906 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:28 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46909 | 中危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: PCI interrupt mapping cause oops 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46909 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 07:15 修改: 2024-04-17 16:57 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46915 | 中危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: netfilter: divide error in nft_limit_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46915 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 07:15 修改: 2024-04-10 13:55 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46921 | 中危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: locking/qrwlock: Fix ordering in queued_write_lock_slowpath() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46921 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 13:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46924 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: NFC: st21nfca: Fix memory leak in device probe and remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46924 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46929 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: sctp: use call_rcu to free endpoint 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46929 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46932 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: Input: appletouch - initialize work before device registration 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46932 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:02 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46933 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46933 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:36 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46934 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: i2c: validate user data in compat ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46934 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46935 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: binder: fix async_free_space accounting for empty parcels 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46935 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:24 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46936 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: net: fix use-after-free in tw_timer_handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46936 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 10:15 修改: 2024-04-10 19:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46938 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46938 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:20 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46939 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: tracing: Restructure trace_clock_global() to never block 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46939 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46950 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: md/raid1: properly indicate failure when ending a failed write request 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46950 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-08-22 20:28 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46953 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46953 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-04-10 20:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46955 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: openvswitch: fix stack OOB read while fragmenting IPv4 packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46955 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46959 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: spi: Fix use-after-free with devm_spi_alloc_* 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46959 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46960 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: cifs: Return correct error code from smb2_get_enc_key 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46960 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46966 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: ACPI: custom_method: fix potential use-after-free issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46966 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46974 | 中危 | 4.15.0-136.140 | 4.15.0-147.151 | kernel: bpf: Fix masking negation logic upon negative dst register 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46974 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-27 19:04 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46985 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: ACPI: scan: Fix a memory leak in an error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46985 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46988 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: userfaultfd: release page in error path to avoid BUG_ON 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46988 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46990 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: powerpc/64s: Fix crashes when toggling entry flush barrier 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46990 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46992 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: netfilter: nftables: avoid overflows in nft_hash_buckets() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46992 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-46999 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: sctp: do asoc update earlier in sctp_sf_do_dupcook_a 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46999 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47006 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47006 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47010 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net: Only allow init netns to set default tcp cong to a restricted algo 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47010 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-08-07 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47013 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47013 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47054 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: bus: qcom: memory leak while put child node before return 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47054 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47055 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: mtd: require write permissions for locking and badblock ioctls 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47055 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47056 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: crypto: denial-of-service in ADF_STATUS_PF_RUNNING should be set after adf_dev_init 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47056 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47068 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net/nfc: fix use-after-free llcp_sock_bind/connect 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47068 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47073 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47073 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-01 22:15 修改: 2024-03-01 22:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47078 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: RDMA/rxe: Clear all QP fields if creation failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47078 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-01 22:15 修改: 2024-03-01 22:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47086 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: phonet/pep: refuse to enable an unbound pipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47086 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47103 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: inet: fully convert sk->sk_rx_dst to RCU rules 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47103 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47114 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: ocfs2: fix data corruption by fallocate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47114 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47117 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47117 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47118 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: pid: take a reference when initializing `cad_pid` 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47118 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47121 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: net: caif: fix memory leak in cfusbl_device_notify 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47121 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47122 | 中危 | 4.15.0-136.140 | 4.15.0-154.161 | kernel: net: caif: fix memory leak in caif_device_notify 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47122 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47142 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: drm/amdgpu: Fix a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47142 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47145 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: btrfs: do not BUG_ON in link_to_fixup_dir 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47145 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47146 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: mld: fix panic in mld_newpack() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47146 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47149 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net: fujitsu: fix potential null-ptr-deref 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47149 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47153 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: i2c: i801: Don't generate an interrupt on bus reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47153 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47159 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net: dsa: fix a crash if ->get_sset_count() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47159 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47161 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: spi: spi-fsl-dspi: Fix a resource leak in an error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47161 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47162 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: tipc: skb_linearize the head skb when reassembling msgs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47162 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47165 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: drm/meson: fix shutdown crash when component not probed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47165 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47166 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47166 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47168 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: NFS: fix an incorrect limit in filelayout_decode_layout() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47168 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47169 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47169 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47170 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: USB: usbfs: Don't WARN about excessively large memory allocations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47170 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47171 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: net: usb: fix memory leak in smsc75xx_bind 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47171 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-05-16 21:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47173 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: misc/uss720: fix memory leak in uss720_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47173 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-05-16 21:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47177 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: iommu/vt-d: Fix sysfs leak in alloc_iommu() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47177 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47180 | 中危 | 4.15.0-136.140 | 4.15.0-151.157 | kernel: NFC: nci: fix memory leak in nci_allocate_device 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47180 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-03-25 10:15 修改: 2024-03-25 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47181 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: usb: musb: tusb6010: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47181 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47184 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: i40e: Fix NULL ptr dereference on VSI filter sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47184 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47185 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47185 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47189 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: btrfs: fix memory ordering between normal and ordered work functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47189 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47194 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47194 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-19 19:19 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47203 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47203 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47206 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: usb: host: ohci-tmio: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47206 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47207 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: ALSA: gus: fix null pointer dereference on pointer block 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47207 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47216 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: scsi: advansys: Fix kernel pointer leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47216 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47222 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: bridge: fix vlan tunnel dst refcnt when egressing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47222 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47223 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: bridge: fix vlan tunnel dst null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47223 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47229 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: PCI: aardvark: Fix kernel panic during PIO transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47229 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47231 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: can: mcba_usb: fix memory leak in mcba_usb 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47231 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47235 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: ethernet: fix potential use-after-free in ec_bhf_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47235 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47236 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: cdc_eem: fix tx fixup skb leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47236 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47237 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: hamradio: fix memory leak in mkiss_close 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47237 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47238 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: ipv4: fix memory leak in ip_mc_add1_src 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47238 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47239 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: usb: fix possible use-after-free in smsc75xx_bind 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47239 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47240 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: qrtr: fix OOB Read in qrtr_endpoint_post 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47240 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47245 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: netfilter: synproxy: Fix out of bounds when parsing TCP options 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47245 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47248 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: udp: fix race between close() and udp_abort() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47248 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47249 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: rds: fix memory leak in rds_recvmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47249 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47250 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: ipv4: fix memory leak in netlbl_cipsov4_add_std 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47250 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47252 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: batman-adv: Avoid WARN_ON timing related checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47252 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47254 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: gfs2: Fix use-after-free in gfs2_glock_shrink_scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47254 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47256 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: mm/memory-failure: make sure wait for page writeback in memory_failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47256 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47257 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: net: ieee802154: fix null deref in parse dev addr 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47257 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47258 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: scsi: core: Fix error handling of scsi_host_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47258 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47259 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: NFS: Fix use-after-free in nfs4_init_client() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47259 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47260 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: NFS: Fix a potential NULL dereference in nfs_get_client() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47260 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47267 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: usb: fix various gadget panics on 10gbps cabling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47267 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47269 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: usb: dwc3: ep0: fix NULL pointer exception 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47269 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47270 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: usb: fix various gadgets null ptr deref on 10gbps cabling. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47270 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47274 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: tracing: Correct the length check which causes memory corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47274 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47276 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: ftrace: Do not blindly read the ip address in ftrace_bug() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47276 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47277 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: kvm: avoid speculation-based attacks from out-of-range memslot accesses 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47277 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47280 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: drm: Fix use-after-free read in drm_getunique() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47280 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47284 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: isdn: mISDN: netjet: Fix crash in nj_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47284 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47288 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47288 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47294 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: netrom: Decrease sock refcount when sock timers expire 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47294 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47297 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: net: fix uninit-value in caif_seqpkt_sendmsg 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47297 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47301 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: igb: Fix use-after-free error during reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47301 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47305 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: dma-buf/sync_file: Don't leak fences on merge failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47305 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47308 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: scsi: libfc: Fix array index out of bound exception 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47308 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47309 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: net: validate lwtstate->data before returning from skb_tunnel_info() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47309 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47310 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: net: ti: fix UAF in tlan_remove_one 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47310 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47311 | 中危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: net: qcom/emac: fix UAF in emac_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47311 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47314 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: memory: fsl_ifc: fix leak of private memory on probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47314 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47315 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: memory: fsl_ifc: fix leak of IO mapping on probe failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47315 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47319 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: virtio-blk: Fix memory leak among suspend/resume procedure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47319 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47320 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: nfs: fix acl memory leak of posix_acl_create() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47320 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47321 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47321 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47323 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47323 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47324 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: watchdog: Fix possible use-after-free in wdt_startup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47324 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47330 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47330 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47334 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: misc/libmasm/module: Fix two use after free in ibmasm_init_one 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47334 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47336 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: smackfs: restrict bytes count in smk_set_cipso() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47336 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47340 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: jfs: fix GPF in diFree 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47340 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47343 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: dm btree remove: assign new_root only when removal succeeds 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47343 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47344 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: media: zr364xx: fix memory leak in zr364xx_start_readpipe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47344 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47345 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: RDMA/cma: Fix rdma_resolve_route() memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47345 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47346 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47346 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47347 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: wl1251: Fix possible buffer overflow in wl1251_cmd_scan 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47347 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47353 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: udf: Fix NULL pointer dereference in udf_symlink function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47353 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47355 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: atm: nicstar: Fix possible use-after-free in nicstar_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47355 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47356 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: mISDN: fix possible use-after-free in HFC_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47356 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47357 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: atm: iphase: fix possible use-after-free in ia_module_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47357 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47358 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: staging: greybus: uart: fix tty use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47358 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47361 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: mcb: fix error handling in mcb_alloc_bus() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47361 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47372 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: net: macb: fix use after free on rmmod 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47372 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47373 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: irqchip/gic-v3-its: Fix potential VPE leak on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47373 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47375 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47375 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47383 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: tty: Fix out-of-bound vmalloc access in imageblit 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47383 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47387 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47387 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47388 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: mac80211: fix use-after-free in CCMP/GCMP RX 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47388 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47395 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47395 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47397 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47397 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47401 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: ipack: ipoctal: fix stack information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47401 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47403 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: ipack: ipoctal: fix module reference leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47403 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47404 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47404 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47405 | 中危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: HID: usbhid: free raw_report buffers in usbhid_stop 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47405 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47409 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: usb: dwc2: check return value after calling platform_get_resource() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47409 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47416 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: phy: mdio: fix memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47416 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47418 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: net_sched: fix NULL deref in fifo_set_limit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47418 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47423 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: drm/nouveau/debugfs: fix file release memory leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47423 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47424 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: i40e: Fix freeing of uninitialized misc IRQ vector 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47424 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47425 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: i2c: acpi: fix resource leak in reconfiguration device addition 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47425 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47434 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: xhci: Fix command ring pointer corruption while aborting a command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47434 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47435 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: dm: fix mempool NULL pointer race when completing IO 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47435 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47436 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: usb: musb: dsps: Fix the probe error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47436 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47442 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47442 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47443 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47443 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47445 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: drm/msm: Fix null pointer dereference on pointer edp 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47445 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47456 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: can: peak_pci: peak_pci_remove(): fix UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47456 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-07-03 01:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47458 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: ocfs2: mount fails with buffer overflow in strlen 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47458 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47460 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: ocfs2: fix data corruption after conversion from inline format 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47460 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47468 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: isdn: mISDN: Fix sleeping function called from invalid context 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47468 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47474 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: comedi: vmk80xx: fix bulk-buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47474 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47475 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: comedi: vmk80xx: fix transfer-buffer overflows 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47475 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47476 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: comedi: ni_usb6501: fix NULL-deref in command paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47476 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47477 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: comedi: dt9812: fix DMA buffers on stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47477 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47478 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: isofs: Fix out of bound access for corrupted isofs image 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47478 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47480 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: scsi: core: Put LLD module refcnt after SCSI device is released 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47480 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47482 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: net: batman-adv: fix error handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47482 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47483 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: regmap: Fix possible double-free in regcache_rbtree_exit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47483 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47485 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47485 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47495 | 中危 | 4.15.0-136.140 | 4.15.0-167.175 | kernel: usbnet: sanity check for maxpacket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47495 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47497 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47497 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47499 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47499 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47500 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: iio: mma8452: Fix trigger reference couting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47500 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47506 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: nfsd: fix use-after-free due to delegation race 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47506 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47509 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: ALSA: pcm: oss: Limit the period size to 16MB 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47509 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47511 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: ALSA: pcm: oss: Fix negative period/buffer sizes 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47511 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47515 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: seg6: fix the iif in the IPv6 socket control block 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47515 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47516 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47516 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47518 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47518 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47520 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: can: pch_can: pch_can_rx_normal: fix use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47520 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47521 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: can: sja1000: fix use after free in ems_pcmcia_add_card() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47521 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:41 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47527 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: serial: core: fix transmit-buffer reset and memleak 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47527 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47541 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47541 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47542 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47542 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 18:34 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47547 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47547 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47548 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47548 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47549 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47549 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47565 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47565 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47566 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47566 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-05-24 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47571 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47571 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-24 15:15 修改: 2024-06-10 19:22 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47576 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47576 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-08-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47587 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: net: systemport: Add global locking for descriptor lifecycle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47587 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47588 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: sit: do not call ipip6_dev_free() from sit_init_net() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47588 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47589 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: igbvf: fix double free in `igbvf_probe` 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47589 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-08-27 03:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47600 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: dm btree remove: fix use after free in rebalance_children() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47600 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47602 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: mac80211: track only QoS data frames for admission control 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47602 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47603 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: audit: improve robustness of the audit queue handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47603 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47606 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: net: netlink: af_netlink: Prevent empty skb by adding a check on len. 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47606 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47609 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47609 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47612 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: nfc: fix segfault in nfc_genl_dump_devices_done 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47612 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-19 15:15 修改: 2024-08-27 16:14 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47619 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: i40e: Fix queues reservation for XDP 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47619 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 11:15 修改: 2024-09-18 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2021-47620 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: Bluetooth: refactor malicious adv data check 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47620 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 11:15 修改: 2024-09-18 17:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0322 | 中危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0322 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-02-02 17:17 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0330 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: possible privileges escalation due to missing TLB flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0330 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2022-12-07 17:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0435 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0435 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-02-14 19:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0487 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: use after free in moxart_remove 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0487 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-04 23:15 修改: 2022-04-30 02:40 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0812 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | kernel: NFS over RDMA random memory leakage 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0812 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0850 | 中危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: information leak in copy_page_to_iter() in iov_iter.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0850 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2023-10-05 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1011 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1011 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-18 18:15 修改: 2022-10-12 13:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1012 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1012 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-05 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1016 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1016 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2023-06-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1048 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: race condition in snd_pcm_hw_free leading to use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1048 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-29 16:15 修改: 2024-01-21 02:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1199 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: Null pointer dereference and use after free in ax25_release() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1199 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1204 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: Use after free in net/ax25/af_ax25.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1204 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2022-09-02 19:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1205 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1205 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1353 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: kernel info leak issue in pfkey_register 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1353 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-29 16:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1419 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: a concurrency use-after-free in vgem_gem_dumb_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1419 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-02 14:15 修改: 2022-12-09 18:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1462 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: possible race condition in drivers/tty/tty_buffers.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1462 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-02 14:15 修改: 2022-10-29 02:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1516 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: null-ptr-deref caused by x25_disconnect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1516 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-05 15:15 修改: 2023-06-27 16:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1652 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: A concurrency use-after-free in floppy disk device driver. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1652 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-02 14:15 修改: 2023-03-01 20:16 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1679 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1679 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-16 18:15 修改: 2024-01-19 17:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1734 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from user-space 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1734 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-18 17:15 修改: 2022-10-14 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20009 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20009 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-10 20:15 修改: 2022-05-16 16:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20141 | 中危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20141 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 14:15 修改: 2024-02-02 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20154 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: possible use after free in lock_sock_nested of sock.c for the SCTP protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20154 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 14:15 修改: 2022-06-24 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20368 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20368 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-11 15:15 修改: 2022-09-06 18:09 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20369 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20369 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-11 15:15 修改: 2023-02-23 15:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20421 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: use after free in binder_inc_ref_for_node in drivers/android/binder.c due 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20421 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-11 20:15 修改: 2022-12-03 02:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20422 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | In emulation_proc_handler of armv8_deprecated.c, there is a possible w ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20422 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-11 20:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20423 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | In rndis_set_response of rndis.c, there is a possible out of bounds wr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20423 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-11 20:15 修改: 2022-10-13 02:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20566 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: possible use after free due to improper locking in l2cap_chan_put of l2cap_core 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20566 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-16 16:15 修改: 2022-12-20 21:52 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20572 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20572 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-16 16:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21123 | 中危 | 4.15.0-136.140 | 4.15.0-187.198 | hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21123 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 20:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21125 | 中危 | 4.15.0-136.140 | 4.15.0-187.198 | hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21125 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 20:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-21166 | 中危 | 4.15.0-136.140 | 4.15.0-187.198 | hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21166 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 21:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2153 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2153 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-31 16:15 修改: 2022-11-21 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-22942 | 中危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: failing usercopy allows for use-after-free exploitation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22942 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-12-13 09:15 修改: 2023-12-18 17:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23036 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23036 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23037 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23037 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23038 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23038 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23039 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23039 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23040 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23040 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-23042 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | Linux PV device frontends vulnerable to attacks by backends T[his CNA  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23042 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-10 20:15 修改: 2022-11-29 02:30 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2318 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Kernel: A use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2318 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-06 19:15 修改: 2023-02-28 15:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24448 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24448 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-04 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24958 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: use-after-free in dev->buf release in drivers/usb/gadget/legacy/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24958 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-11 06:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2503 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: LoadPin bypass via dm-verity table reload 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2503 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-12 11:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-25258 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: security issues in the OS descriptor handling section of composite_setup function (composite.c) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25258 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-16 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-25375 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: information disclosure in drivers/usb/gadget/function/rndis.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25375 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-20 20:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26365 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26365 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26373 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26373 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-18 20:15 修改: 2022-10-27 14:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2639 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2639 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-01 21:15 修改: 2024-02-02 02:36 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26490 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26490 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-06 04:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2663 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: netfilter: nf_conntrack_irc message handling issue 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2663 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-01 21:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-26966 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: heap memory leak in drivers/net/usb/sr9700.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26966 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-12 22:15 修改: 2022-12-22 20:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-27666 | 中危 | 4.15.0-136.140 | 4.15.0-175.184 | kernel: buffer overflow in IPsec ESP transformation code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27666 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-23 06:15 修改: 2023-02-01 14:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28388 | 中危 | 4.15.0-136.140 | 4.15.0-188.199 | kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28388 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28389 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28389 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28390 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28390 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-03 21:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2964 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: memory corruption in AX88179_178A based USB ethernet device. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2964 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-09 15:15 修改: 2023-01-20 12:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2977 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: use-after-free Read in put_device (/dev/vtpmx) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2977 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-14 21:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2978 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: use-after-free in nilfs_mdt_destroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2978 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-24 16:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29900 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29900 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-29901 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29901 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2991 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2991 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-25 18:15 修改: 2022-08-30 20:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3028 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: race condition in xfrm_probe_algs can lead to OOB read/write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3028 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-30594 | 中危 | 4.15.0-136.140 | 4.15.0-180.189 | kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30594 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-05-12 05:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3061 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3061 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-01 18:15 修改: 2022-11-21 19:45 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3111 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: wm8350-power: memory leak in free_charger_irq() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3111 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-14 21:15 修改: 2022-12-16 21:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-32296 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | kernel: insufficient TCP source port randomness leads to client identification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32296 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-05 22:15 修改: 2023-08-08 14:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3239 | 中危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: media: em28xx: initialize refcount before kref_get 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3239 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-19 20:15 修改: 2023-02-14 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33740 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33740 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33741 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33741 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33742 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Linux disk/nic frontends data leaks T[his CNA information record relat ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33742 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33744 | 中危 | 4.15.0-136.140 | 4.15.0-194.205 | Arm guests can cause Dom0 DoS via PV devices When mapping pages of gue ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33744 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-05 13:15 修改: 2022-10-29 02:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-33981 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: use-after-free in floppy driver may lead to a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33981 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-18 16:15 修改: 2022-11-05 02:28 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3424 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: Use after Free in gru_set_context_option leading to kernel panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-06 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3521 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3521 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-16 10:15 修改: 2023-02-23 15:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3524 | 中危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: memory leak in ipv6_renew_options() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3524 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-16 10:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3545 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: nfp: use-after-free in area_cache_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3545 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-17 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3564 | 中危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3564 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-17 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3566 | 中危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3566 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-17 19:15 修改: 2022-10-20 12:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3567 | 中危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: data races around sk->sk_prot 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3567 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-17 19:15 修改: 2023-06-07 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3586 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: net scheduler use-after-free information disclosure vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3586 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-19 18:15 修改: 2022-11-04 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3628 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: USB-accessible buffer overflow in brcmfmac 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3628 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-12 19:15 修改: 2023-01-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36280 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36280 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-09 15:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3629 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: memory leak in the function vsock_connect of Virtual Socket Protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3629 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-21 06:15 修改: 2024-05-17 02:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3640 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3640 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-21 15:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3643 | 中危 | 4.15.0-136.140 | 4.15.0-202.213 | v1: Guests can trigger NIC interface reset/abort/crash via netback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3643 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-07 01:15 修改: 2023-11-29 15:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3646 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3646 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-21 18:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3649 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3649 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-21 20:15 修改: 2024-01-26 16:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36879 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36879 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-27 04:15 修改: 2022-11-04 18:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-36946 | 中危 | 4.15.0-136.140 | 4.15.0-193.204 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36946 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-27 20:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-40307 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: use-after-free in efi_capsule_write in capsule-loader.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40307 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-09 05:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | linux-libc-dev | CVE-2022-40768 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40768 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-18 05:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4095 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: Use-after-Free/Double-Free bug in read_bbreg_hdl in drivers/staging/rtl8712/rtl8712_cmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4095 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-22 15:15 修改: 2023-06-07 12:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41858 | 中危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41858 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-17 18:15 修改: 2023-10-05 14:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42328 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42328 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:40 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42329 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42329 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-42895 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42895 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-11-23 15:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-43750 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: memory corruption in usbmon driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43750 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-26 04:15 修改: 2023-02-14 21:38 | 
                            
                            
                                | linux-libc-dev | CVE-2022-45934 | 中危 | 4.15.0-136.140 | 4.15.0-202.213 | kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45934 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-11-27 04:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-47929 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: NULL pointer dereference in traffic control subsystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47929 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-17 21:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48619 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: event code falling outside of a bitmap in input_set_capability() leads to panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48619 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-01-12 03:15 修改: 2024-09-03 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48626 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: moxart: fix potential use-after-free on remove path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48626 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-02-26 16:27 修改: 2024-08-27 18:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48636 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48636 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48641 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: netfilter: ebtables: fix memory leak when blob is malformed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48641 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48651 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48651 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-28 13:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48659 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: mm/slub: fix to return errno if kmalloc() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48659 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-28 13:15 修改: 2024-04-30 15:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48672 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48672 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:26 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48687 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48687 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48688 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: i40e: Fix kernel crash during module removal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48688 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:33 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48693 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48693 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:34 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48695 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: scsi: mpt3sas: Fix use-after-free warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48695 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 18:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48697 | 中危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: nvmet: fix a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48697 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48701 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48701 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48702 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48702 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 16:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48704 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: drm/radeon: add a force flush to delay work when radeon 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48704 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-03 18:15 修改: 2024-05-06 12:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48708 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: pinctrl: single: fix potential NULL dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48708 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48710 | 中危 | 4.15.0-136.140 | 4.15.0-192.203 | kernel: drm/radeon: fix a possible null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48710 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48711 | 中危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: tipc: improve size validations for received domain records 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48711 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48715 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48715 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48722 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: net: ieee802154: ca8210: Stop leaking skb's 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48722 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 11:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48724 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48724 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-09-18 16:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48732 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: drm/nouveau: fix off by one in BIOS boundary checking 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48732 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-08-19 17:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48738 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48738 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48742 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48742 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-08-20 13:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48743 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: net: amd-xgbe: Fix skb data length underflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48743 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-08-20 13:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48756 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48756 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-09-18 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48757 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: net: fix information leakage in /proc/net/ptype 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48757 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48758 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48758 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48759 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48759 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48760 | 中危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48760 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48786 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: vsock: remove vsock from connected table when connect is interrupted by a signal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48786 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48787 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: iwlwifi: fix use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48787 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:48 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48794 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: net: ieee802154: at86rf230: Stop leaking skb's 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48794 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48795 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: parisc: Fix data TLB miss in sba_unmap_sg 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48795 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48799 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: perf: Fix list corruption in perf_cgroup_switch() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48799 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48804 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: vt_ioctl: fix array_index_nospec in vt_setactivate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48804 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-09-09 18:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48805 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48805 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48809 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: net: fix a memleak when uncloning an skb dst and its metadata 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48809 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:18 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48810 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48810 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-07-16 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48822 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: usb: f_fs: Fix use-after-free for epfile 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48822 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 12:15 修改: 2024-08-07 19:14 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48836 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: Input: aiptek - properly check endpoint type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48836 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48837 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: usb: gadget: rndis: prevent integer overflow in rndis_set_response() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48837 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-18 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48838 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48838 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-24 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48839 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: net/packet: fix slab-out-of-bounds access in packet_recvmsg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48839 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-18 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48845 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: MIPS: smp: fill in sibling and core maps earlier 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48845 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-24 19:19 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48850 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: net-sysfs: add check for netdevice being present to speed_show 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48850 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:06 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48851 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: staging: gdm724x: fix use after free in gdm_lte_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48851 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48853 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: swiotlb: fix info leak with DMA_FROM_DEVICE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48853 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 17:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48855 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: sctp: fix kernel-infoleak for SCTP sockets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48855 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48857 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: NFC: port100: fix use-after-free in port100_send_complete 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48857 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:08 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48860 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: ethernet: Fix error handling in xemaclite_of_probe 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48860 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-07-16 13:15 修改: 2024-07-23 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48877 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: f2fs: let's avoid panic if extent_tree is not created 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48877 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-05 17:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48891 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: regulator: da9211: Use irq handler when ready 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48891 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:39 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48899 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: drm/virtio: Fix GEM handle creation UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48899 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48908 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48908 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48910 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: net: ipv6: ensure we call ipv6_mc_down() at most once 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48910 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48911 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: netfilter: netfilter: nf_queue: fix possible use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48911 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48912 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: netfilter: fix use-after-free in __nf_register_net_hook() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48912 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:12 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48917 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48917 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48919 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: cifs: fix double free race when mount fails in cifs_get_root() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48919 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48924 | 中危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: thermal: int340x: fix memory leak in int3400_notify() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48924 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48926 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: usb: gadget: rndis: add spinlock for rndis response list 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48926 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48928 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: iio: adc: men_z188_adc: Fix a resource leak in an error handling path 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48928 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:58 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48930 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: RDMA/ib_srp: Fix a deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48930 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48931 | 中危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: configfs: fix a race in configfs_{,un}register_subsystem() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48931 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:54 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48945 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: media: vivid: fix compose size exceed boundary 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48945 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-09-23 10:15 修改: 2024-09-26 13:32 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48946 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: udf: Fix preallocation discarding at indirect extent boundary 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48946 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48947 | 中危 | 4.15.0-136.140 | 4.15.0-202.213 | kernel: Bluetooth: L2CAP: Fix u8 overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48947 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:11 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48948 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48948 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48949 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: igb: Initialize mailbox message for VF reset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48949 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48951 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48951 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48956 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ipv6: avoid use-after-free in ip6_fragment() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48956 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48958 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ethernet: aeroflex: fix potential skb leak in greth_init_rings() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48958 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 20:00 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48960 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48960 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48962 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48962 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48966 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net: mvneta: Prevent out of bounds read in mvneta_config_rss() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48966 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:05 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48967 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: NFC: nci: Bounds check struct nfc_target arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48967 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:27 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48972 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48972 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:22 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48973 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: gpio: amd8111: Fix PCI device reference count leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48973 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48978 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: HID: core: fix shift-out-of-bounds in hid_report_raw_event 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48978 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48987 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: media: v4l2-dv-timings.c: fix too strict blanking sanity checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48987 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48988 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: memcg: fix possible use-after-free in memcg_write_event_control() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48988 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48991 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48991 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48992 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ASoC: soc-pcm: Add NULL check in BE reparenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48992 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-48994 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48994 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49002 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49002 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:24 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49005 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ASoC: ops: Fix bounds check for _sx controls 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49005 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:17 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49007 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49007 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:35 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49010 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: hwmon: (coretemp) Check for null before removing sysfs attrs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49010 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49011 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49011 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:01 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49015 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net: hsr: Fix potential use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49015 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:31 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49020 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net/9p: Fix a potential socket leak in p9_socket_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49020 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:43 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49021 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: net: phy: fix null-ptr-deref while probe() failed 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49021 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49029 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49029 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49031 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: iio: health: afe4403: Fix oob read in afe4403_read_raw 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49031 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:03 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49032 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49032 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:04 | 
                            
