| CVE-2024-45230 |
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. |
Important |
python-django |
否 |
完成修复 |
2025-01-10 |
2026-01-04 |
| CVE-2024-40896 |
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible. |
Critical |
libxml2 |
否 |
完成修复 |
2025-01-10 |
2026-01-10 |
| CVE-2024-38313 |
In certain scenarios a malicious website could attempt to display a fake location URL bar which could mislead users as to the actual website address This vulnerability affects Firefox for iOS < 127. |
Moderate |
firefox |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-3219 |
The\n “socket” module provides a pure-Python fallback to the \nsocket.socketpair() function for platforms that don’t support AF_UNIX, \nsuch as Windows. This pure-Python implementation uses AF_INET or \nAF_INET6 to create a local connected pair of sockets. The connection \nbetween the two sockets was not verified before passing the two sockets \nback to the user, which leaves the server socket vulnerable to a \nconnection race from a malicious local peer.\n\nPlatforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included. |
Important |
python3.11 |
否 |
完成修复 |
2025-01-10 |
2026-01-08 |
| CVE-2024-31393 |
Dragging Javascript URLs to the address bar could cause them to be loaded, bypassing restrictions and security protections This vulnerability affects Firefox for iOS < 124. |
Moderate |
firefox |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-12455 |
A flaw was found in Fedora 41's glibc implementation of getrandom() for ppc64le. This issue occurs due to an implementation error for a vDSO indirect function call and the way the return of success and possible error codes are signaled on this platform. As a result, getrandom() fails to produce randomness or may end up causing an out-of-bounds write. As the attacker has no full control over where the out-of-bounds write may happen, the most likely result is smaller data corruption or a Denial-of-Service of the affected application.\nThis issue is specific for glibc-2.40-12.fc41 as shipped with Fedora 41 only. |
Moderate |
glibc |
否 |
完成修复 |
2025-01-10 |
2025-12-11 |
| CVE-2024-11708 |
Missing thread synchronization primitives could have led to a data race on members of the PlaybackParams structure. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-11706 |
A null pointer dereference may have inadvertently occurred in `pk12util`, and specifically in the `SEC_ASN1DecodeItem_Util` function, when handling malformed or improperly formatted input files. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-11703 |
On Android, Firefox may have inadvertently allowed viewing saved passwords without the required device PIN authentication. This vulnerability affects Firefox < 133. |
Moderate |
firefox |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-11701 |
The incorrect domain may have been displayed in the address bar during an interrupted navigation attempt. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2024-11596 |
ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2025-01-10 |
2026-01-04 |
| CVE-2024-11595 |
FiveCo RAP dissector infinite loop in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2025-01-10 |
2026-01-04 |
| CVE-2024-11053 |
When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password. |
Low |
curl, mysql:8.0 |
否 |
完成修复 |
2025-01-10 |
2026-01-05 |
| CVE-2023-7207 |
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames. |
Moderate |
cpio |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2023-52890 |
NTFS-3G before 75dcdc2 has a use-after-free in ntfs_uppercase_mbs in libntfs-3g/unistr.c. NOTE: discussion suggests that exploitation would be challenging. |
Moderate |
ntfs-3g |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2023-52722 |
An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard. |
Moderate |
ghostscript |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2023-52169 |
The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process. |
Important |
p7zip |
否 |
完成修复 |
2025-01-10 |
2025-12-30 |
| CVE-2023-49441 |
dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query. |
Important |
dnsmasq |
否 |
完成修复 |
2025-01-10 |
2026-01-04 |
| CVE-2023-32190 |
mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges. |
Important |
mlocate |
否 |
完成修复 |
2025-01-10 |
2025-12-29 |
| CVE-2023-20577 |
A vulnerability was found in AMD hardware due to a heap overflow in the SMM module. This issue could allow a local unauthenticated attacker to enable writing to SPI flash to execute arbitrary code. |
Important |
linux-firmware |
否 |
完成修复 |
2025-01-10 |
2026-01-05 |
| CVE-2023-20576 |
A vulnerability was found in AMD hardware due to insufficient verification of data authenticity in AGESA. This issue may allow a local unauthenticated attacker to update SPI ROM data, potentially resulting in denial of service or privilege escalation. |
Important |
linux-firmware |
否 |
完成修复 |
2025-01-10 |
2026-01-05 |
| CVE-2022-48623 |
The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-bounds accesses in a way that allows attackers to obtain sensitive information or cause a denial of service. |
Critical |
perl-Cpanel-JSON-XS |
是 |
完成修复 |
2025-01-10 |
2026-01-10 |
| CVE-2022-20001 |
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt. |
Important |
fish |
否 |
完成修复 |
2025-01-10 |
