| CVE-2023-32181 |
openSUSElibeconf中的不检查输入大小的缓冲区复制(经典缓冲区溢出)漏洞允许通过格式错误的配置文件进行DoS\n此问题影响libeconf:0.5.2之前的版本。 |
Moderate |
libeconf |
否 |
完成修复 |
2023-05-31 |
2026-01-04 |
| CVE-2023-3006 |
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-31 |
2026-01-06 |
| CVE-2023-2985 |
fs中的UAF,可能导致本地dos |
Low |
kernel |
是 |
完成修复 |
2023-05-31 |
2026-01-23 |
| CVE-2023-2598 |
A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-31 |
2026-01-06 |
| CVE-2022-48502 |
An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-31 |
2026-01-06 |
| CVE-2022-25255 |
In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH. |
Important |
qt5, qt5-qtbase |
否 |
完成修复 |
2023-05-31 |
2026-01-04 |
| CVE-2023-34152 |
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured. |
Important |
ImageMagick |
否 |
完成修复 |
2023-05-30 |
2026-01-05 |
| CVE-2023-32342 |
IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 255828. |
Important |
httpd |
否 |
完成修复 |
2023-05-30 |
2026-01-09 |
| CVE-2023-2952 |
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-30 |
2026-01-22 |
| CVE-2023-2879 |
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-05 |
| CVE-2023-2858 |
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-22 |
| CVE-2023-2857 |
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-22 |
| CVE-2023-2856 |
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-22 |
| CVE-2023-2855 |
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-22 |
| CVE-2023-2854 |
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-05-26 |
2026-01-22 |
| CVE-2023-20883 |
In Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, there is potential for a denial-of-service (DoS) attack if Spring MVC is used together with a reverse proxy cache. |
Important |
log4j, log4j:2 |
否 |
完成修复 |
2023-05-26 |
2026-01-05 |
| CVE-2023-2002 |
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-26 |
2026-01-06 |
| CVE-2023-29007 |
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`. |
Important |
git |
否 |
完成修复 |
2023-05-24 |
2026-01-06 |
| CVE-2023-33288 |
An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-22 |
2026-01-06 |
| CVE-2023-33250 |
The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c. |
Low |
kernel |
是 |
完成修复 |
2023-05-21 |
2026-01-23 |
| CVE-2020-36694 |
An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12. |
Moderate |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2023-05-21 |
2026-01-06 |
| CVE-2023-32700 |
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. |
Important |
texlive |
否 |
完成修复 |
2023-05-20 |
2026-01-05 |
| CVE-2023-32213 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-05-19 |
2026-01-24 |
| CVE-2023-32212 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-05-19 |
2026-01-24 |
| CVE-2023-32211 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-05-19 |
2026-01-24 |
| CVE-2023-33203 |
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. |
Low |
kernel:4.19, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-05-18 |
2026-01-22 |
| CVE-2023-32254 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel. |
Important |
kernel 5.10, kernel:5.10, kernel:4.19, kernel 4.19 |
否 |
完成修复 |
2023-05-17 |
2025-12-05 |
| CVE-2023-2203 |
A flaw was found in the WebKitGTK package. An improper input validation issue may lead to a use-after-free vulnerability. This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. This CVE exists because of a CVE-2023-28205 security regression for the WebKitGTK package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2023-05-17 |
2026-01-04 |
| CVE-2023-1972 |
A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability. |
Low |
binutils |
否 |
完成修复 |
2023-05-17 |
2025-12-11 |
| CVE-2023-1859 |
A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. |
Moderate |
kernel:6.6, kernel:5.10, kernel, kernel:4.19 |
否 |
完成修复 |
2023-05-17 |
2026-01-06 |
| CVE-2023-2124 |
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-15 |
2026-01-06 |
| CVE-2023-21106 |
In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel |
Important |
kernel |
否 |
完成修复 |
2023-05-15 |
2025-12-05 |
| CVE-2023-21102 |
In \_\_efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2023-05-15 |
2026-01-06 |
| CVE-2023-24540 |
A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\\t\\n\\f\\\u0020\\u2028\\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. |
Important |
golang, container-tools:2.0, container-tools:3.0, container-tools:an8, container-tools:4.0, go-toolset:an8, grafana |
是 |
完成修复 |
2023-05-12 |
2025-12-10 |
| CVE-2023-29933 |
通过组件mlir::Block::getArgument发现llvm-projectcommitbd456297包含分段错误。 |
Moderate |
llvm |
否 |
完成修复 |
2023-05-11 |
2025-12-05 |
| CVE-2023-29400 |
Templates containing actions in unquoted HTML attributes (e.g. "attr=\{\{.\}\}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. |
Important |
golang, golang-dbus, container-tools:an8, container-tools:3.0, go-toolset:an8, grafana |