                            
                                | linux-libc-dev | CVE-2022-49033 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49033 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:12 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0394 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: NULL pointer dereference in rawv6_push_pending_frames 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0394 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-26 21:18 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0458 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0458 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-26 19:15 修改: 2023-05-09 13:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0459 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: Copy_from_user on 64-bit versions may leak kernel information 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0459 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-05-25 14:15 修改: 2023-06-06 13:47 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1073 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: HID: check empty report_list in hid_validate_values() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1073 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1074 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: sctp: fail if no bound addresses can be used for a given scope 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1074 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1095 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1095 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-02-28 23:15 修改: 2023-03-06 14:41 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1390 | 中危 | 4.15.0-136.140 | 4.15.0-137.141 | kernel: remote DoS in TIPC kernel module 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1390 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-16 21:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2162 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: UAF during login when accessing the shost ipaddress 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-19 20:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23455 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23455 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-12 07:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-23559 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23559 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-01-13 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2513 | 中危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: ext4: use-after-free in ext4_xattr_set_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2513 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-05-08 21:15 修改: 2023-11-07 04:12 | 
                            
                            
                                | linux-libc-dev | CVE-2023-26545 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: mpls: double free on sysctl allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26545 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-02-25 04:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28328 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28328 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-19 23:15 修改: 2023-05-03 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-2860 | 中危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: ipv6: sr: out-of-bounds read when setting HMAC data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2860 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-07-24 16:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3161 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: fbcon: shift-out-of-bounds in fbcon_set_font() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3161 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-06-12 20:15 修改: 2023-06-22 00:17 | 
                            
                            
                                | linux-libc-dev | CVE-2023-32269 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: user after free in nr_listen in net/netrom/af_netrom.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32269 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-05-05 17:15 修改: 2023-05-11 23:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3358 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3358 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-06-28 22:15 修改: 2023-07-06 16:54 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3812 | 中危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3812 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-07-24 16:15 修改: 2024-04-25 13:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4385 | 中危 | 4.15.0-136.140 | 4.15.0-192.203 | kernel: jfs: NULL pointer dereference in dbFree() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4385 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-16 17:15 修改: 2023-11-07 04:22 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4387 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4387 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-16 19:15 修改: 2024-01-12 17:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-4459 | 中危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4459 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-08-21 19:15 修改: 2024-04-25 14:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52646 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: aio: fix mremap after fork null-deref 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-04-26 13:15 修改: 2024-04-26 15:32 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52703 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52705 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: nilfs2: fix underflow in second superblock position calculations 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52705 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52730 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: mmc: sdio: fix possible resource leaks in some error paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52742 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: net: USB: Fix wrong-direction WARNING in plusb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52742 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52747 | 中危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: IB/hfi1: Restore allocated resources on failed copyout 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52893 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: gsmi: fix null-deref in gsmi_get_variable 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52893 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:24 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52894 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52894 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:27 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52900 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: nilfs2: fix general protection fault in nilfs_btree_insert() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52900 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:40 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52901 | 中危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: usb: xhci: Check endpoint is valid before dereferencing it 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52901 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:37 | 
                            
                            
                                | linux-libc-dev | CVE-2023-52907 | 中危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52907 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2024-08-21 07:15 修改: 2024-09-12 16:06 | 
                            
