| CVE-2023-1992 |
RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2023-04-12 |
2026-01-05 |
| CVE-2023-1990 |
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-12 |
2026-01-22 |
| CVE-2023-1872 |
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2023-04-12 |
2025-12-05 |
| CVE-2023-28260 |
.NET DLL Hijacking Remote Code Execution Vulnerability |
Important |
dotnet |
否 |
完成修复 |
2023-04-11 |
2025-12-05 |
| CVE-2023-25950 |
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. |
Important |
haproxy |
否 |
完成修复 |
2023-04-11 |
2026-01-05 |
| CVE-2023-1989 |
A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-11 |
2026-01-06 |
| CVE-2023-1829 |
tcindex里的uaf漏洞,需要开启CAP_NET_ADMIN权限才能触发,影响版本2.6.12-rc2<=版本<6.3-rc1包含4.19和5.10 |
Important |
kernel |
否 |
完成修复 |
2023-04-11 |
2025-12-05 |
| CVE-2023-30456 |
An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4. |
Important |
kernel, kernel:4.18, kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2023-04-10 |
2025-12-05 |
| CVE-2021-45985 |
In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read. |
Important |
lua, lua-lpeg |
否 |
完成修复 |
2023-04-10 |
2026-01-04 |
| CVE-2023-24538 |
Templates do not properly consider backticks (\`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = \{\{.\}\}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. |
Moderate |
grafana, go-toolset:an8, container-tools:2.0, container-tools:3.0, container-tools:an8, rhc, golang |
是 |
完成修复 |
2023-04-06 |
2025-12-10 |
| CVE-2023-24537 |
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. |
Important |
golang, container-tools:an8 |
是 |
完成修复 |
2023-04-06 |
2025-12-10 |
| CVE-2023-24536 |
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=. |
Moderate |
container-tools:4.0, go-toolset, golang-dbus, grafana, container-tools:2.0, go-toolset:an8, container-tools:3.0, container-tools:an8, git-lfs, golang |
是 |
完成修复 |
2023-04-06 |
2025-12-10 |
| CVE-2023-24534 |
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers. |
Important |
grafana, golang-dbus, go-toolset:an8, container-tools:3.0, container-tools:an8, git-lfs, golang |
是 |
完成修复 |
2023-04-06 |
2025-12-10 |
| CVE-2023-20682 |
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441605; Issue ID: ALPS07441605. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20679 |
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588453. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20677 |
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588436. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20676 |
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07628518. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20675 |
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588569. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20674 |
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588552. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20663 |
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560741; Issue ID: ALPS07560741. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20662 |
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20661 |
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20660 |
In wlan, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588383; Issue ID: ALPS07588383. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-20659 |
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413. |
Moderate |
kernel |
否 |
完成修复 |
2023-04-06 |
2026-01-06 |
| CVE-2023-1838 |
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. |
Important |
kernel, kernel:4.18, kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2023-04-06 |
2025-12-04 |
| CVE-2022-46781 |
An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU memory processing operations to access a limited amount outside of buffer bounds. This affects Valhall r29p0 through r41p0 before r42p0 and Avalon r41p0 before r42p0. |
Low |
kernel |
是 |
完成修复 |
2023-04-06 |
2026-01-23 |
| CVE-2023-28328 |
az6027驱动存在空指针解引用,影响版本2.6.34-rc1<=版本<6.2-rc1,包含4.19和5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-04-05 |
2026-01-06 |
| CVE-2023-28327 |
UNIX协议里存在空指针解引用,影响版本5.3-rc1<=版本<6.1,包含5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-04-05 |
2026-01-06 |
| CVE-2023-1855 |
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem. |
Moderate |
kernel, kernel:4.18, kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2023-04-05 |
2026-01-06 |
| CVE-2023-1582 |
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service. |
Moderate |
kernel 5.10, kernel 4.19, kernel(RHCK)4.18 |
否 |
完成修复 |
2023-04-05 |
2026-01-06 |
| CVE-2023-1382 |
tipc协议中存在空指针解引用,影响版本3.11-rc1<=版本<6.1-rc7,包含4.19和5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-04-05 |
2026-01-06 |
| CVE-2023-28840 |
Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docker*.\n\nSwarm Mode, which is compiled in and delivered by default in dockerd and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.\n\nThe overlay network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.\n\nEncrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.\n\nWhen setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the u32 iptables extension provided by the xt_u32 kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.\n\nTwo iptables rules serve to filter incoming VXLAN datagrams with a VNI that corresponds to an encrypted network and discards unencrypted datagrams. The rules are appended to the end of the INPUT filter chain, following any rules that have been previously set by the system administrator. Administrator-set rules take precedence over the rules Moby sets to discard unencrypted VXLAN datagrams, which can potentially admit unencrypted datagrams that should have been discarded.\n\nThe injection of arbitrary Ethernet frames can enable a Denial of Service attack. A sophisticated attacker may be able to establish a UDP or TCP connection by way of the container’s outbound gateway that would otherwise be blocked by a stateful firewall, or carry out other escalations beyond simple injection by smuggling packets into the overlay network.\n\nPatches are available in Moby releases 23.0.3 and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.\n\nSome workarounds are available. Close the VXLAN port (by default, UDP port 4789) to incoming traffic at the Internet boundary to prevent all VXLAN packet injection, and/or ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. |
Important |
docker, moby |
是 |
完成修复 |
2023-04-04 |
2026-01-08 |
| CVE-2023-1611 |
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea |
Moderate |
kernel |
否 |
完成修复 |
2023-04-03 |
2026-01-06 |
| CVE-2023-1393 |
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. |
Important |
xorg-x11-server, tigervnc, xorg-x11-server-Xwayland |
否 |
完成修复 |
2023-03-31 |
2026-01-04 |
| CVE-2023-28642 |
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image. |
Important |
container-tools:2.0, container-tools:3.0, container-tools:an8, container-tools:4.0, container-tools:1.0, runc |
否 |
完成修复 |
2023-03-30 |
2026-01-07 |
| CVE-2023-1670 |
A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system. |
Low |
kernel |
是 |
完成修复 |
2023-03-30 |
2026-01-23 |
| CVE-2023-28427 |
The Mozilla Foundation Security Advisory describes this flaw as:\n\nThunderbird users who use the Matrix chat protocol were vulnerable to a denial-of-service attack. |
Important |
thunderbird |
否 |
完成修复 |
2023-03-29 |
2026-01-04 |
| CVE-2023-1652 |
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. |
Moderate |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2023-03-29 |
2026-01-06 |
| CVE-2022-42432 |
This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540. |
Low |
kernel |
是 |
完成修复 |
2023-03-29 |
2026-01-22 |
| CVE-2023-28464 |
A double-free vulnerability was found in the hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux Kernel. This issue may cause a denial of service or privilege escalation. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-28 |
2026-01-05 |
| CVE-2023-26924 |
LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. |
Low |
llvm-toolset:an8, llvm |
否 |
完成修复 |
2023-03-28 |
2025-12-05 |
| CVE-2023-1637 |
A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks. |
Moderate |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2023-03-28 |
2026-01-06 |
| CVE-2023-1079 |
|
Moderate |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
否 |
完成修复 |
2023-03-28 |
2026-01-05 |
| CVE-2023-0466 |
A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. |
Low |
openssl |
否 |
完成修复 |
2023-03-28 |
2026-01-22 |
| CVE-2023-0465 |
A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies()' function. |
Low |
openssl |
否 |
完成修复 |
2023-03-28 |
2026-01-22 |
| CVE-2021-3923 |
A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms. |
Low |
kernel |
是 |
完成修复 |
2023-03-28 |
2026-01-22 |
| CVE-2023-1380 |
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service. |
Moderate |
kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-03-27 |
2026-01-06 |
| CVE-2023-25664 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2023-03-25 |
