| CVE-2023-3865 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2025-12-11 |
| CVE-2022-49032 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2022-49031 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2022-49027 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49026 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49022 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49017 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49015 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49013 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-49005 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-49004 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48995 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48994 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48992 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48977 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48975 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48973 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48971 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48967 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48966 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48962 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48961 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48960 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48959 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48958 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48951 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48949 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48945 |
In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: fix compose size exceed boundary\n\nsyzkaller found a bug:\n\n BUG: unable to handle page fault for address: ffffc9000a3b1000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n RIP: 0010:memcpy_erms+0x6/0x10\n[...]\n Call Trace:\n \n ? tpg_fill_plane_buffer+0x856/0x15b0\n vivid_fillbuff+0x8ac/0x1110\n vivid_thread_vid_cap_tick+0x361/0xc90\n vivid_thread_vid_cap+0x21a/0x3a0\n kthread+0x143/0x180\n ret_from_fork+0x1f/0x30\n \n\nThis is because we forget to check boundary after adjust compose->height\nint V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem\nfor this case. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48899 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48898 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48896 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48887 |
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48878 |
In the Linux kernel, the following vulnerability has been resolved: |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2025-12-11 |
| CVE-2022-48875 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48859 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48831 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48814 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48772 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48706 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2022-48704 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48702 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48701 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48699 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48693 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48692 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48688 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48660 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48648 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48647 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48646 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2022-48645 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48634 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48633 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2022-48628 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47552 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47498 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47489 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47484 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47467 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47421 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47410 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-24 |
| CVE-2021-47380 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47359 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47339 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47275 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47247 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2021-47211 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47205 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47105 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47037 |
In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: q6afe-clocks: fix reprobing of the driver\n\nQ6afe-clocks driver can get reprobed. For example if the APR services\nare restarted after the firmware crash. However currently Q6afe-clocks\ndriver will oops because hw.init will get cleared during first _probe\ncall. Rewrite the driver to fill the clock data at runtime rather than\nusing big static array of clocks. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-47036 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-21 |
| CVE-2021-47014 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-46957 |
In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe\n\nThe execution of sys_read end up hitting a BUG_ON() in __find_get_block\nafter installing kprobe at sys_read, the BUG message like the following:\n\n[ 65.708663] ------------[ cut here ]------------\n[ 65.709987] kernel BUG at fs/buffer.c:1251!\n[ 65.711283] Kernel BUG [#1]\n[ 65.712032] Modules linked in:\n[ 65.712925] CPU: 0 PID: 51 Comm: sh Not tainted 5.12.0-rc4 #1\n[ 65.714407] Hardware name: riscv-virtio,qemu (DT)\n[ 65.715696] epc : __find_get_block+0x218/0x2c8\n[ 65.716835] ra : __getblk_gfp+0x1c/0x4a\n[ 65.717831] epc : ffffffe00019f11e ra : ffffffe00019f56a sp : ffffffe002437930\n[ 65.719553] gp : ffffffe000f06030 tp : ffffffe0015abc00 t0 : ffffffe00191e038\n[ 65.721290] t1 : ffffffe00191e038 t2 : 000000000000000a s0 : ffffffe002437960\n[ 65.723051] s1 : ffffffe00160ad00 a0 : ffffffe00160ad00 a1 : 000000000000012a\n[ 65.724772] a2 : 0000000000000400 a3 : 0000000000000008 a4 : 0000000000000040\n[ 65.726545] a5 : 0000000000000000 a6 : ffffffe00191e000 a7 : 0000000000000000\n[ 65.728308] s2 : 000000000000012a s3 : 0000000000000400 s4 : 0000000000000008\n[ 65.730049] s5 : 000000000000006c s6 : ffffffe00240f800 s7 : ffffffe000f080a8\n[ 65.731802] s8 : 0000000000000001 s9 : 000000000000012a s10: 0000000000000008\n[ 65.733516] s11: 0000000000000008 t3 : 00000000000003ff t4 : 000000000000000f\n[ 65.734434] t5 : 00000000000003ff t6 : 0000000000040000\n[ 65.734613] status: 0000000000000100 