是 |
完成修复 |
2023-05-11 |
2025-12-10 |
| CVE-2023-24539 |
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input. |
Important |
golang, container-tools:2.0, golang-dbus, container-tools:an8, container-tools:3.0, container-tools:4.0, grafana |
是 |
完成修复 |
2023-05-11 |
2025-12-10 |
| CVE-2023-28410 |
Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-10 |
2026-01-06 |
| CVE-2023-25568 |
Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at `github.com/ipfs/go-libipfs/bitswap` because users then transitively import `github.com/ipfs/go-libipfs/bitswap/server`. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at `github.com/ipfs/go-libipfs/bitswap` not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: `github.com/ipfs/go-libipfs/bitswap/client`. |
Important |
golang |
是 |
完成修复 |
2023-05-10 |
2025-12-11 |
| CVE-2023-2483 |
In emac_probe, &adpt->work_thread is bound with emac_work_thread. Then it will be started by timeout handler emac_tx_timeout or a IRQ handler emac_isr. If we remove the driver which will call emac_remove to make cleanup, there may be a unfinished work. This could lead to a use-after-free.\n\nUpstream fix:\nhttps://github.com/torvalds/linux/commit/6b6bc5b8bd2d |
Moderate |
kernel |
否 |
完成修复 |
2023-05-10 |
2026-01-06 |
| CVE-2023-2430 |
A vulnerability due to missing lock on overflow for IOPOLL bug in io_cqring_event_overflow() in io_uring.c in Linux kernel through v6.2-rc5, which allows an attacker to trigger Denial of Service.\n\nThis bug has already been reported to kernel developers early in January\nand Jens has done a patch: \nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e12d7a46f65ae4b7d58a5e0c1cbfa825cf8\n\nThe earliest reports can be found at:\nhttps://groups.google.com/g/syzkaller/c/T04q4HMUCdA/m/qVaOqv2RAAAJ |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2023-05-10 |
2026-01-06 |
| CVE-2023-1193 |
The use-after-free in setup_async_work()\n\nMissing check for syncrhonous state and make ksmbd_work object not be dequeued from linked list before free. |
Moderate |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2023-05-10 |
2026-01-06 |
| CVE-2022-43507 |
Improper buffer restrictions in the Intel(R) QAT Engine for OpenSSL before version 0.6.16 may allow a privileged user to potentially enable escalation of privilege via network access. |
Important |
qatengine |
否 |
完成修复 |
2023-05-10 |
2026-01-04 |
| CVE-2022-41808 |
Improper buffer restriction in software for the Intel QAT Driver for Linux before version 1.7.l.4.12 may allow an authenticated user to potentially enable denial of service via local access. |
Moderate |
kernel:5.10, kernel:4.19, kernel |
否 |
完成修复 |
2023-05-10 |
2026-01-06 |
| CVE-2023-32570 |
VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit. |
Moderate |
dav1d |
否 |
完成修复 |
2023-05-09 |
2026-01-22 |
| CVE-2023-32233 |
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-09 |
2026-01-06 |
| CVE-2023-2610 |
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532. |
Important |
vim |
否 |
完成修复 |
2023-05-09 |
2026-01-05 |
| CVE-2023-2609 |
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531. |
Important |
vim |
否 |
完成修复 |
2023-05-09 |
2026-01-05 |
| CVE-2023-2156 |
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-09 |
2026-01-06 |
| CVE-2023-32214 |
协议处理程序ms-cxh和ms-cxh-full可能被用来触发拒绝服务。注意:此攻击仅影响Windows。其他操作系统不受影响。*此漏洞影响Firefox<113、FirefoxESR<102.11和Thunderbird<102.11。 |
Moderate |
firefox, thunderbird, firefox_esr |
否 |
完成修复 |
2023-05-08 |
2026-01-24 |
| CVE-2023-2513 |
A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-08 |
2026-01-06 |
| CVE-2023-32269 |
An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability. |
Moderate |
kernel |
否 |
完成修复 |
2023-05-05 |
2026-01-06 |
| CVE-2023-29942 |
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::Type::isa |
Moderate |
mesa-private-llvm, llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-29941 |
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component matchAndRewriteSortOp(mlir::sparse_tensor::SortOp. |
Moderate |
llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-29939 |
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::spirv::TargetEnv::TargetEnv(mlir::spirv::TargetEnvAttr). |
Moderate |
llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-29935 |
llvm-project commit a0138390 was discovered to contain an assertion failure at !replacements.count(op) && "operation was already replaced. |
Moderate |
llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-29934 |
llvm-project commit 6c01b5c was discovered to contain a segmentation fault via the component mlir::Type::getDialect(). |
Moderate |
llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-29932 |
llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand |
Moderate |
llvm |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2022-20566 |
In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel |
Important |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2023-05-05 |
2025-12-05 |
| CVE-2023-30570 |
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. |
Important |
libreswan |
否 |
完成修复 |
2023-05-03 |
2026-01-05 |
| CVE-2023-2236 |
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nBoth io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. |
Important |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2023-05-01 |
2025-12-05 |
| CVE-2023-31436 |
qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-28 |
2026-01-06 |
| CVE-2022-4662 |
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system. |
Moderate |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2023-04-28 |
2026-01-06 |
| CVE-2022-41849 |
drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-28 |
2026-01-06 |
| CVE-2023-25652 |
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists. |
Important |
git |
否 |
完成修复 |
2023-04-26 |
2026-01-06 |
| CVE-2023-1786 |
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege. |
Moderate |
cloud-init |
否 |
完成修复 |
2023-04-26 |
2026-01-22 |
| CVE-2023-1387 |
Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana. |
Moderate |
grafana |
否 |
完成修复 |
2023-04-26 |
2026-01-22 |
| CVE-2023-0458 |
A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11 |
Moderate |
kernel |
否 |
完成修复 |
2023-04-26 |
2026-01-06 |
| CVE-2023-29012 |
Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory. |
Important |
git |
否 |
完成修复 |
2023-04-25 |
2026-01-06 |
| CVE-2023-29011 |
Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\\etc\\connectrc`. Since `C:\\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `:\\etc\\connectrc` files on multi-user machines. |
Important |
git |
否 |
完成修复 |
2023-04-25 |
2026-01-06 |
| CVE-2023-2269 |
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component. |
Moderate |
kernel:4.19, kernel:4.18, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-04-25 |
2026-01-06 |
| CVE-2023-31085 |
An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-31083 |
An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-31082 |
An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-29469 |
在2.10.4之前的libxml2中发现了一个问题。当对精心设计的XML文档中的空dict字符串进行哈希处理时,dict.c中的xmlDictComputeFastKey可能会生成不确定的值,从而导致各种逻辑和内存错误,例如双重释放。出现此行为的原因是尝试使用空字符串的第一个字节,并且任何值都可能(不仅仅是\\0值)。 |
Moderate |
libxml2 |
否 |
完成修复 |
2023-04-24 |
2026-01-22 |
| CVE-2023-28484 |
在2.10.4之前的libxml2中,解析某些无效的XSD模式可能会导致NULL指针取消引用,进而导致段错误。这发生在xmlschemas.c中的xmlSchemaFixupComplexType中。 |
Moderate |
libxml2 |
否 |
完成修复 |
2023-04-24 |
2026-01-22 |
| CVE-2023-2019 |
A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-2007 |
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-2006 |
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-24 |
2026-01-06 |
| CVE-2023-31084 |
An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-23 |
2026-01-06 |
| CVE-2023-1998 |
The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-21 |
2026-01-06 |
| CVE-2023-2194 |
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-20 |
2026-01-06 |
| CVE-2023-2177 |
A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-20 |
2026-01-06 |
| CVE-2023-2176 |
A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege. |
Important |
kernel:4.19, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-04-20 |
2025-12-05 |
| CVE-2023-1255 |
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one. |
Low |
openssl |
否 |
完成修复 |
2023-04-20 |
2026-01-22 |
| CVE-2023-2166 |
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-19 |
2026-01-06 |
| CVE-2023-2162 |
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-19 |
2026-01-06 |
| CVE-2022-2084 |
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords. |
Moderate |
cloud-init |
否 |
完成修复 |
2023-04-19 |
2026-01-22 |
| CVE-2023-30772 |
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-16 |
2026-01-06 |
| CVE-2023-29013 |
Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2. |
Important |
traefik |
否 |
完成修复 |
2023-04-15 |
2025-12-30 |
| CVE-2023-24607 |
Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3. |
Important |
qt5-qtbase |
否 |
完成修复 |
2023-04-15 |
2026-01-04 |
| CVE-2023-2008 |
A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. |
Important |
kernel |
否 |
完成修复 |
2023-04-14 |
2025-12-05 |
| CVE-2023-30630 |
Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. |
Important |
dmidecode |
否 |
完成修复 |
2023-04-13 |
2026-01-06 |
| CVE-2023-29491 |
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable. |
Important |
ncurses |
否 |
完成修复 |
2023-04-13 |
2026-01-10 |
| CVE-2022-48468 |
protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member. |
Moderate |
protobuf-c |
否 |
完成修复 |
2023-04-13 |
2026-01-22 |
| CVE-2023-1994 |
GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-04-12 |
2026-01-22 |
| CVE-2023-1993 |
LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-04-12 |
2026-01-22 |