                            
                                | ncurses-base | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | ncurses-bin | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | ncurses-term | CVE-2023-29491 | 中危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:499250385ebe017ffb49f7fa17d24a6c771d664113056a9d1501a02aa6bfd9f3 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | git | CVE-2023-29007 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.18 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2022-23521 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.15 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-29187 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.12 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | git-man | CVE-2022-39253 | 中危 | 1:2.17.1-1ubuntu0.11 | 1:2.17.1-1ubuntu0.13 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | openssl | CVE-2021-3712 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.13 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-1292 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.17 | openssl: c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | openssl | CVE-2022-2068 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.19 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | openssl | CVE-2022-2097 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.20 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-4304 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2022-4450 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0215 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.21 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2023-2650 | 中危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.23 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | perl | CVE-2020-16156 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.6 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl | CVE-2023-31484 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.7 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-base | CVE-2020-16156 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.6 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-base | CVE-2023-31484 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.7 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-modules-5.26 | CVE-2020-16156 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.6 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-modules-5.26 | CVE-2023-31484 | 中危 | 5.26.1-6ubuntu0.5 | 5.26.1-6ubuntu0.7 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | python2.7 | CVE-2022-45061 | 中危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.10 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python2.7-minimal | CVE-2022-45061 | 中危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.10 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.6 | CVE-2022-37454 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.10 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.6 | CVE-2022-45061 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.9 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.6 | CVE-2023-24329 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.13 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python3.6-minimal | CVE-2022-37454 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.10 | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.6-minimal | CVE-2022-45061 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.9 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.6-minimal | CVE-2023-24329 | 中危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.13 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | tar | CVE-2022-48303 | 中危 | 1.29b-2ubuntu0.3 | 1.29b-2ubuntu0.4 | tar: heap buffer overflow at from_header() in list.c via specially crafted checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48303 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-30 04:15 修改: 2023-05-30 17:16 | 
                            
                            
                                | unzip | CVE-2022-0529 | 中危 | 6.0-21ubuntu1.1 | 6.0-21ubuntu1.2 | unzip: Heap out-of-bound writes and reads during conversion of wide string to local string 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0529 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-09 23:15 修改: 2023-11-09 20:55 | 
                            
                            
                                | vim | CVE-2021-4192 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2022-0213 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim | CVE-2022-0261 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0318 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim | CVE-2022-0319 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim | CVE-2022-0351 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim | CVE-2022-0359 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim | CVE-2022-0361 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim | CVE-2022-0368 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim | CVE-2022-0392 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.10 | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim | CVE-2022-0408 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0413 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0554 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0572 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0685 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0714 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0943 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1154 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1616 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1619 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1620 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1621 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1629 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1674 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1720 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1851 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1942 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1968 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-2175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2183 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2207 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2304 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2345 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2571 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim | CVE-2022-2923 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-2946 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-47024 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim | CVE-2023-0049 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 16:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | vim | CVE-2023-0054 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim | CVE-2023-0288 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim | CVE-2023-0433 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim | CVE-2023-1170 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim | CVE-2023-1175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-common | CVE-2021-4192 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2022-0213 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-common | CVE-2022-0261 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0318 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-common | CVE-2022-0319 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-common | CVE-2022-0351 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim-common | CVE-2022-0359 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim-common | CVE-2022-0361 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim-common | CVE-2022-0368 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim-common | CVE-2022-0392 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.10 | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-common | CVE-2022-0408 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0413 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0554 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0572 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0685 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0714 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0943 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1154 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1616 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1619 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1620 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1621 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1629 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1674 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1720 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1851 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1942 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1968 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-2175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2183 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2207 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2304 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2345 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2571 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim-common | CVE-2022-2923 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-2946 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-47024 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim-common | CVE-2023-0049 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 16:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | vim-common | CVE-2023-0054 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim-common | CVE-2023-0288 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-common | CVE-2023-0433 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-common | CVE-2023-1170 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-common | CVE-2023-1175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-runtime | CVE-2021-4192 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2022-0213 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-runtime | CVE-2022-0261 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0318 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-runtime | CVE-2022-0319 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-runtime | CVE-2022-0351 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim-runtime | CVE-2022-0359 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim-runtime | CVE-2022-0361 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim-runtime | CVE-2022-0368 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim-runtime | CVE-2022-0392 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.10 | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-runtime | CVE-2022-0408 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0413 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0554 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0572 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0685 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0714 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0943 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1154 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1616 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1619 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1620 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1621 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1629 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1674 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1720 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1851 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1942 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1968 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2183 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2207 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2304 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2345 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2571 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim-runtime | CVE-2022-2923 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-2946 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-47024 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim-runtime | CVE-2023-0049 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 16:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | vim-runtime | CVE-2023-0054 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim-runtime | CVE-2023-0288 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-runtime | CVE-2023-0433 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-runtime | CVE-2023-1170 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-runtime | CVE-2023-1175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | xxd | CVE-2021-4192 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2022-0213 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | xxd | CVE-2022-0261 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0318 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | xxd | CVE-2022-0319 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | xxd | CVE-2022-0351 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | xxd | CVE-2022-0359 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | xxd | CVE-2022-0361 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | xxd | CVE-2022-0368 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | xxd | CVE-2022-0392 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.10 | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | xxd | CVE-2022-0408 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0413 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0554 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0572 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0685 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0714 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0943 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1154 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1616 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1619 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1620 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1621 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.9 | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1629 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1674 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1720 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1851 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1942 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1968 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-2175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2183 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2207 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2304 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2345 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2571 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | xxd | CVE-2022-2923 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-2946 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-47024 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | xxd | CVE-2023-0049 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 16:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | xxd | CVE-2023-0054 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | xxd | CVE-2023-0288 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | xxd | CVE-2023-0433 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | xxd | CVE-2023-1170 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | xxd | CVE-2023-1175 | 中危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.11 | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | zlib1g | CVE-2022-37434 | 中危 | 1:1.2.11.dfsg-0ubuntu2.1 | 1:1.2.11.dfsg-0ubuntu2.2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | zlib1g-dev | CVE-2022-37434 | 中危 | 1:1.2.11.dfsg-0ubuntu2.1 | 1:1.2.11.dfsg-0ubuntu2.2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3621 | 低危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3621 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-20 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3635 | 低危 | 4.15.0-136.140 | 4.15.0-197.208 | kernel: use after in tst_timer in drivers/atm/idt77252.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3635 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-21 11:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3903 | 低危 | 4.15.0-136.140 | 4.15.0-209.220 | kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3903 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-11-14 21:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-39842 | 低危 | 4.15.0-136.140 | 4.15.0-204.215 | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39842 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-05 07:15 修改: 2024-08-03 12:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41218 | 低危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: Report vmalloc UAF in dvb-core/dmxdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41218 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-21 07:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41849 | 低危 | 4.15.0-136.140 | 4.15.0-204.215 | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41849 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-41850 | 低危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41850 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-4662 | 低危 | 4.15.0-136.140 | 4.15.0-201.212 | kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4662 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-12-22 22:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0045 | 低危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: Bypassing Spectre-BTI User Space Mitigations 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-04-25 23:15 修改: 2023-08-11 19:53 | 
                            
                            
                                | linux-libc-dev | CVE-2023-0615 | 低危 | 4.15.0-136.140 | 4.15.0-204.215 | kernel: multiple issues for the Video for Linux version 2 test driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0615 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-02-06 23:15 修改: 2023-02-14 23:38 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1118 | 低危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-02 18:15 修改: 2023-07-06 13:43 | 
                            
                            
                                | linux-libc-dev | CVE-2023-1513 | 低危 | 4.15.0-136.140 | 4.15.0-211.222 | kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:04 | 
                            
                            
                                | linux-libc-dev | CVE-2023-26607 | 低危 | 4.15.0-136.140 | 4.15.0-206.217 | kernel: ntfs3: out-of-bounds read in ntfs_attr_find() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26607 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-02-26 23:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2023-28772 | 低危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28772 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-03-23 15:15 修改: 2023-11-07 04:10 | 
                            
                            
                                | linux-libc-dev | CVE-2023-3159 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: use after free issue in driver/firewire in outbound_phy_packet_callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3159 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2023-06-12 21:15 修改: 2023-06-20 20:29 | 
                            
                            
                                | login | CVE-2018-7169 | 低危 | 1:4.5-1ubuntu2 | 1:4.5-1ubuntu2.2 | shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-0465 | 低危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.12 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | ncurses-base | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | ncurses-base | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | ncurses-base | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | ncurses-base | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-0466 | 低危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.12 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | ncurses-bin | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | ncurses-bin | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | ncurses-bin | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | ncurses-bin | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | ncurses-term | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:499250385ebe017ffb49f7fa17d24a6c771d664113056a9d1501a02aa6bfd9f3 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | ncurses-term | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:499250385ebe017ffb49f7fa17d24a6c771d664113056a9d1501a02aa6bfd9f3 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | ncurses-term | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:499250385ebe017ffb49f7fa17d24a6c771d664113056a9d1501a02aa6bfd9f3 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | ncurses-term | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:499250385ebe017ffb49f7fa17d24a6c771d664113056a9d1501a02aa6bfd9f3 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libheimntlm0-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcups2 | CVE-2019-8842 | 低危 | 2.2.7-1ubuntu2.8 | 2.2.7-1ubuntu2.9 | A buffer overflow was addressed with improved bounds checking. This is ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8842 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2020-10-27 20:15 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcups2 | CVE-2020-10001 | 低危 | 2.2.7-1ubuntu2.8 | 2.2.7-1ubuntu2.9 | cups: access to uninitialized buffer in ipp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10001 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-04-02 18:15 修改: 2021-11-30 21:49 | 
                            
                            
                                | libhogweed4 | CVE-2018-16869 | 低危 | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | nettle: Leaky data conversion exposing a manager oracle 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25 | 
                            
                            
                                | cron | CVE-2017-9525 | 低危 | 3.0pl1-128.1ubuntu1.1 | 3.0pl1-128.1ubuntu1.2 | In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-1 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9525 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2017-06-09 16:29 修改: 2021-12-16 18:44 | 
                            
                            
                                | dbus | CVE-2020-35512 | 低危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.3 | dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35512 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-02-15 17:15 修改: 2023-12-27 16:36 | 
                            
                            
                                | libssl1.1 | CVE-2023-0464 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0465 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0466 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | gnupg | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | binutils | CVE-2020-16592 | 低危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.7 | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | gnupg-l10n | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | openssl | CVE-2023-0464 | 低危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2023-0465 | 低危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0466 | 低危 | 1.1.1-1ubuntu2.1~18.04.8 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | passwd | CVE-2018-7169 | 低危 | 1:4.5-1ubuntu2 | 1:4.5-1ubuntu2.2 | shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | dirmngr | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | gnupg-utils | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27781 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libhx509-5-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libice6 | CVE-2017-2626 | 低危 | 2:1.0.9-2 | 2:1.0.9-2ubuntu0.18.04.1 | libICE: weak entropy usage in session keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2626 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-07-27 19:29 修改: 2023-02-12 23:29 | 
                            
                            
                                | libjbig0 | CVE-2017-9937 | 低危 | 2.1-3.1build1 | 2.1-3.1ubuntu0.18.04.1 | libtiff: memory malloc failure in tif_jbig.c could cause DOS. 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9937 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2017-06-26 12:29 修改: 2023-11-07 02:50 | 
                            
                            
                                | python2.7 | CVE-2015-20107 | 低危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libjbig0 | CVE-2022-1210 | 低危 | 2.1-3.1build1 | 2.1-3.1ubuntu0.18.04.1 | tiff: Malicious file leads to a denial of service in TIFF File Handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46 | 
                            
                            
                                | python2.7-minimal | CVE-2015-20107 | 低危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-35252 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.20 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libjpeg-turbo8 | CVE-2018-11813 | 低危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15 | 
                            
                            
                                | libjpeg-turbo8 | CVE-2020-17541 | 低危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg-turbo: Stack-based buffer overflow in the "transform" component 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29 | 
                            
                            
                                | python3.6 | CVE-2015-20107 | 低危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27533 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libjpeg-turbo8-dev | CVE-2018-11813 | 低危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15 | 
                            
                            
                                | libjpeg-turbo8-dev | CVE-2020-17541 | 低危 | 1.5.2-0ubuntu5.18.04.4 | 1.5.2-0ubuntu5.18.04.6 | libjpeg-turbo: Stack-based buffer overflow in the "transform" component 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29 | 
                            
                            
                                | python3.6-minimal | CVE-2015-20107 | 低危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27534 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27536 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | unzip | CVE-2021-4217 | 低危 | 6.0-21ubuntu1.1 | 6.0-21ubuntu1.2 | unzip: Null pointer dereference in Unicode strings code 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4217 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-24 16:15 修改: 2022-11-29 15:45 | 
                            
                            
                                | unzip | CVE-2022-0530 | 低危 | 6.0-21ubuntu1.1 | 6.0-21ubuntu1.2 | unzip: SIGSEGV during the conversion of an utf-8 string to a local string 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0530 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-09 23:15 修改: 2023-11-09 20:55 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27538 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | binutils-common | CVE-2020-16592 | 低危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.7 | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | gnupg2 | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | curl | CVE-2022-27781 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | gpg | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libasn1-8-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | curl | CVE-2022-35252 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.20 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libtiff5 | CVE-2020-19131 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: a buffer overflow via the "invertImage()" may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19131 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-09-07 15:15 修改: 2021-12-01 14:18 | 
                            
                            
                                | libtiff5 | CVE-2020-19144 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19144 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-09-09 15:15 修改: 2021-12-02 20:46 | 
                            
                            
                                | libtiff5 | CVE-2020-35521 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35521 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff5 | CVE-2020-35522 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: Memory allocation failure in tiff2rgba 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35522 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libtiff5 | CVE-2022-0561 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0561 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-0562 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.5 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0562 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-11 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libtiff5 | CVE-2022-2056 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2056 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2057 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2057 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2058 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.7 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2058 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-22844 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.6 | libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22844 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-01-10 14:12 修改: 2022-11-16 19:07 | 
                            
                            
                                | libtiff5 | CVE-2022-2867 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2867 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2868 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2868 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2869 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2869 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2023-25434 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25434 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-06-14 20:15 修改: 2023-06-23 16:25 | 
                            
                            
                                | libtiff5 | CVE-2023-25435 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.10 | libtiff: tiffcrop: heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25435 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-06-21 20:15 修改: 2023-06-28 18:51 | 
                            
                            
                                | libtiff5 | CVE-2023-30086 | 低危 | 4.0.9-5ubuntu0.4 | 4.0.9-5ubuntu0.8 | libtiff: Heap buffer overflow in tiffcp() at tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30086 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-05-09 16:15 修改: 2023-06-16 15:15 | 
                            
                            
                                | libcurl4 | CVE-2022-27781 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.18 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libtinfo5 | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | libtinfo5 | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | libtinfo5 | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libtinfo5 | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libcurl4 | CVE-2022-35252 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.20 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libkrb5-26-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libudev1 | CVE-2020-13529 | 低危 | 237-3ubuntu10.44 | 237-3ubuntu10.49 | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libcurl4 | CVE-2023-27533 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27534 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27536 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4 | CVE-2023-27538 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | gpg-agent | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | curl | CVE-2023-27533 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | gpg-wks-client | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libdbus-1-3 | CVE-2020-35512 | 低危 | 1.12.2-1ubuntu1.2 | 1.12.2-1ubuntu1.3 | dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35512 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-02-15 17:15 修改: 2023-12-27 16:36 | 
                            
                            
                                | curl | CVE-2023-27534 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libwind0-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | vim | CVE-2021-4193 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2022-0443 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0729 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1733 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1735 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-1785 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-1796 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim | CVE-2022-1898 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-2124 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2125 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2126 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2129 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2206 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2581 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim | CVE-2022-2845 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim | CVE-2022-2849 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libwind0-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | gpg-wks-server | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libbinutils | CVE-2020-16592 | 低危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.7 | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | curl | CVE-2023-27536 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libc-bin | CVE-2016-10228 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc-bin | CVE-2019-25013 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libc-bin | CVE-2020-27618 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libc-bin | CVE-2020-29562 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: assertion failure in iconv when converting invalid UCS4 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29562 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-12-04 07:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libfreetype6 | CVE-2022-27405 | 低危 | 2.8.1-2ubuntu2.1 | 2.8.1-2ubuntu2.2 | FreeType: Segmentation violation via FNT_Size_Request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6 | CVE-2022-27406 | 低危 | 2.8.1-2ubuntu2.1 | 2.8.1-2ubuntu2.2 | Freetype: Segmentation violation via FT_Request_Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libc-bin | CVE-2020-6096 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libgcrypt20 | CVE-2021-33560 | 低危 | 1.8.1-4ubuntu1.2 | 1.8.1-4ubuntu1.3 | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libgmp10 | CVE-2021-43618 | 低危 | 2:6.1.2+dfsg-2 | 2:6.1.2+dfsg-2ubuntu0.1 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | libc-bin | CVE-2021-3326 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libmysqlclient20 | CVE-2022-21515 | 低危 | 5.7.38-0ubuntu0.18.04.1 | 5.7.39-0ubuntu0.18.04.2 | mysql: Server: Options unspecified vulnerability (CPU Jul 2022) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21515 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-07-19 22:15 修改: 2023-11-07 03:43 | 
                            
