CVE List

cve编号 漏洞描述 危险等级 包名 是否影响lns23-2 修复状态 发现时间 修复时间
CVE-2023-3865
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Important kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2025-12-11
CVE-2022-49032
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22
CVE-2022-49031
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22
CVE-2022-49027
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49026
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49022
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49017
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49015
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49013
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-49005
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-49004
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48995
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48994
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48992
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10, kernel 完成修复 2024-11-22 2026-01-21
CVE-2022-48977
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48975
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48973
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48971
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48967
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48966
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48962
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48961
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48960
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48959
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48958
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48951
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48949
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48945
In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: fix compose size exceed boundary\n\nsyzkaller found a bug:\n\n BUG: unable to handle page fault for address: ffffc9000a3b1000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n RIP: 0010:memcpy_erms+0x6/0x10\n[...]\n Call Trace:\n \n ? tpg_fill_plane_buffer+0x856/0x15b0\n vivid_fillbuff+0x8ac/0x1110\n vivid_thread_vid_cap_tick+0x361/0xc90\n vivid_thread_vid_cap+0x21a/0x3a0\n kthread+0x143/0x180\n ret_from_fork+0x1f/0x30\n \n\nThis is because we forget to check boundary after adjust compose->height\nint V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem\nfor this case.
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48899
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48898
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48896
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48887
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48878
In the Linux kernel, the following vulnerability has been resolved:
Important kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2025-12-11
CVE-2022-48875
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48859
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48831
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48814
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48772
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48706
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2022-48704
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48702
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48701
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48699
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48693
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48692
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48688
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48660
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48648
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48647
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48646
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2022-48645
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48634
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48633
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2022-48628
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47552
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47498
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel 完成修复 2024-11-22 2026-01-21
CVE-2021-47489
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47484
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47467
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47421
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47410
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-24
CVE-2021-47380
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47359
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47339
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47275
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47247
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2021-47211
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47205
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47105
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47037
In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: q6afe-clocks: fix reprobing of the driver\n\nQ6afe-clocks driver can get reprobed. For example if the APR services\nare restarted after the firmware crash. However currently Q6afe-clocks\ndriver will oops because hw.init will get cleared during first _probe\ncall. Rewrite the driver to fill the clock data at runtime rather than\nusing big static array of clocks.
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-47036
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-21
CVE-2021-47014
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-46957
In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe\n\nThe execution of sys_read end up hitting a BUG_ON() in __find_get_block\nafter installing kprobe at sys_read, the BUG message like the following:\n\n[ 65.708663] ------------[ cut here ]------------\n[ 65.709987] kernel BUG at fs/buffer.c:1251!