2026-01-07 |
| CVE-2021-3939 |
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1. |
Important |
accountsservice |
否 |
完成修复 |
2025-01-10 |
2026-01-06 |
| CVE-2021-37311 |
Buffer Overflow vulnerability in fcitx5 5.0.8 allows attackers to cause a denial of service via crafted message to the application's listening port. |
Important |
fcitx |
否 |
完成修复 |
2025-01-10 |
2026-01-07 |
| CVE-2021-29063 |
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 through v1.2.1 when the mpmathify function is called. |
Important |
python-mpmath |
否 |
完成修复 |
2025-01-10 |
2026-01-04 |
| CVE-2021-24000 |
A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type="file">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox < 88. |
Low |
firefox |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2015-8126 |
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. |
Important |
libpng |
否 |
完成修复 |
2025-01-10 |
2026-01-05 |
| CVE-2015-5722 |
buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone. |
Important |
bind |
否 |
完成修复 |
2025-01-10 |
2026-01-06 |
| CVE-2015-5289 |
Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values. |
Moderate |
postgresql |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-5288 |
The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt. |
Moderate |
postgresql |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-4620 |
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone. |
Important |
bind |
否 |
完成修复 |
2025-01-10 |
2026-01-06 |
| CVE-2015-4498 |
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process. |
Important |
firefox |
否 |
完成修复 |
2025-01-10 |
2025-12-29 |
| CVE-2015-3415 |
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. |
Important |
sqlite |
否 |
完成修复 |
2025-01-10 |
2026-01-09 |
| CVE-2015-3414 |
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. |
Important |
sqlite |
否 |
完成修复 |
2025-01-10 |
2026-01-09 |
| CVE-2015-3213 |
The gesture handling code in Clutter before 1.16.2 allows physically proximate attackers to bypass the lock screen via certain (1) mouse or (2) touch gestures. |
Important |
clutter |
否 |
完成修复 |
2025-01-10 |
2026-01-08 |
| CVE-2015-1792 |
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-25 |
| CVE-2015-1791 |
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-25 |
| CVE-2015-1790 |
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-0836 |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. |
Moderate |
firefox |
否 |
完成修复 |
2025-01-10 |
2026-01-24 |
| CVE-2015-0293 |
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-0292 |
Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow. |
Important |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-09 |
| CVE-2015-0289 |
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-0287 |
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-0286 |
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2015-0209 |
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import. |
Moderate |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2014-8176 |
The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data. |
Important |
openssl |
否 |
完成修复 |
2025-01-10 |
2026-01-09 |
| CVE-2013-6393 |
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow. |
Moderate |
libyaml |
否 |
完成修复 |
2025-01-10 |
2026-01-22 |
| CVE-2025-0243 |
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2025-0242 |
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2025-12-29 |
| CVE-2025-0241 |
When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2025-0240 |
Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2025-0239 |
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2025-0238 |
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2025-0237 |
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2025-01-09 |
2026-01-24 |
| CVE-2024-53580 |
iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function. |
Important |
iperf3 |
否 |
完成修复 |
2025-01-09 |
2026-01-06 |
| CVE-2024-50106 |
In the Linux kernel, the following vulnerability has been resolved:nfsd: fix race between laundromat and free_stateidThere is a race between laundromat handling of revoked delegationsand a client sending free_stateid operation. Laundromat threadfinds that delegation has expired and needs to be revoked so itmarks the delegation stid revoked and it puts it on a reaper listbut then it unlock the state lock and the actual delegation revocationhappens without the lock. Once the stid is marked revoked a racingfree_stateid processing thread does the following (1) it callslist_del_init() which removes it from the reaper list and (2) freesthe delegation stid structure. The laundromat thread ends up notcalling the revoke_delegation() function for this particular delegationbut that means it will no release the lock lease that exists onthe file.Now, a new open for this file comes in and ends up finding thatlease list isn't empty and calls nfsd_breaker_owns_lease() which endsup trying to derefence a freed delegation stateid. Leading to thefollowint use-after-free KASAN warning:kernel: ==================================================================kernel: BUG: KASAN: slab-use-after-free in nfsd_breaker_owns_lease+0x140/0x160 [nfsd]kernel: Read of size 8 at addr ffff0000e73cd0c8 by task nfsd/6205kernel:kernel: CPU: 2 UID: 0 PID: 6205 Comm: nfsd Kdump: loaded Not