                            
                                | libgnutls30 | CVE-2021-4209 | 低危 | 3.5.18-1ubuntu1.4 | 3.5.18-1ubuntu1.6 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libncurses5 | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | libncurses5 | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | libncurses5 | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncurses5 | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libc-bin | CVE-2021-35942 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libncursesw5 | CVE-2019-17594 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13 | 
                            
                            
                                | libncursesw5 | CVE-2019-17595 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52 | 
                            
                            
                                | libncursesw5 | CVE-2021-39537 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15 | 
                            
                            
                                | libncursesw5 | CVE-2022-29458 | 低危 | 6.1-1ubuntu1.18.04 | 6.1-1ubuntu1.18.04.1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libc-bin | CVE-2022-23218 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libc-bin | CVE-2022-23219 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libnettle6 | CVE-2018-16869 | 低危 | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | nettle: Leaky data conversion exposing a manager oracle 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25 | 
                            
                            
                                | libpam-modules | CVE-2022-28321 | 低危 | 1.1.8-3.6ubuntu2.18.04.2 | 1.1.8-3.6ubuntu2.18.04.4 | pam: authentication bypass for SSH logins 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28321 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-09-19 22:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | libpam-modules-bin | CVE-2022-28321 | 低危 | 1.1.8-3.6ubuntu2.18.04.2 | 1.1.8-3.6ubuntu2.18.04.4 | pam: authentication bypass for SSH logins 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28321 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-09-19 22:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | libpam-runtime | CVE-2022-28321 | 低危 | 1.1.8-3.6ubuntu2.18.04.2 | 1.1.8-3.6ubuntu2.18.04.4 | pam: authentication bypass for SSH logins 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28321 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-09-19 22:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | libpam0g | CVE-2022-28321 | 低危 | 1.1.8-3.6ubuntu2.18.04.2 | 1.1.8-3.6ubuntu2.18.04.4 | pam: authentication bypass for SSH logins 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28321 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-09-19 22:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | libpcre3 | CVE-2019-20838 | 低危 | 2:8.39-9 | 2:8.39-9ubuntu0.1 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | libpcre3 | CVE-2020-14155 | 低危 | 2:8.39-9 | 2:8.39-9ubuntu0.1 | pcre: Integer overflow when parsing callout numeric arguments 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | gpgconf | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libc-dev-bin | CVE-2016-10228 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc-dev-bin | CVE-2019-25013 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libc-dev-bin | CVE-2020-27618 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libpython2.7 | CVE-2015-20107 | 低危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libc-dev-bin | CVE-2020-29562 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: assertion failure in iconv when converting invalid UCS4 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29562 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-04 07:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libpython2.7-minimal | CVE-2015-20107 | 低危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libc-dev-bin | CVE-2020-6096 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libpython2.7-stdlib | CVE-2015-20107 | 低危 | 2.7.17-1~18.04ubuntu1.7 | 2.7.17-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | vim-common | CVE-2021-4193 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2022-0443 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0729 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1733 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1735 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-1785 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-1796 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim-common | CVE-2022-1898 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-2124 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2125 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2126 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2129 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2206 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2581 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim-common | CVE-2022-2845 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim-common | CVE-2022-2849 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libc-dev-bin | CVE-2021-3326 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc-dev-bin | CVE-2021-35942 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc-dev-bin | CVE-2022-23218 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libpython3.6 | CVE-2015-20107 | 低危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libgssapi3-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libc-dev-bin | CVE-2022-23219 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | libpython3.6-minimal | CVE-2015-20107 | 低危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | curl | CVE-2023-27538 | 低危 | 7.58.0-2ubuntu3.17 | 7.58.0-2ubuntu3.24 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libc6 | CVE-2016-10228 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc6 | CVE-2019-25013 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libpython3.6-stdlib | CVE-2015-20107 | 低危 | 3.6.9-1~18.04ubuntu1.7 | 3.6.9-1~18.04ubuntu1.8 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libc6 | CVE-2020-27618 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libc6 | CVE-2020-29562 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: assertion failure in iconv when converting invalid UCS4 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29562 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-12-04 07:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libc6 | CVE-2020-6096 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc6 | CVE-2021-3326 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libhcrypto4-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libc6 | CVE-2021-35942 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc6 | CVE-2022-23218 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libroken18-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libroken18-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libc6 | CVE-2022-23219 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | gpgsm | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | libsepol1 | CVE-2021-36084 | 低危 | 2.7-1 | 2.7-1ubuntu0.1 | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36085 | 低危 | 2.7-1 | 2.7-1ubuntu0.1 | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36086 | 低危 | 2.7-1 | 2.7-1ubuntu0.1 | libsepol: use-after-free in cil_reset_classpermission() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36087 | 低危 | 2.7-1 | 2.7-1ubuntu0.1 | libsepol: heap-based buffer overflow in ebitmap_match_any() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc6-dev | CVE-2016-10228 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv program can hang when invoked with the -c option 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10228 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2017-03-02 01:59 修改: 2023-11-07 02:29 | 
                            
                            
                                | libc6-dev | CVE-2019-25013 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25013 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-04 18:15 修改: 2023-11-09 14:44 | 
                            
                            
                                | libsqlite3-0 | CVE-2021-36690 | 低危 | 3.22.0-1ubuntu0.4 | 3.22.0-1ubuntu0.5 | A segmentation fault can occur in the sqlite3.exe command-line compone ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36690 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-08-24 14:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libc6-dev | CVE-2020-27618 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27618 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-26 23:15 修改: 2022-10-28 20:06 | 
                            
                            
                                | libc6-dev | CVE-2020-29562 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: assertion failure in iconv when converting invalid UCS4 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29562 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-04 07:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2019-12098 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | In the client side of Heimdal before 7.6.0, failure to verify anonymou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12098 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2019-05-15 23:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | libheimbase1-heimdal | CVE-2021-3671 | 低危 | 7.5.0+dfsg-1 | 7.5.0+dfsg-1ubuntu0.1 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:1e3bf7ab9c02a91aa3036fccb64824e4b6b510d9ee8f2472f59de829d2aafc05 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libc6-dev | CVE-2020-6096 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: signed comparison vulnerability in the ARMv7 memcpy function 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6096 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-04-01 22:15 修改: 2023-11-07 03:24 | 
                            
                            
                                | libc6-dev | CVE-2021-3326 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3326 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-27 20:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | libc6-dev | CVE-2021-35942 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Arbitrary read in wordexp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libc6-dev | CVE-2022-23218 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in svcunix_create via long pathnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37 | 
                            
                            
                                | libssl-dev | CVE-2023-0464 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0465 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl-dev | CVE-2023-0466 | 低危 | 1.1.1-1ubuntu2.1~18.04.17 | 1.1.1-1ubuntu2.1~18.04.22 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libc6-dev | CVE-2022-23219 | 低危 | 2.27-3ubuntu1.4 | 2.27-3ubuntu1.5 | glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32 | 
                            
                            
                                | vim-runtime | CVE-2021-4193 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2022-0443 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0729 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1733 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1735 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-1785 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-1796 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim-runtime | CVE-2022-1898 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-2124 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2125 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2126 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2129 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2206 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2581 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim-runtime | CVE-2022-2845 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2849 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | binutils-x86-64-linux-gnu | CVE-2020-16592 | 低危 | 2.30-21ubuntu1~18.04.5 | 2.30-21ubuntu1~18.04.7 | binutils: use-after-free in bfd_hash_lookup could result in DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | gpgv | CVE-2019-13050 | 低危 | 2.2.4-1ubuntu1.4 | 2.2.4-1ubuntu1.5 | GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13050 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-06-29 17:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | bash | CVE-2019-18276 | 低危 | 4.4.18-2ubuntu1.2 | 4.4.18-2ubuntu1.3 | bash: when effective UID is not equal to its real UID the saved UID is not dropped 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18276 镜像层: sha256:837d6facb613e572926fbfe8cd7171ddf5919c1454cf4d5b4e78f3d2a7729000 发布日期: 2019-11-28 01:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | libssl1.0.0 | CVE-2023-0464 | 低危 | 1.0.2n-1ubuntu5.9 | 1.0.2n-1ubuntu5.12 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | linux-libc-dev | CVE-2018-13095 | 低危 | 4.15.0-136.140 | 4.15.0-141.145 | kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13095 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2018-07-03 10:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | linux-libc-dev | CVE-2019-19449 | 低危 | 4.15.0-136.140 | 4.15.0-162.170 | kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19449 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2019-12-08 02:15 修改: 2020-01-03 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20292 | 低危 | 4.15.0-136.140 | 4.15.0-143.147 | kernel: DRM Memory Management Double Free Privilege Escalation Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20292 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-05-28 11:15 修改: 2023-07-28 19:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-20317 | 低危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: timer tree corruption leads to missing wakeup and system freeze 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20317 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-09-27 11:15 修改: 2022-06-14 11:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26930 | 低危 | 4.15.0-136.140 | 4.15.0-143.147 | An issue was discovered in the Linux kernel 3.11 through 5.10.16, as u ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26930 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-17 01:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-26931 | 低危 | 4.15.0-136.140 | 4.15.0-143.147 | An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26931 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-02-17 02:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28688 | 低危 | 4.15.0-136.140 | 4.15.0-143.147 | The fix for XSA-365 includes initialization of pointers such that subs ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28688 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-04-06 19:15 修改: 2022-05-27 16:46 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28711 | 低危 | 4.15.0-136.140 | 4.15.0-169.177 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28711 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:18 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28712 | 低危 | 4.15.0-136.140 | 4.15.0-169.177 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28712 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:33 | 
                            
                            
                                | linux-libc-dev | CVE-2021-28713 | 低危 | 4.15.0-136.140 | 4.15.0-169.177 | xen: rogue backends can cause DoS of guests via high frequency events 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28713 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-01-05 17:15 修改: 2022-04-06 16:35 | 
                            
                            
                                | linux-libc-dev | CVE-2021-29647 | 低危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29647 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-03-30 21:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3178 | 低危 | 4.15.0-136.140 | 4.15.0-137.141 | kernel: path traversal in fs/nfsd/nfs3xdr.c may lead to Information Disclosure or RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3178 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-01-19 07:15 修改: 2024-08-03 17:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3428 | 低危 | 4.15.0-136.140 | 4.15.0-144.148 | kernel: integer overflow in ext4_es_cache_extent 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3428 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-04 18:15 修改: 2022-03-11 15:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-34693 | 低危 | 4.15.0-136.140 | 4.15.0-156.163 | kernel: allows local users to obtain sensitive information from stack memory because of uninitialized data structure in net/can/bcm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34693 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-06-14 22:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3669 | 低危 | 4.15.0-136.140 | 4.15.0-208.220 | kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3669 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-26 16:15 修改: 2023-07-07 19:16 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3679 | 低危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: DoS in rb_per_cpu_empty() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3679 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-05 20:15 修改: 2022-10-27 12:29 | 
                            
                            
                                | linux-libc-dev | CVE-2021-37159 | 低危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37159 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-07-21 15:16 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3744 | 低危 | 4.15.0-136.140 | 4.15.0-163.171 | kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3744 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-04 16:15 修改: 2023-02-12 23:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-3772 | 低危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: sctp: Invalid chunks may be used to remotely remove existing associations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3772 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-02 23:15 修改: 2023-02-12 23:42 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38204 | 低危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: use-after-free and panic in drivers/usb/host/max3421-hcd.c by removing a MAX-3421 USB device in certain situations 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38204 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:37 | 
                            
                            
                                | linux-libc-dev | CVE-2021-38205 | 低危 | 4.15.0-136.140 | 4.15.0-159.167 | kernel: drivers/net/ethernet/xilinx/xilinx_emaclite.c prints the real IOMEM pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38205 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-08-08 20:15 修改: 2022-01-04 16:38 | 
                            
                            
                                | linux-libc-dev | CVE-2021-41864 | 低危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41864 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-10-02 00:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-42008 | 低危 | 4.15.0-136.140 | 4.15.0-161.169 | kernel: slab out-of-bounds write in decode_data() in drivers/net/hamradio/6pack.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42008 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-10-05 00:15 修改: 2023-05-12 12:59 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43389 | 低危 | 4.15.0-136.140 | 4.15.0-166.174 | kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43389 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-11-04 19:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | linux-libc-dev | CVE-2021-43976 | 低危 | 4.15.0-136.140 | 4.15.0-173.182 | kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43976 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2021-11-17 17:15 修改: 2024-03-25 01:15 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0494 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: information leak in scsi_ioctl() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0494 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-25 19:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0617 | 低危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0617 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-16 17:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-0854 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: swiotlb information leak with DMA_FROM_DEVICE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0854 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-23 20:15 修改: 2022-10-14 12:53 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1195 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1195 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-29 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1198 | 低危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: use-after-free in drivers/net/hamradio/6pack.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1198 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-29 15:15 修改: 2022-09-06 18:23 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1729 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: race condition in perf_event_open leads to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1729 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-01 21:15 修改: 2023-08-04 17:41 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1974 | 低危 | 4.15.0-136.140 | 4.15.0-192.203 | kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1974 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-31 16:15 修改: 2023-06-27 15:47 | 
                            
                            
                                | linux-libc-dev | CVE-2022-1975 | 低危 | 4.15.0-136.140 | 4.15.0-191.202 | kernel: sleep in atomic bug when firmware download timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1975 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-08-31 16:15 修改: 2022-09-07 16:49 | 
                            
                            
                                | linux-libc-dev | CVE-2022-20132 | 低危 | 4.15.0-136.140 | 4.15.0-169.177 | kernel: Out of bounds read in lg_probe and related functions of hid-lg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20132 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-06-15 13:15 修改: 2022-06-23 18:29 | 
                            
                            
                                | linux-libc-dev | CVE-2022-2380 | 低危 | 4.15.0-136.140 | 4.15.0-189.200 | kernel: vulnerability in sm712fb driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2380 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-07-13 19:15 修改: 2022-07-20 15:02 | 
                            
                            
                                | linux-libc-dev | CVE-2022-24959 | 低危 | 4.15.0-136.140 | 4.15.0-176.185 | kernel: memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24959 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-02-11 06:15 修改: 2022-05-11 14:44 | 
                            
                            
                                | linux-libc-dev | CVE-2022-27223 | 低危 | 4.15.0-136.140 | 4.15.0-177.186 | kernel: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index is not validated 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27223 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-03-16 00:15 修改: 2024-02-08 20:50 | 
                            
                            
                                | linux-libc-dev | CVE-2022-28356 | 低危 | 4.15.0-136.140 | 4.15.0-184.194 | kernel: refcount leak in llc_ui_bind and llc_ui_autobind 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28356 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-04-02 21:15 修改: 2023-02-03 23:59 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3202 | 低危 | 4.15.0-136.140 | 4.15.0-189.200 | Kernel: jfs: Null Pointer Deference in jfs_evict_inode leads to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3202 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-09-14 15:15 修改: 2023-10-05 14:09 | 
                            
                            
                                | xxd | CVE-2021-4193 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2022-0443 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0729 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.13 | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1733 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1735 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-1785 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-1796 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | xxd | CVE-2022-1898 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-2124 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2125 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2126 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2129 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2206 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2581 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | xxd | CVE-2022-2845 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | xxd | CVE-2022-2849 | 低危 | 2:8.0.1453-1ubuntu1.8 | 2:8.0.1453-1ubuntu1.12 | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:07d7d8bed07abe5e983adcfa9c1adc4bec523958293532dcdac0553a1c053a74 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3565 | 低危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: use-after-free in l1oip timer handlers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3565 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-17 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | linux-libc-dev | CVE-2022-3594 | 低危 | 4.15.0-136.140 | 4.15.0-200.211 | kernel: Rate limit overflow messages in r8152 in intr_callback 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3594 镜像层: sha256:7d5e7eb5b713a4d85c3fd477fb7f9c9ff0111aec309c61628a81d788199bebde 发布日期: 2022-10-18 20:15 修改: 2023-11-07 03:51 |