| CVE-2013-2239 |
vzkernel before 042stab080.2 in the OpenVZ modification for the Linux kernel 2.6.32 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via (1) a crafted ploop driver ioctl call, related to the ploop_getdevice_ioc function in drivers/block/ploop/dev.c, or (2) a crafted quotactl system call, related to the compat_quotactl function in fs/quota/quota.c. |
Low |
kernel |
是 |
完成修复 |
2025-05-28 |
2026-01-25 |
| CVE-2013-1959 |
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-28 |
2026-01-22 |
| CVE-2012-4467 |
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-28 |
2026-01-22 |
| CVE-2012-3364 |
Multiple stack-based buffer overflows in the Near Field Communication Controller Interface (NCI) in the Linux kernel before 3.4.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via incoming frames with crafted length fields. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-28 |
2026-01-22 |
| CVE-2011-4915 |
fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-28 |
2026-01-22 |
| CVE-2025-5272 |
Memory safety bugs present in Firefox 138 and Thunderbird 138. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139. |
Important |
firefox |
否 |
完成修复 |
2025-05-27 |
2025-12-29 |
| CVE-2020-24996 |
There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact. |
Important |
xpdf |
否 |
完成修复 |
2025-05-27 |
2026-01-04 |
| CVE-2016-4440 |
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-19 |
| CVE-2016-3961 |
Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2016-3156 |
The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2016-2547 |
sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2016-2546 |
sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2016-0821 |
The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2016-0728 |
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-09 |
| CVE-2016-0723 |
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-8839 |
Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-8787 |
The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-8767 |
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-8709 |
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-09 |
| CVE-2015-8543 |
The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-7613 |
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-09 |
| CVE-2015-7550 |
The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-5364 |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-5327 |
Out-of-bounds memory read in the x509_decode_time function in x509_cert_parser.c in Linux kernels 4.3-rc1 and after. |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-25 |
| CVE-2015-5307 |
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-18 |
| CVE-2015-4692 |
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-19 |
| CVE-2015-4176 |
fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which allows local users to read arbitrary files by leveraging user-namespace root access for deletion of a file or directory. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-3339 |
Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-3214 |
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2015-2877 |
Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-25 |
| CVE-2015-2686 |
net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sendto and (2) recvfrom system calls, which allows local users to gain privileges by leveraging a subsystem that uses the copy_from_iter function in the iov_iter interface, as demonstrated by the Bluetooth subsystem. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-09 |
| CVE-2015-0275 |
The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2014-9729 |
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2014-9728 |
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2014-9715 |
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-9683 |
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-8989 |
The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-8369 |
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-18 |
| CVE-2014-8159 |
The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2014-7841 |
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2014-7826 |
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-4654 |
The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-4171 |
mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-3645 |
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-18 |
| CVE-2014-3631 |
The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-3186 |
Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2014-0101 |
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2014-0100 |
Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2014-0077 |
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-31 |
| CVE-2013-7445 |
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2013-6885 |
The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2013-6383 |
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2013-6368 |
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-11 |
| CVE-2013-4350 |
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-22 |
| CVE-2013-4348 |
The skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel through 3.12 allows remote attackers to cause a denial of service (infinite loop) via a small value in the IHL field of a packet with IPIP encapsulation. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-4254 |
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-4127 |
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-2596 |
Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-2224 |
A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552. |
Important |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-23 |
| CVE-2013-2206 |
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-2188 |
A certain Red Hat patch to the do_filp_open function in fs/namei.c in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle failure to obtain write permissions, which allows local users to cause a denial of service (system crash) by leveraging access to a filesystem that is mounted read-only. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2013-1826 |
The xfrm_state_netlink function in net/xfrm/xfrm_user.c in the Linux kernel before 3.5.7 does not properly handle error conditions in dump_one_state function calls, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2013-1819 |
The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2013-1798 |
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-09 |
| CVE-2013-1797 |
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-11 |
| CVE-2013-1796 |
The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-11 |
| CVE-2013-0913 |
Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2013-0871 |
Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2012-6689 |
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2012-4542 |
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes. |
Moderate |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2012-3510 |
Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2012-3412 |
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2010-5321 |
Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-23 |
| CVE-2010-4563 |
The Linux kernel, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2025-05-27 |
2026-01-23 |
| CVE-2010-3432 |
The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2010-0008 |
The sctp_rcv_ootb function in the SCTP implementation in the Linux kernel before 2.6.23 allows remote attackers to cause a denial of service (infinite loop) via (1) an Out Of The Blue (OOTB) chunk or (2) a chunk of zero length. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2009-2692 |
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2025-05-27 |
2025-12-08 |
| CVE-2008-4609 |
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. |
Moderate |
kernel |
是 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2007-3719 |
The process scheduler in the Linux kernel 2.6.16 gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges." |
Low |
kernel |
是 |
完成修复 |
2025-05-27 |
2026-01-25 |
| CVE-2006-6128 |
The ReiserFS functionality in Linux kernel 2.6.18, and possibly other versions, allows local users to cause a denial of service via a malformed ReiserFS file system that triggers memory corruption when a sync is performed. |
Low |
kernel |
是 |
完成修复 |
2025-05-27 |
2026-01-25 |
| CVE-2006-5331 |
The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of service (panic) by triggering execution of an Altivec instruction. |
Moderate |
kernel |
否 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2005-3660 |
Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. |
Low |
kernel |
是 |
完成修复 |
2025-05-27 |
2026-01-25 |
| CVE-2004-0230 |
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. |
Moderate |
kernel:4.18, kernel:3.10, kernel:6.6, kernel:5.10, kernel:4.19 |
是 |
完成修复 |
2025-05-27 |
2026-01-15 |
| CVE-2025-4575 |
Issue summary: Use of -addreject option with the openssl x509 application adds\na trusted use instead of a rejected use for a certificate.\n\nImpact summary: If a user intends to make a trusted certificate rejected for\na particular use it will be instead marked as trusted for that use.\n\nA copy & paste error during minor refactoring of the code introduced this\nissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\nshould be trusted only for the purpose of authenticating TLS servers but not\nfor CMS signature verification and the CMS signature verification is intended\nto be marked as rejected with the -addreject option, the resulting CA\ncertificate will be trusted for CMS signature verification purpose instead.\n\nOnly users which use the trusted certificate format who use the openssl x509\ncommand line application to add rejected uses are affected by this issue.\nThe issues affecting only the command line application are considered to\nbe Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue.\n\nOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\nissue. |
Moderate |
openssl |
否 |
完成修复 |
2025-05-26 |
2026-01-22 |
| CVE-2024-13939 |
String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.\n\nAs stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)."\n\nThis is similar to CVE-2020-36829 |
Important |
perl |
否 |
完成修复 |
2025-05-26 |
2026-01-05 |
| CVE-2022-20565 |
[Unknown description] |
Moderate |
kernel |
是 |
完成修复 |
2025-05-26 |
2026-01-15 |
| CVE-2025-48708 |
No description is available for this CVE. |
Low |
ghostscript |
否 |
完成修复 |
2025-05-24 |
2026-01-22 |
| CVE-2025-48060 |
No description is available for this CVE. |
Important |
jq |
否 |
完成修复 |
2025-05-23 |
2026-01-04 |
| CVE-2025-4638 |
A vulnerability exists in the inftrees.c component of the zlib library, which is bundled within the PointCloudLibrary (PCL). This issue may allow context-dependent attackers to cause undefined behavior by exploiting improper pointer arithmetic.\nSince version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib. |
Important |
java-17-openjdk, java-1.8.0-openjdk, mingw-zlib, java-21-openjdk, thunderbird, zlib, firefox, rsync |
否 |
完成修复 |
2025-05-23 |
2025-12-05 |
| CVE-2025-40775 |
An assertion failure vulnerability was found in the BIND package. When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure. By sending specific messages to the server, an attacker can cause named to terminate unexpectedly, causing a denial of service. |
Important |
bind9.16, bind |
否 |
完成修复 |
2025-05-23 |
2026-01-06 |
| CVE-2025-3887 |
A flaw was found in GStreamer H265 Codec Parsing. This vulnerability allows remote attackers to execute arbitrary code by parsing H265 slice headers. |
Important |
gstreamer1, gstreamer1-plugins-bad-free, mingw-gstreamer1 |
是 |
完成修复 |
2025-05-23 |
2025-12-30 |
| CVE-2025-37984 |
In the Linux kernel, the following vulnerability has been resolved:\ncrypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()\nHerbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa\nimplementation's ->key_size() callback returns an unusually large value.\nHerbert instead suggests (for a division by 8):\nX / 8 + !!(X & 7)\nBased on this formula, introduce a generic DIV_ROUND_UP_POW2() macro and\nuse it in lieu of DIV_ROUND_UP() for ->key_size() return values.\nAdditionally, use the macro in ecc_digits_from_bytes(), whose "nbytes"\nparameter is a ->key_size() return value in some instances, or a\nuser-specified ASN.1 length in the case of ecdsa_get_signature_rs(). |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37983 |
In the Linux kernel, the following vulnerability has been resolved:\nqibfs: fix _another_ leak\nfailure to allocate inode => leaked dentry...\nthis one had been there since the initial merge; to be fair,\nif we are that far OOM, the odds of failing at that particular\nallocation are low... |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37964 |
In the Linux kernel, the following vulnerability has been resolved:\nx86/mm: Eliminate window where TLB flushes may be inadvertently skipped\ntl;dr: There is a window in the mm switching code where the new CR3 is\nset and the CPU should be getting TLB flushes for the new mm. But\nshould_flush_tlb() has a bug and suppresses the flush. Fix it by\nwidening the window where should_flush_tlb() sends an IPI.\nLong Version:\n=== History ===\nThere were a few things leading up to this.\nFirst, updating mm_cpumask() was observed to be too expensive, so it was\nmade lazier. But being lazy caused too many unnecessary IPIs to CPUs\ndue to the now-lazy mm_cpumask(). So code was added to cull\nmm_cpumask() periodically[2]. But that culling was a bit too aggressive\nand skipped sending TLB flushes to CPUs that need them. So here we are\nagain.\n=== Problem ===\nThe too-aggressive code in should_flush_tlb() strikes in this window:\n// Turn on IPIs for this CPU/mm combination, but only\n// if should_flush_tlb() agrees:\ncpumask_set_cpu(cpu, mm_cpumask(next));\nnext_tlb_gen = atomic64_read(&next->context.tlb_gen);\nchoose_new_asid(next, next_tlb_gen, &new_asid, &need_flush);\nload_new_mm_cr3(need_flush);\n// ^ After 'need_flush' is set to false, IPIs *MUST*\n// be sent to this CPU and not be ignored.\nthis_cpu_write(cpu_tlbstate.loaded_mm, next);\n// ^ Not until this point does should_flush_tlb()\n// become true!\nshould_flush_tlb() will suppress TLB flushes between load_new_mm_cr3()\nand writing to 'loaded_mm', which is a window where they should not be\nsuppressed. Whoops.\n=== Solution ===\nThankfully, the fuzzy "just about to write CR3" window is already marked\nwith loaded_mm==LOADED_MM_SWITCHING. Simply checking for that state in\nshould_flush_tlb() is sufficient to ensure that the CPU is targeted with\nan IPI.\nThis will cause more TLB flush IPIs. But the window is relatively small\nand I do not expect this to cause any kind of measurable performance\nimpact.\nUpdate the comment where LOADED_MM_SWITCHING is written since it grew\nyet another user.\nPeter Z also raised a concern that should_flush_tlb() might not observe\n'loaded_mm' and 'is_lazy' in the same order that switch_mm_irqs_off()\nwrites them. Add a barrier to ensure that they are observed in the\norder they are written. |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37963 |
In the Linux kernel, the following vulnerability has been resolved:\narm64: bpf: Only mitigate cBPF programs loaded by unprivileged users\nSupport for eBPF programs loaded by unprivileged users is typically\ndisabled. This means only cBPF programs need to be mitigated for BHB.\nIn addition, only mitigate cBPF programs that were loaded by an\nunprivileged user. Privileged users can also load the same program\nvia eBPF, making the mitigation pointless. |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37954 |
In the Linux kernel, the following vulnerability has been resolved:\nsmb: client: Avoid race in open_cached_dir with lease breaks\nA pre-existing valid cfid returned from find_or_create_cached_dir might\nrace with a lease break, meaning open_cached_dir doesn't consider it\nvalid, and thinks it's newly-constructed. This leaks a dentry reference\nif the allocation occurs before the queued lease break work runs.\nAvoid the race by extending holding the cfid_list_lock across\nfind_or_create_cached_dir and when the result is checked. |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37951 |
In the Linux kernel, the following vulnerability has been resolved:\ndrm/v3d: Add job to pending list if the reset was skipped\nWhen a CL/CSD job times out, we check if the GPU has made any progress\nsince the last timeout. If so, instead of resetting the hardware, we skip\nthe reset and let the timer get rearmed. This gives long-running jobs a\nchance to complete.\nHowever, when `timedout_job()` is called, the job in question is removed\nfrom the pending list, which means it won't be automatically freed through\n`free_job()`. Consequently, when we skip the reset and keep the job\nrunning, the job won't be freed when it finally completes.\nThis situation leads to a memory leak, as exposed in [1] and [2].\nSimilarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when\nGPU is still active"), this patch ensures the job is put back on the\npending list when extending the timeout. |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |
| CVE-2025-37948 |
In the Linux kernel, the following vulnerability has been resolved:\narm64: bpf: Add BHB mitigation to the epilogue for cBPF programs\nA malicious BPF program may manipulate the branch history to influence\nwhat the hardware speculates will happen next.\nOn exit from a BPF program, emit the BHB mititgation sequence.\nThis is only applied for 'classic' cBPF programs that are loaded by\nseccomp. |
Moderate |
kernel:6.6, kernel:4.18 |
否 |
完成修复 |
2025-05-23 |
2026-01-15 |