| CVE-2023-52670 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52635 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52608 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52587 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52559 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52516 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52503 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52501 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52452 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52443 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49030 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49014 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49011 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10, kernel:4.18 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49006 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49002 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-49000 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48986 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48981 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48952 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48946 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48943 |
In the Linux kernel, the following vulnerability has been resolved:\nKVM: x86/mmu: make apf token non-zero to fix bug\nIn current async pagefault logic, when a page is ready, KVM relies on\nkvm_arch_can_dequeue_async_page_present() to determine whether to deliver\na READY event to the Guest. This function test token value of struct\nkvm_vcpu_pv_apf_data, which must be reset to zero by Guest kernel when a\nREADY event is finished by Guest. If value is zero meaning that a READY\nevent is done, so the KVM can deliver another.\nBut the kvm_arch_setup_async_pf() may produce a valid token with zero\nvalue, which is confused with previous mention and may lead the loss of\nthis READY event.\nThis bug may cause task blocked forever in Guest:\nINFO: task stress:7532 blocked for more than 1254 seconds.\nNot tainted 5.10.0 #16\n"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.\ntask:stress state:D stack: 0 pid: 7532 ppid: 1409\nflags:0x00000080\nCall Trace:\n__schedule+0x1e7/0x650\nschedule+0x46/0xb0\nkvm_async_pf_task_wait_schedule+0xad/0xe0\n? exit_to_user_mode_prepare+0x60/0x70\n__kvm_handle_async_pf+0x4f/0xb0\n? asm_exc_page_fault+0x8/0x30\nexc_page_fault+0x6f/0x110\n? asm_exc_page_fault+0x8/0x30\nasm_exc_page_fault+0x1e/0x30\nRIP: 0033:0x402d00\nRSP: 002b:00007ffd31912500 EFLAGS: 00010206\nRAX: 0000000000071000 RBX: ffffffffffffffff RCX: 00000000021a32b0\nRDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0\nRBP: 00000000021262b0 R08: 0000000000000003 R09: 0000000000000086\nR10: 00000000000000eb R11: 00007fefbdf2baa0 R12: 0000000000000000\nR13: 0000000000000002 R14: 000000000007d000 R15: 0000000000001000 |
Moderate |
kernel:4.19, kernel:6.6, kernel:5.10, kernel:4.18 |
否 |
完成修复 |
2024-12-19 |
2025-12-18 |
| CVE-2022-48935 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48916 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48891 |
** RESERVED \** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48879 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48873 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48872 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48871 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48829 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48827 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48774 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2022-48708 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48691 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48673 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48672 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48666 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48657 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48656 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48651 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48642 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2022-48635 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2021-47452 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2021-47448 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2021-47313 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2021-47265 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2021-47094 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2021-46937 |
In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'\n\nDAMON debugfs interface increases the reference counts of 'struct pid's\nfor targets from the 'target_ids' file write callback\n('dbgfs_target_ids_write()'), but decreases the counts only in DAMON\nmonitoring termination callback ('dbgfs_before_terminate()').\n\nTherefore, when 'target_ids' file is repeatedly written without DAMON\nmonitoring start/termination, the reference count is not decreased and\ntherefore memory for the 'struct pid' cannot be freed. This commit\nfixes this issue by decreasing the reference counts when 'target_ids' is\nwritten. |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52904 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-17 |
2026-01-23 |
| CVE-2024-6606 |
Clipboard code failed to check the index on an array access. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 128 and Thunderbird < 128. |
Important |
firefox |
否 |
完成修复 |
2024-12-16 |
2025-12-29 |
| CVE-2024-7868 |
In Xpdf 4.05 (and earlier), invalid header info in a DCT (JPEG) stream can lead to an uninitialized variable in the DCT decoder. The proof-of-concept PDF file causes a segfault attempting to read from an invalid address. |
Important |
xpdf |
否 |
完成修复 |
2024-12-11 |
2025-12-29 |
| CVE-2024-7730 |
A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero. |
Important |
qemu, qemu-kvm |
是 |
完成修复 |
2024-12-11 |
2025-12-12 |
| CVE-2024-53899 |
virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287. |
Important |
python36:3.6, python-virtualenv |
是 |
完成修复 |
2024-12-11 |
2026-01-09 |
| CVE-2024-52804 |
Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue. |
Important |
pcs, python-tornado |
否 |
完成修复 |
2024-12-11 |
2026-01-05 |
| CVE-2024-52531 |
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. |
Important |
libsoup3, libsoup |
否 |
完成修复 |
2024-12-11 |
2026-01-04 |
| CVE-2024-52336 |
A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation. |
