libssl1.1 |
CVE-2023-0286 |
高危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
linux-libc-dev |
CVE-2023-0266 |
高危 |
4.15.0-202.213 |
4.15.0-208.220 |
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0266
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-30 14:15 修改: 2023-08-29 17:59
|
linux-libc-dev |
CVE-2023-0461 |
高危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net/ulp: use-after-free in listening ULP sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0461
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-02-28 15:15 修改: 2023-06-06 19:16
|
linux-libc-dev |
CVE-2023-1281 |
高危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1281
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-22 14:15 修改: 2023-06-26 16:57
|
linux-libc-dev |
CVE-2023-1380 |
高危 |
4.15.0-202.213 |
4.15.0-212.223 |
Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-27 21:15 修改: 2023-12-08 20:45
|
linux-libc-dev |
CVE-2023-1829 |
高危 |
4.15.0-202.213 |
4.15.0-210.221 |
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1829
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-12 12:15 修改: 2023-10-05 14:52
|
linux-libc-dev |
CVE-2023-30456 |
高危 |
4.15.0-202.213 |
4.15.0-212.223 |
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30456
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-10 02:15 修改: 2023-07-26 17:15
|
linux-libc-dev |
CVE-2023-31436 |
高危 |
4.15.0-202.213 |
4.15.0-212.223 |
kernel: out-of-bounds write in qfq_change_class function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31436
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-28 02:15 修改: 2024-10-21 16:35
|
linux-libc-dev |
CVE-2023-32233 |
高危 |
4.15.0-202.213 |
4.15.0-212.223 |
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32233
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-05-08 20:15 修改: 2023-09-28 19:07
|
linux-libc-dev |
CVE-2023-3567 |
高危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-07-24 16:15 修改: 2024-09-13 19:15
|
openssl |
CVE-2023-0286 |
高危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
binutils-x86-64-linux-gnu |
CVE-2022-47696 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils-x86-64-linux-gnu |
CVE-2023-25584 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils-x86-64-linux-gnu |
CVE-2023-25585 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-x86-64-linux-gnu |
CVE-2023-25588 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libasn1-8-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libbinutils |
CVE-2022-47673 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47696 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libbinutils |
CVE-2023-25584 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
libbinutils |
CVE-2023-25585 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libbinutils |
CVE-2023-25588 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libgssapi3-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libhcrypto4-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libheimbase1-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libheimntlm0-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libhx509-5-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libkrb5-26-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
libncurses5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
libncursesw5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
libperl5.26 |
CVE-2023-31484 |
中危 |
5.26.1-6ubuntu0.6 |
5.26.1-6ubuntu0.7 |
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
libpython3.6 |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libpython3.6-dev |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libpython3.6-minimal |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libpython3.6-stdlib |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libroken18-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
binutils |
CVE-2022-47673 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libssl1.1 |
CVE-2022-4304 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2022-4450 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0215 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2023-2650 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.23 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
libsystemd0 |
CVE-2022-3821 |
中危 |
237-3ubuntu10.56 |
237-3ubuntu10.57 |
systemd: buffer overrun in format_timespan() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51
|
libtinfo5 |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
libudev1 |
CVE-2022-3821 |
中危 |
237-3ubuntu10.56 |
237-3ubuntu10.57 |
systemd: buffer overrun in format_timespan() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51
|
libwind0-heimdal |
CVE-2022-45142 |
中危 |
7.5.0+dfsg-1ubuntu0.3 |
7.5.0+dfsg-1ubuntu0.4 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
binutils |
CVE-2022-47696 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils |
CVE-2023-25584 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils |
CVE-2023-25585 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils |
CVE-2023-25588 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-common |
CVE-2022-47673 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-common |
CVE-2022-47696 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils-common |
CVE-2023-25584 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils-common |
CVE-2023-25585 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-common |
CVE-2023-25588 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
linux-libc-dev |
CVE-2021-47103 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: inet: fully convert sk->sk_rx_dst to RCU rules
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47103
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-03-04 18:15 修改: 2024-03-05 13:41
|
linux-libc-dev |
CVE-2022-20369 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20369
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-08-11 15:15 修改: 2023-02-23 15:27
|
linux-libc-dev |
CVE-2022-26373 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26373
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-08-18 20:15 修改: 2022-10-27 14:56
|
linux-libc-dev |
CVE-2022-2663 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: netfilter: nf_conntrack_irc message handling issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2663
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-01 21:15 修改: 2023-02-12 22:15
|
linux-libc-dev |
CVE-2022-29900 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29900
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15
|
linux-libc-dev |
CVE-2022-29901 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29901
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-07-12 19:15 修改: 2024-02-04 08:15
|
linux-libc-dev |
CVE-2022-3424 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: Use after Free in gru_set_context_option leading to kernel panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-06 23:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-3521 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3521
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-16 10:15 修改: 2023-02-23 15:29
|
linux-libc-dev |
CVE-2022-3545 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: nfp: use-after-free in area_cache_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3545
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-17 12:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-3628 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: USB-accessible buffer overflow in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3628