\n[ 65.711283] Kernel BUG [#1]\n[ 65.712032] Modules linked in:\n[ 65.712925] CPU: 0 PID: 51 Comm: sh Not tainted 5.12.0-rc4 #1\n[ 65.714407] Hardware name: riscv-virtio,qemu (DT)\n[ 65.715696] epc : __find_get_block+0x218/0x2c8\n[ 65.716835] ra : __getblk_gfp+0x1c/0x4a\n[ 65.717831] epc : ffffffe00019f11e ra : ffffffe00019f56a sp : ffffffe002437930\n[ 65.719553] gp : ffffffe000f06030 tp : ffffffe0015abc00 t0 : ffffffe00191e038\n[ 65.721290] t1 : ffffffe00191e038 t2 : 000000000000000a s0 : ffffffe002437960\n[ 65.723051] s1 : ffffffe00160ad00 a0 : ffffffe00160ad00 a1 : 000000000000012a\n[ 65.724772] a2 : 0000000000000400 a3 : 0000000000000008 a4 : 0000000000000040\n[ 65.726545] a5 : 0000000000000000 a6 : ffffffe00191e000 a7 : 0000000000000000\n[ 65.728308] s2 : 000000000000012a s3 : 0000000000000400 s4 : 0000000000000008\n[ 65.730049] s5 : 000000000000006c s6 : ffffffe00240f800 s7 : ffffffe000f080a8\n[ 65.731802] s8 : 0000000000000001 s9 : 000000000000012a s10: 0000000000000008\n[ 65.733516] s11: 0000000000000008 t3 : 00000000000003ff t4 : 000000000000000f\n[ 65.734434] t5 : 00000000000003ff t6 : 0000000000040000\n[ 65.734613] status: 0000000000000100 badaddr: 0000000000000000 cause: 0000000000000003\n[ 65.734901] Call Trace:\n[ 65.735076] [<ffffffe00019f11e>] __find_get_block+0x218/0x2c8\n[ 65.735417] [<ffffffe00020017a>] __ext4_get_inode_loc+0xb2/0x2f6\n[ 65.735618] [<ffffffe000201b6c>] ext4_get_inode_loc+0x3a/0x8a\n[ 65.735802] [<ffffffe000203380>] ext4_reserve_inode_write+0x2e/0x8c\n[ 65.735999] [<ffffffe00020357a>] __ext4_mark_inode_dirty+0x4c/0x18e\n[ 65.736208] [<ffffffe000206bb0>] ext4_dirty_inode+0x46/0x66\n[ 65.736387] [<ffffffe000192914>] __mark_inode_dirty+0x12c/0x3da\n[ 65.736576] [<ffffffe000180dd2>] touch_atime+0x146/0x150\n[ 65.736748] [<ffffffe00010d762>] filemap_read+0x234/0x246\n[ 65.736920] [<ffffffe00010d834>] generic_file_read_iter+0xc0/0x114\n[ 65.737114] [<ffffffe0001f5d7a>] ext4_file_read_iter+0x42/0xea\n[ 65.737310] [<ffffffe000163f2c>] new_sync_read+0xe2/0x15a\n[ 65.737483] [<ffffffe000165814>] vfs_read+0xca/0xf2\n[ 65.737641] [<ffffffe000165bae>] ksys_read+0x5e/0xc8\n[ 65.737816] [<ffffffe000165c26>] sys_read+0xe/0x16\n[ 65.737973] [<ffffffe000003972>] ret_from_syscall+0x0/0x2\n[ 65.738858] ---[ end trace fe93f985456c935d ]---\n\nA simple reproducer looks like:\n echo 'p:myprobe sys_read fd=%a0 buf=%a1 count=%a2' > /sys/kernel/debug/tracing/kprobe_events\n echo 1 > /sys/kernel/debug/tracing/events/kprobes/myprobe/enable\n cat /sys/kernel/debug/tracing/trace\n\nHere's what happens to hit that BUG_ON():\n\n1) After installing kprobe at entry of sys_read, the first instruction\n is replaced by 'ebreak' instruction on riscv64 platform.\n\n2) Once kernel reach the 'ebreak' instruction at the entry of sys_read,\n it trap into the riscv breakpoint handler, where it do something to\n setup for coming single-step of origin instruction, including backup\n the 'sstatus' in pt_regs, followed by disable interrupt during single\n stepping via clear 'SIE' bit of 'sstatus' in pt_regs.\n\n3) Then kernel restore to the instruction slot contains two instructions,\n one is original instruction at entry of sys_read, the other is 'ebreak'.\n Here it trigger a 'Instruction page fault' exception (value at 'scause'\n is '0xc'), if PF is not filled into PageTabe for that slot yet.\n\n4) Again kernel trap into page fault exception handler, where it choose\n different policy according to the state of running kprobe. Because\n afte 2) the state is KPROBE_HIT_SS, so kernel reset the current kprobe\n and 'pc' points back to the probe address.\n\n5) Because 'epc' point back to 'ebreak' instrution at sys_read probe,\n kernel trap into breakpoint handler again, and repeat the operations\n at 2), however 'sstatus' without 'SIE' is keep at 4), it cause the\n real 'sstatus' saved at 2) is overwritten by the one withou 'SIE'.\n\n6) When kernel cross the probe the 'sstatus' CSR restore with value\n without 'SIE', and reach __find_get_block where it requires the\n interrupt must be enabled.\n\nFix this is very trivial, just restore the value of 'sstatus' in pt_regs\nwith backup one at 2) when the instruction being single stepped cause a\npage fault.
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2021-46926
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26596
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-21 2026-01-21
CVE-2023-52474
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-21 2026-01-25
CVE-2022-48771
In the Linux kernel, the following vulnerability has been resolved:\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won't release it. This\nenables userland to refer to a dangling 'file' object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.
Moderate kernel 完成修复 2024-11-21 2026-01-21
CVE-2023-25747
A potential use-after-free in libaudio was fixed by disabling the AAudio backend when running on Android API below version 30.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 110.1.0.
Important firefox 完成修复 2024-11-20 2025-12-30
CVE-2022-39176
BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len.
Important bluez 完成修复 2024-11-20 2026-01-05
CVE-2022-2962
A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Important qemu-kvm, qemu 完成修复 2024-11-20 2025-12-10
CVE-2019-7321
Usage of an uninitialized variable in the function fz_load_jpeg in Artifex MuPDF 1.14 can result in a heap overflow vulnerability that allows an attacker to execute arbitrary code.
Critical mupdf 完成修复 2024-11-20 2026-01-10
CVE-2019-6975
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
Important python-django 完成修复 2024-11-20 2026-01-04
CVE-2019-19844
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Critical python-django 完成修复 2024-11-20 2026-01-10
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Important libssh2 完成修复 2024-11-20 2026-01-08
CVE-2019-14235
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
Important python-django 完成修复 2024-11-20 2026-01-04
CVE-2019-14233
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
Important python-django 完成修复 2024-11-20 2026-01-04
CVE-2019-14232
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
Important python-django 完成修复 2024-11-20 2026-01-04
CVE-2016-4800
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
Critical jetty 完成修复 2024-11-20 2026-01-10
CVE-2014-9356
Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.
Important docker 完成修复 2024-11-20 2026-01-08
CVE-2012-5340
SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.
Important mupdf 完成修复 2024-11-20 2026-01-07
CVE-2024-42089
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-19 2026-01-21
CVE-2023-52736
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-19 2026-01-24
CVE-2022-48434
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).
Important ffmpeg 完成修复 2024-11-19 2025-12-06
CVE-2022-46883
Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107.
Important firefox 完成修复 2024-11-19 2025-12-30
CVE-2022-3965
A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.
Important ffmpeg 完成修复 2024-11-19 2025-12-06
CVE-2022-3964
A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543.
Important ffmpeg 完成修复 2024-11-19 2025-12-06
CVE-2022-36359
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Important python-django 完成修复 2024-11-19 2026-01-04
CVE-2022-36320
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103.
Critical firefox 完成修复 2024-11-19 2026-01-04
CVE-2022-36035
Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy.
Important flux 完成修复 2024-11-19 2026-01-07
CVE-2022-29146
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Important qt5-qtwebengine 完成修复 2024-11-19 2026-01-04

第1页 | 上一页| 下一页 | 最后一页

©龙芯开源社区 all right reserved,powered by Gitbook文档更新时间: 2026-03-16 12:14:50

results matching ""

    No results matching ""

    results matching ""

      No results matching ""