Important |
tuned |
否 |
完成修复 |
2024-12-11 |
2025-12-30 |
| CVE-2024-4141 |
Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid character code in a Type 1 font. The root problem was a bounds check that was being optimized away by modern compilers. |
Low |
xpdf |
否 |
完成修复 |
2024-12-11 |
2026-01-25 |
| CVE-2024-11705 |
`NSC_DeriveKey` inadvertently assumed that the `phKey` parameter is always non-NULL. When it was passed as NULL, a segmentation fault (SEGV) occurred, leading to crashes. This behavior conflicted with the PKCS#11 v3.0 specification, which allows `phKey` to be NULL for certain mechanisms. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Low |
firefox |
否 |
完成修复 |
2024-12-11 |
2026-01-24 |
| CVE-2024-11704 |
A double-free issue could have occurred in `sec_pkcs7_decoder_start_decrypt()` when handling an error path. Under specific conditions, the same symmetric key could have been freed twice, potentially leading to memory corruption. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Low |
firefox, thunderbird |
否 |
完成修复 |
2024-12-11 |
2026-01-24 |
| CVE-2024-11702 |
Copying sensitive information from Private Browsing tabs on Android, such as passwords, may have inadvertently stored data in the cloud-based clipboard history if enabled. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2024-12-11 |
2025-12-29 |
| CVE-2024-11700 |
Malicious websites may have been able to perform user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2024-12-11 |
2025-12-29 |
| CVE-2024-11691 |
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2024-12-11 |
2025-12-29 |
| CVE-2024-10220 |
The Kubernetes kubelet component allows arbitrary command execution via specially crafted gitRepo volumes.This issue affects kubelet: through 1.28.11, from 1.29.0 through 1.29.6, from 1.30.0 through 1.30.2. |
Important |
kubernetes |
否 |
完成修复 |
2024-12-11 |
2025-12-29 |
| CVE-2024-10004 |
Opening an external link to an HTTP website when Firefox iOS was previously closed and had an HTTPS tab open could in some cases result in the padlock icon showing an HTTPS indicator incorrectly This vulnerability affects Firefox for iOS < 131.2. |
Critical |
firefox |
否 |
完成修复 |
2024-12-11 |
2026-01-04 |
| CVE-2019-3564 |
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.00. |
Important |
thrift |
否 |
完成修复 |
2024-12-11 |
2026-01-05 |
| CVE-2024-31580 |
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
Important |
pytorch |
否 |
完成修复 |
2024-12-09 |
2026-01-04 |
| CVE-2024-31578 |
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. |
Important |
ffmpeg |
是 |
完成修复 |
2024-12-09 |
2025-12-06 |
| CVE-2024-31392 |
If an insecure element was added to a page after a delay, Firefox would not replace the secure icon with a mixed content security status This vulnerability affects Firefox for iOS < 124. |
Important |
firefox |
否 |
完成修复 |
2024-12-09 |
2025-12-29 |
| CVE-2024-30172 |
An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key. |
Important |
bouncycastle |
否 |
完成修复 |
2024-12-09 |
2025-12-30 |
| CVE-2024-29161 |
HDF5 through 1.14.3 contains a heap buffer overflow in H5A__attr_release_table, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. |
Important |
hdf5 |
否 |
完成修复 |
2024-12-09 |
2026-01-05 |
| CVE-2024-28168 |
Improper Restriction of XML External Entity Reference ('XXE') vulnerability in Apache XML Graphics FOP.\n\nThis issue affects Apache XML Graphics FOP: 2.9.\n\nUsers are recommended to upgrade to version 2.10, which fixes the issue. |
Important |
fop |
否 |
完成修复 |
2024-12-09 |
2026-01-07 |
| CVE-2024-27628 |
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. |
Important |
dcmtk |
否 |
完成修复 |
2024-12-09 |
2025-12-29 |
| CVE-2024-27322 |
Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with. |
Important |
R |
否 |
完成修复 |
2024-12-09 |
2026-01-04 |
| CVE-2024-27318 |
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882. |
Important |
onnx |
否 |
完成修复 |
2024-12-09 |
2025-12-29 |
| CVE-2024-24479 |
A Buffer Overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. |
Important |
wireshark |
否 |
完成修复 |
2024-12-09 |
2026-01-05 |
| CVE-2024-2410 |
The JsonToBinaryStream() function is part of the protocol buffers C++ implementation and is used to parse JSON from a stream. If the input is broken up into separate chunks in a certain way, the parser will attempt to read bytes from a chunk that has already been freed. |
Moderate |
protobuf |
否 |
完成修复 |
2024-12-09 |
2026-01-25 |
| CVE-2023-34153 |
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding. |
Important |
ImageMagick |
否 |
完成修复 |
2024-12-09 |
2026-01-05 |
| CVE-2023-33552 |
Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image. |
Important |
erofs-utils |
否 |
完成修复 |
2024-12-09 |
2026-01-07 |
| CVE-2023-33551 |
Heap Buffer Overflow in the erofsfsck_dirent_iter function in fsck/main.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image. |
Important |
erofs-utils |
否 |
完成修复 |
2024-12-09 |
2026-01-07 |
| CVE-2024-49903 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-07 |
2026-01-22 |
| CVE-2024-49900 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-07 |
2026-01-22 |
| CVE-2024-42104 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-07 |
2026-01-22 |
| CVE-2024-35927 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-12-07 |
2026-01-23 |
| CVE-2023-52705 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-07 |
2026-01-23 |
| CVE-2023-52600 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-07 |
2026-01-22 |
| CVE-2024-50013 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49996 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49965 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49958 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49902 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49877 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-49867 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-47740 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-47691 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-47690 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-47663 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-46840 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-46780 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-45026 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-44969 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-42311 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |