| CVE-2024-42297 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-42157 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-42115 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-42105 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-42077 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-41078 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-12-06 |
2026-01-25 |
| CVE-2024-41068 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-41059 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-41017 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-41016 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-41015 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-40971 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-40902 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-39467 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-38661 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-38637 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-38582 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-38556 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-38547 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-36918 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-36912 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-35998 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-12-06 |
2026-01-25 |
| CVE-2024-35973 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-35936 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-35935 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-35870 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-35868 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-35849 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-35844 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-34027 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-27076 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-27054 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-27001 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26994 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26957 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26944 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26869 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26828 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-26791 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26727 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-26697 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2024-26696 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2024-26644 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2023-52900 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2023-52896 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2023-52893 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-22 |
| CVE-2023-52810 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52805 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52804 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52799 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52774 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2023-52748 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2023-52699 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52682 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52604 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52603 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52602 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52599 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-52500 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2023-52436 |
In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: explicitly null-terminate the xattr list\n\nWhen setting an xattr, explicitly null-terminate the xattr list. This\neliminates the fragile assumption that the unused xattr space is always\nzeroed. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2022-49033 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2022-49007 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2022-48877 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2022-48733 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2022-48664 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2021-47508 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2021-47504 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2021-47382 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2021-47193 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2021-47188 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-23 |
| CVE-2021-46987 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-06 |
2026-01-21 |
| CVE-2023-32763 |
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered. |
Important |
qt5-qtbase |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-28177 |
Mozilla developers and community members Calixte Denizet, Gabriele Svelto, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 110. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111. |
Important |
firefox |
否 |
完成修复 |
2024-12-04 |
2025-12-29 |
| CVE-2023-27579 |
TensorFlow is an end-to-end open source platform for machine learning. Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. This issue has been patched in version 2.12. TensorFlow will also cherrypick the fix commit on TensorFlow 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25801 |
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25676 |
TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. A fix is available in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25675 |
TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25673 |
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25670 |
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25669 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25668 |
TensorFlow is an open source platform for machine learning. Attackers using Tensorflow prior to 2.12.0 or 2.11.1 can access heap memory which is not in the control of user, leading to a crash or remote code execution. The fix will be included in TensorFlow version 2.12.0 and will also cherrypick this commit on TensorFlow version 2.11.1. |
Critical |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-07 |
| CVE-2023-25667 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25663 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `ctx->step_containter()` is a null ptr, the Lookup function will be executed with a null pointer. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25660 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25659 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-25658 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2023-23606 |
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109. |
Important |
firefox |
否 |
完成修复 |
2024-12-04 |
2025-12-29 |
| CVE-2022-45907 |
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. |
Critical |
pytorch |
否 |
完成修复 |
2024-12-04 |
2026-01-07 |
| CVE-2022-43272 |
DCMTK v3.6.7 was discovered to contain a memory leak via the T_ASC_Association object. |
Important |
dcmtk |
否 |
完成修复 |
2024-12-04 |
2026-01-06 |
| CVE-2022-41910 |
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1. |
Critical |
tensorflow |
是 |
完成修复 |
2024-12-04 |
2026-01-07 |
| CVE-2022-41323 |
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. |
Important |
python-django |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2022-37026 |
In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS. |
Critical |
erlang |
否 |
完成修复 |
2024-12-04 |
2026-01-10 |
| CVE-2022-3171 |
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. |
Important |
protobuf |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2022-3109 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability. |
Important |
ffmpeg |
否 |
完成修复 |
2024-12-04 |
2025-12-06 |
| CVE-2022-24761 |
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead. |
Important |
python-waitress |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2022-23613 |
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds. |
Important |
xrdp |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2022-1473 |
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). |
Important |
openssl |
否 |
完成修复 |
2024-12-04 |
2026-01-09 |
| CVE-2022-0699 |
A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and older releases. This issue may allow an attacker to cause a denial of service or have other unspecified impact via control over malloc. |
Critical |
shapelib |
否 |
完成修复 |
2024-12-04 |
2026-01-07 |
| CVE-2021-42385 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function |
Important |
busybox |
否 |
完成修复 |
2024-12-04 |
2026-01-05 |
| CVE-2021-42381 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function |
Important |
busybox |
否 |
完成修复 |
2024-12-04 |
2026-01-05 |