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-12 19:15 修改: 2023-01-23 15:13
|
linux-libc-dev |
CVE-2022-36280 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36280
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-09 15:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2022-3640 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3640
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-21 15:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-3646 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3646
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-21 18:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-3649 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3649
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-21 20:15 修改: 2024-01-26 16:50
|
linux-libc-dev |
CVE-2022-42328 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42328
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:40
|
linux-libc-dev |
CVE-2022-42329 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42329
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-12-07 01:15 修改: 2023-01-10 19:39
|
linux-libc-dev |
CVE-2022-42895 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42895
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-11-23 15:15 修改: 2023-11-07 03:53
|
linux-libc-dev |
CVE-2022-43750 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: memory corruption in usbmon driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43750
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-10-26 04:15 修改: 2023-02-14 21:38
|
linux-libc-dev |
CVE-2022-47929 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: NULL pointer dereference in traffic control subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47929
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-17 21:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2022-48636 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48636
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-04-28 13:15 修改: 2024-10-29 16:35
|
linux-libc-dev |
CVE-2022-48641 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: netfilter: ebtables: fix memory leak when blob is malformed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48641
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42
|
linux-libc-dev |
CVE-2022-48651 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48651
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-04-28 13:15 修改: 2024-07-03 01:39
|
linux-libc-dev |
CVE-2022-48659 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: mm/slub: fix to return errno if kmalloc() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48659
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-04-28 13:15 修改: 2024-04-30 15:06
|
linux-libc-dev |
CVE-2022-48672 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48672
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-03 15:15 修改: 2024-05-23 20:26
|
linux-libc-dev |
CVE-2022-48697 |
中危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: nvmet: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48697
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-03 16:15 修改: 2024-10-30 16:35
|
linux-libc-dev |
CVE-2022-48708 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: pinctrl: single: fix potential NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48708
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2022-48877 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: f2fs: let's avoid panic if extent_tree is not created
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48877
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-05 17:47
|
linux-libc-dev |
CVE-2022-48891 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: regulator: da9211: Use irq handler when ready
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48891
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:39
|
linux-libc-dev |
CVE-2022-48899 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: drm/virtio: Fix GEM handle creation UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48899
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:22
|
linux-libc-dev |
CVE-2022-48945 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: media: vivid: fix compose size exceed boundary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48945
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-09-23 10:15 修改: 2024-09-26 13:32
|
linux-libc-dev |
CVE-2022-48946 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: udf: Fix preallocation discarding at indirect extent boundary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48946
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:13
|
linux-libc-dev |
CVE-2022-48948 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48948
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:34
|
linux-libc-dev |
CVE-2022-48949 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: igb: Initialize mailbox message for VF reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48949
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-29 16:32
|
linux-libc-dev |
CVE-2022-48951 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48951
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:01
|
linux-libc-dev |
CVE-2022-48956 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ipv6: avoid use-after-free in ip6_fragment()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48956
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:59
|
linux-libc-dev |
CVE-2022-48958 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ethernet: aeroflex: fix potential skb leak in greth_init_rings()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48958
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 20:00
|
linux-libc-dev |
CVE-2022-48960 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48960
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:24
|
linux-libc-dev |
CVE-2022-48962 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net: hisilicon: Fix potential use-after-free in hisi_femac_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48962
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:27
|
linux-libc-dev |
CVE-2022-48966 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net: mvneta: Prevent out of bounds read in mvneta_config_rss()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48966
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:05
|
linux-libc-dev |
CVE-2022-48967 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: NFC: nci: Bounds check struct nfc_target arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48967
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:27
|
linux-libc-dev |
CVE-2022-48972 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48972
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:22
|
linux-libc-dev |
CVE-2022-48973 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: gpio: amd8111: Fix PCI device reference count leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48973
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:35
|
linux-libc-dev |
CVE-2022-48978 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: HID: core: fix shift-out-of-bounds in hid_report_raw_event
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48978
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:46
|
linux-libc-dev |
CVE-2022-48987 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: media: v4l2-dv-timings.c: fix too strict blanking sanity checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48987
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:27
|
linux-libc-dev |
CVE-2022-48988 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: memcg: fix possible use-after-free in memcg_write_event_control()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48988
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:20
|
linux-libc-dev |
CVE-2022-48991 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48991
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13
|
linux-libc-dev |
CVE-2022-48992 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ASoC: soc-pcm: Add NULL check in BE reparenting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48992
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:51
|
linux-libc-dev |
CVE-2022-48994 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48994
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-23 15:13
|
linux-libc-dev |
CVE-2022-49002 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49002
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:24
|
linux-libc-dev |
CVE-2022-49005 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ASoC: ops: Fix bounds check for _sx controls
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49005
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:17
|
linux-libc-dev |
CVE-2022-49007 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49007
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:35
|
linux-libc-dev |
CVE-2022-49010 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: hwmon: (coretemp) Check for null before removing sysfs attrs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49010
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:03
|
linux-libc-dev |
CVE-2022-49011 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49011
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:01
|
linux-libc-dev |
CVE-2022-49015 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net: hsr: Fix potential use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49015
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:31
|
linux-libc-dev |
CVE-2022-49020 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net/9p: Fix a potential socket leak in p9_socket_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49020
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:43
|
linux-libc-dev |
CVE-2022-49021 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: net: phy: fix null-ptr-deref while probe() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49021
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:44
|
linux-libc-dev |
CVE-2022-49029 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49029
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:59
|
linux-libc-dev |
CVE-2022-49031 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: iio: health: afe4403: Fix oob read in afe4403_read_raw
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49031
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:03
|
linux-libc-dev |
CVE-2022-49032 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49032
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:04
|
linux-libc-dev |
CVE-2022-49033 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49033
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-10-21 20:15 修改: 2024-10-30 21:50
|
linux-libc-dev |
CVE-2023-0394 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: NULL pointer dereference in rawv6_push_pending_frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0394
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-26 21:18 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-0458 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0458
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-26 19:15 修改: 2023-05-09 13:58
|
linux-libc-dev |
CVE-2023-0459 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: Copy_from_user on 64-bit versions may leak kernel information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0459
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-05-25 14:15 修改: 2023-06-06 13:47
|
linux-libc-dev |
CVE-2023-1073 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: HID: check empty report_list in hid_validate_values()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1073
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15
|
linux-libc-dev |
CVE-2023-1074 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: sctp: fail if no bound addresses can be used for a given scope
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1074
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-27 21:15 修改: 2023-11-05 22:15
|
linux-libc-dev |
CVE-2023-2162 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: UAF during login when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-19 20:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-23455 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23455
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-12 07:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-23559 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23559
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-01-13 01:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2023-26545 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: mpls: double free on sysctl allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26545
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-02-25 04:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-28328 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28328
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-19 23:15 修改: 2023-05-03 14:15
|
linux-libc-dev |
CVE-2023-3161 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: fbcon: shift-out-of-bounds in fbcon_set_font()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3161
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-06-12 20:15 修改: 2023-06-22 00:17
|
linux-libc-dev |
CVE-2023-32269 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: user after free in nr_listen in net/netrom/af_netrom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32269
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-05-05 17:15 修改: 2023-05-11 23:04
|
linux-libc-dev |
CVE-2023-3358 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3358
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-06-28 22:15 修改: 2023-07-06 16:54
|
linux-libc-dev |
CVE-2023-3812 |
中危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3812
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-07-24 16:15 修改: 2024-04-25 13:15
|
linux-libc-dev |
CVE-2023-52646 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: aio: fix mremap after fork null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-04-26 13:15 修改: 2024-04-26 15:32
|
linux-libc-dev |
CVE-2023-52703 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52705 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: nilfs2: fix underflow in second superblock position calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52705
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52730 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: mmc: sdio: fix possible resource leaks in some error paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52742 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: net: USB: Fix wrong-direction WARNING in plusb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52742
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52747 |