badaddr: 0000000000000000 cause: 0000000000000003\n[ 65.734901] Call Trace:\n[ 65.735076] [<ffffffe00019f11e>] __find_get_block+0x218/0x2c8\n[ 65.735417] [<ffffffe00020017a>] __ext4_get_inode_loc+0xb2/0x2f6\n[ 65.735618] [<ffffffe000201b6c>] ext4_get_inode_loc+0x3a/0x8a\n[ 65.735802] [<ffffffe000203380>] ext4_reserve_inode_write+0x2e/0x8c\n[ 65.735999] [<ffffffe00020357a>] __ext4_mark_inode_dirty+0x4c/0x18e\n[ 65.736208] [<ffffffe000206bb0>] ext4_dirty_inode+0x46/0x66\n[ 65.736387] [<ffffffe000192914>] __mark_inode_dirty+0x12c/0x3da\n[ 65.736576] [<ffffffe000180dd2>] touch_atime+0x146/0x150\n[ 65.736748] [<ffffffe00010d762>] filemap_read+0x234/0x246\n[ 65.736920] [<ffffffe00010d834>] generic_file_read_iter+0xc0/0x114\n[ 65.737114] [<ffffffe0001f5d7a>] ext4_file_read_iter+0x42/0xea\n[ 65.737310] [<ffffffe000163f2c>] new_sync_read+0xe2/0x15a\n[ 65.737483] [<ffffffe000165814>] vfs_read+0xca/0xf2\n[ 65.737641] [<ffffffe000165bae>] ksys_read+0x5e/0xc8\n[ 65.737816] [<ffffffe000165c26>] sys_read+0xe/0x16\n[ 65.737973] [<ffffffe000003972>] ret_from_syscall+0x0/0x2\n[ 65.738858] ---[ end trace fe93f985456c935d ]---\n\nA simple reproducer looks like:\n echo 'p:myprobe sys_read fd=%a0 buf=%a1 count=%a2' > /sys/kernel/debug/tracing/kprobe_events\n echo 1 > /sys/kernel/debug/tracing/events/kprobes/myprobe/enable\n cat /sys/kernel/debug/tracing/trace\n\nHere's what happens to hit that BUG_ON():\n\n1) After installing kprobe at entry of sys_read, the first instruction\n is replaced by 'ebreak' instruction on riscv64 platform.\n\n2) Once kernel reach the 'ebreak' instruction at the entry of sys_read,\n it trap into the riscv breakpoint handler, where it do something to\n setup for coming single-step of origin instruction, including backup\n the 'sstatus' in pt_regs, followed by disable interrupt during single\n stepping via clear 'SIE' bit of 'sstatus' in pt_regs.\n\n3) Then kernel restore to the instruction slot contains two instructions,\n one is original instruction at entry of sys_read, the other is 'ebreak'.\n Here it trigger a 'Instruction page fault' exception (value at 'scause'\n is '0xc'), if PF is not filled into PageTabe for that slot yet.\n\n4) Again kernel trap into page fault exception handler, where it choose\n different policy according to the state of running kprobe. Because\n afte 2) the state is KPROBE_HIT_SS, so kernel reset the current kprobe\n and 'pc' points back to the probe address.\n\n5) Because 'epc' point back to 'ebreak' instrution at sys_read probe,\n kernel trap into breakpoint handler again, and repeat the operations\n at 2), however 'sstatus' without 'SIE' is keep at 4), it cause the\n real 'sstatus' saved at 2) is overwritten by the one withou 'SIE'.\n\n6) When kernel cross the probe the 'sstatus' CSR restore with value\n without 'SIE', and reach __find_get_block where it requires the\n interrupt must be enabled.\n\nFix this is very trivial, just restore the value of 'sstatus' in pt_regs\nwith backup one at 2) when the instruction being single stepped cause a\npage fault. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2021-46926 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26596 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-21 |
2026-01-21 |
| CVE-2023-52474 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-21 |
2026-01-25 |
| CVE-2022-48771 |
In the Linux kernel, the following vulnerability has been resolved:\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won't release it. This\nenables userland to refer to a dangling 'file' object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded. |
Moderate |
kernel |
否 |
完成修复 |
2024-11-21 |
2026-01-21 |
| CVE-2023-25747 |
A potential use-after-free in libaudio was fixed by disabling the AAudio backend when running on Android API below version 30.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 110.1.0. |
Important |
firefox |
否 |
完成修复 |
2024-11-20 |
2025-12-30 |
| CVE-2022-39176 |
BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. |
Important |
bluez |
否 |
完成修复 |
2024-11-20 |
2026-01-05 |
| CVE-2022-2962 |
A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. |
Important |
qemu-kvm, qemu |
否 |
完成修复 |
2024-11-20 |
2025-12-10 |
| CVE-2019-7321 |
Usage of an uninitialized variable in the function fz_load_jpeg in Artifex MuPDF 1.14 can result in a heap overflow vulnerability that allows an attacker to execute arbitrary code. |
Critical |
mupdf |
否 |
完成修复 |
2024-11-20 |
2026-01-10 |
| CVE-2019-6975 |
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function. |
Important |
python-django |
否 |
完成修复 |
2024-11-20 |
2026-01-04 |
| CVE-2019-19844 |
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.) |
Critical |
python-django |
否 |
完成修复 |
2024-11-20 |
2026-01-10 |
| CVE-2019-17498 |
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. |
Important |
libssh2 |
否 |
完成修复 |
2024-11-20 |
2026-01-08 |
| CVE-2019-14235 |
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences. |
Important |
python-django |
否 |
完成修复 |
2024-11-20 |
2026-01-04 |
| CVE-2019-14233 |
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities. |
Important |
python-django |
否 |
完成修复 |
2024-11-20 |
2026-01-04 |
| CVE-2019-14232 |
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. |
Important |
python-django |
否 |
完成修复 |
2024-11-20 |
2026-01-04 |
| CVE-2016-4800 |
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. |
Critical |
jetty |
否 |
完成修复 |
2024-11-20 |
2026-01-10 |
| CVE-2014-9356 |
Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. |
Important |
docker |
否 |
完成修复 |
2024-11-20 |
2026-01-08 |
| CVE-2012-5340 |
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file. |
Important |
mupdf |
否 |
完成修复 |
2024-11-20 |
2026-01-07 |
| CVE-2024-42089 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-19 |
2026-01-21 |
| CVE-2023-52736 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-19 |
2026-01-24 |
| CVE-2022-48434 |
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used). |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-19 |
2025-12-06 |
| CVE-2022-46883 |
Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. *Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. |
Important |
firefox |
否 |
完成修复 |
2024-11-19 |
2025-12-30 |
| CVE-2022-3965 |
A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-19 |
2025-12-06 |
| CVE-2022-3964 |
A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-19 |
2025-12-06 |
| CVE-2022-36359 |
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. |
Important |
python-django |
否 |
完成修复 |
2024-11-19 |
2026-01-04 |
| CVE-2022-36320 |
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103. |
Critical |
firefox |
否 |
完成修复 |
2024-11-19 |
2026-01-04 |
| CVE-2022-36035 |
Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy. |
Important |
flux |
否 |
完成修复 |
2024-11-19 |
2026-01-07 |
| CVE-2022-29146 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability |
Important |
qt5-qtwebengine |
否 |
完成修复 |
2024-11-19 |
2026-01-04 |