tainted 6.11.0-rc7+ #9kernel: Hardware name: Apple Inc. Apple Virtualization Generic Platform, BIOS 2069.0.0.0.0 08/03/2024kernel: Call trace:kernel: dump_backtrace+0x98/0x120kernel: show_stack+0x1c/0x30kernel: dump_stack_lvl+0x80/0xe8kernel: print_address_description.constprop.0+0x84/0x390kernel: print_report+0xa4/0x268kernel: kasan_report+0xb4/0xf8kernel: _\_asan_report_load8_noabort+0x1c/0x28kernel: nfsd_breaker_owns_lease+0x140/0x160 [nfsd]kernel: nfsd_file_do_acquire+0xb3c/0x11d0 [nfsd]kernel: nfsd_file_acquire_opened+0x84/0x110 [nfsd]kernel: nfs4_get_vfs_file+0x634/0x958 [nfsd]kernel: nfsd4_process_open2+0xa40/0x1a40 [nfsd]kernel: nfsd4_open+0xa08/0xe80 [nfsd]kernel: nfsd4_proc_compound+0xb8c/0x2130 [nfsd]kernel: nfsd_dispatch+0x22c/0x718 [nfsd]kernel: svc_process_common+0x8e8/0x1960 [sunrpc]kernel: svc_process+0x3d4/0x7e0 [sunrpc]kernel: svc_handle_xprt+0x828/0xe10 [sunrpc]kernel: svc_recv+0x2cc/0x6a8 [sunrpc]kernel: nfsd+0x270/0x400 [nfsd]kernel: kthread+0x288/0x310kernel: ret_from_fork+0x10/0x20This patch proposes a fixed that's based on adding 2 new additionalstid's sc_status values that help coordinate between the laundromatand other operations (nfsd4_free_stateid() and nfsd4_delegreturn()).First to make sure, that once the stid is marked revoked, it is notremoved by the nfsd4_free_stateid(), the laundromat take a referenceon the stateid. Then, coordinating whether the stid has been puton the cl_revoked list or we are processing FREE_STATEID and need tomake sure to remove it from the list, each check that state and actaccordingly. If laundromat has added to the cl_revoke list beforethe arrival of FREE_STATEID, then nfsd4_free_stateid() knows to removeit from the list. If nfsd4_free_stateid() finds that operations arrivedbefore laundromat has placed it on cl_revoke list, it marks the statefreed and then laundromat will no longer add it to the list.Also, for nfsd4_delegreturn() when looking for the specified stid,we need to access stid that are marked removed or freeable, it meansthe laundromat has started processing it but hasn't finished and thisdelegreturn needs to return nfserr_deleg_revoked and notnfserr_bad_stateid. The latter will not trigger a FREE_STATEID and thelack of it will leave this stid on the cl_revoked list indefinitely. |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-12-30 |
2026-01-19 |
| CVE-2024-39884 |
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.\nUsers are recommended to upgrade to version 2.4.61, which fixes this issue. |
Important |
httpd |
否 |
完成修复 |
2024-12-27 |
2026-01-09 |
| CVE-2024-49985 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-49952 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-49889 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-49882 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-49878 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-49862 |
** RESERVED \** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-47731 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-47730 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-47703 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-47678 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-46853 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-19 |
| CVE-2024-43860 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-42312 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-42229 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-40945 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2024-39488 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-39468 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2024-35895 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-35848 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-27437 |
In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required. |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2024-27413 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-27051 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-27028 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-26977 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-26966 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-26862 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2024-26808 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2024-10573 |
An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector. |
Moderate |
mpg123 |
否 |
完成修复 |
2024-12-20 |
2026-01-25 |
| CVE-2023-52898 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2023-52880 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2023-52876 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2023-52789 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2023-52750 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2023-52702 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2023-52618 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2023-52617 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2023-52498 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-22 |
| CVE-2023-52456 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2023-52454 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2022-48991 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |
| CVE-2022-48948 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-20 |
2026-01-23 |