中危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: IB/hfi1: Restore allocated resources on failed copyout
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53
|
linux-libc-dev |
CVE-2023-52893 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: gsmi: fix null-deref in gsmi_get_variable
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52893
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:24
|
linux-libc-dev |
CVE-2023-52894 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52894
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:27
|
linux-libc-dev |
CVE-2023-52900 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: nilfs2: fix general protection fault in nilfs_btree_insert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52900
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:40
|
linux-libc-dev |
CVE-2023-52901 |
中危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: usb: xhci: Check endpoint is valid before dereferencing it
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52901
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:37
|
linux-libc-dev |
CVE-2023-52907 |
中危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52907
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2024-08-21 07:15 修改: 2024-09-12 16:06
|
ncurses-base |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
ncurses-bin |
CVE-2023-29491 |
中危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: Local users can trigger security-relevant memory corruption via malformed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15
|
binutils-x86-64-linux-gnu |
CVE-2022-47673 |
中危 |
2.30-21ubuntu1~18.04.8 |
2.30-21ubuntu1~18.04.9 |
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
openssl |
CVE-2022-4304 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2022-4450 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0215 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.21 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-2650 |
中危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.23 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
perl |
CVE-2023-31484 |
中危 |
5.26.1-6ubuntu0.6 |
5.26.1-6ubuntu0.7 |
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
perl-base |
CVE-2023-31484 |
中危 |
5.26.1-6ubuntu0.6 |
5.26.1-6ubuntu0.7 |
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
perl-modules-5.26 |
CVE-2023-31484 |
中危 |
5.26.1-6ubuntu0.6 |
5.26.1-6ubuntu0.7 |
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
python3.6 |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
python3.6-dev |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
python3.6-minimal |
CVE-2023-24329 |
中危 |
3.6.9-1~18.04ubuntu1.12 |
3.6.9-1~18.04ubuntu1.13 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:ae51d0a5b77cd87fa29f28790d023283f63e0be8958cbee0bb39f5175be85d55
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
tar |
CVE-2022-48303 |
中危 |
1.29b-2ubuntu0.3 |
1.29b-2ubuntu0.4 |
tar: heap buffer overflow at from_header() in list.c via specially crafted checksum
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48303
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2023-01-30 04:15 修改: 2023-05-30 17:16
|
libncurses5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
linux-libc-dev |
CVE-2021-3669 |
低危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3669
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-08-26 16:15 修改: 2023-07-07 19:16
|
linux-libc-dev |
CVE-2022-3903 |
低危 |
4.15.0-202.213 |
4.15.0-209.220 |
kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3903
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-11-14 21:15 修改: 2023-11-07 03:51
|
linux-libc-dev |
CVE-2022-39842 |
低危 |
4.15.0-202.213 |
4.15.0-204.215 |
Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39842
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-05 07:15 修改: 2024-08-03 12:15
|
linux-libc-dev |
CVE-2022-41218 |
低危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: Report vmalloc UAF in dvb-core/dmxdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41218
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-21 07:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2022-41849 |
低危 |
4.15.0-202.213 |
4.15.0-204.215 |
Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41849
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2022-41850 |
低危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41850
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2022-09-30 06:15 修改: 2024-03-25 01:15
|
linux-libc-dev |
CVE-2023-0045 |
低危 |
4.15.0-202.213 |
4.15.0-208.220 |
kernel: Bypassing Spectre-BTI User Space Mitigations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-04-25 23:15 修改: 2023-08-11 19:53
|
linux-libc-dev |
CVE-2023-0615 |
低危 |
4.15.0-202.213 |
4.15.0-204.215 |
kernel: multiple issues for the Video for Linux version 2 test driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0615
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-02-06 23:15 修改: 2023-02-14 23:38
|
linux-libc-dev |
CVE-2023-1118 |
低危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-02 18:15 修改: 2023-07-06 13:43
|
linux-libc-dev |
CVE-2023-1513 |
低危 |
4.15.0-202.213 |
4.15.0-211.222 |
kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:04
|
linux-libc-dev |
CVE-2023-26607 |
低危 |
4.15.0-202.213 |
4.15.0-206.217 |
kernel: ntfs3: out-of-bounds read in ntfs_attr_find()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26607
镜像层: sha256:d03f9fa91d4be720818a29c37529dd1613969a9a227b21a495f5a71cb64871f9
发布日期: 2023-02-26 23:15 修改: 2024-03-25 01:15
|
libssl1.1 |
CVE-2023-0464 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
ncurses-base |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-base |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-base |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
ncurses-base |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libssl1.1 |
CVE-2023-0465 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
ncurses-bin |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-bin |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-bin |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
ncurses-bin |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libssl1.1 |
CVE-2023-0466 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libncurses5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libncursesw5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17594 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
openssl |
CVE-2023-0464 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-0465 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0466 |
低危 |
1.1.1-1ubuntu2.1~18.04.20 |
1.1.1-1ubuntu2.1~18.04.22 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:798853a18436cb177eec118642064a7a920cefda9626b2bde19cc72aee7ee289
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libtinfo5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
libtinfo5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libncursesw5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libncursesw5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
libncursesw5 |
CVE-2022-29458 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
libncurses5 |
CVE-2019-17595 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libncurses5 |
CVE-2021-39537 |
低危 |
6.1-1ubuntu1.18.04 |
6.1-1ubuntu1.18.04.1 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:475a54c2a93de61ab1a000184b41b5c5370eef3842486f6c185cd9a001ff1a92
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|