2026-01-04 |
| CVE-2023-1252 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-03-24 |
2026-01-06 |
| CVE-2020-36691 |
An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference. |
Moderate |
kernel 4.19 |
否 |
完成修复 |
2023-03-24 |
2026-01-06 |
| CVE-2023-28772 |
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-23 |
2026-01-06 |
| CVE-2023-1513 |
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10, kernel |
是 |
完成修复 |
2023-03-23 |
2025-12-18 |
| CVE-2023-0464 |
A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()' function. |
Low |
openssl |
否 |
完成修复 |
2023-03-23 |
2026-01-25 |
| CVE-2023-1281 |
A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation. |
Important |
kernel |
是 |
完成修复 |
2023-03-22 |
2025-12-04 |
| CVE-2023-0386 |
Linux内核中发现了一个缺陷,在Linux内核的OverlayFS子系统中,用户如何将有能力的文件从nosuid挂载点复制到另一个挂载点时,发现未经授权的访问具有功能的setuid文件的执行。此uid映射错误允许本地用户升级其在系统上的权限。 |
Important |
kernel |
是 |
完成修复 |
2023-03-22 |
2025-12-04 |
| CVE-2022-4095 |
A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-22 |
2026-01-06 |
| CVE-2023-28176 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory described the issue in which Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 110 and ESR 102.8. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-03-21 |
2025-12-30 |
| CVE-2023-28164 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory described the issue of dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-03-21 |
2026-01-24 |
| CVE-2023-28162 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that while implementing AudioWorklets, some code may have cast one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-03-21 |
2026-01-24 |
| CVE-2023-25752 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that when accessing throttled streams, the count of available bytes needs to be checked in the calling function to be within bounds. This may have led future code to be incorrect and vulnerable. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-03-21 |
2026-01-24 |
| CVE-2023-25751 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of invalidating JIT code while following an iterator. The newly generated code could be overwritten incorrectly, leading to a potentially exploitable crash. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-03-21 |
2025-12-30 |
| CVE-2023-1583 |
A NULL pointer dereference flaw was found in the io_uring sub-component in io_file_bitmap_get of io_uring/filetable.c.the in the Linux kernel. This issue could allow a local user to crash the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-21 |
2026-01-06 |
| CVE-2023-20860 |
A flaw was found in Spring Framework. In this issue, a security bypass is possible due to the behavior of the wildcard pattern. |
Important |
log4j, log4j:2 |
否 |
完成修复 |
2023-03-20 |
2026-01-05 |
| CVE-2022-4744 |
A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-20 |
2026-01-06 |
| CVE-2023-28617 |
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the function org-babel-execute:latex in ob-latex.el can result in arbitrary command execution. |
Important |
emacs |
否 |
完成修复 |
2023-03-19 |
2026-01-07 |
| CVE-2022-48425 |
In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs. |
Important |
kernel:4.19, kernel, kernel:5.10, kernel 4.19, kernel 5.10 |
是 |
完成修复 |
2023-03-19 |
2025-12-04 |
| CVE-2022-48423 |
In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur. |
Important |
kernel 5.10, kernel:5.10, kernel:4.19 |
是 |
完成修复 |
2023-03-19 |
2025-12-04 |
| CVE-2022-48424 |
In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-18 |
2026-01-06 |
| CVE-2023-28531 |
A vulnerability was found in openssh. This issue occurs when adding smartcard keys to ssh-agent(1) with per-hop destination constraints. A logic error prevented the constraints from being communicated to the agent, resulting in the keys being added without constraints. The common cases of non-smartcard keys and keys without destination constraints are unaffected. |
Moderate |
openssh |
否 |
完成修复 |
2023-03-17 |
2026-01-25 |
| CVE-2023-28115 |
Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2. |
Critical |
snappy |
否 |
完成修复 |
2023-03-17 |
2026-01-10 |
| CVE-2023-28487 |
A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where the "sudoreplay -l' command improperly escapes terminal control characters. As sudo's log messages may contain user-controlled strings, this could allow an attacker to inject terminal control commands, leading to a leak of restricted information. |
Moderate |
sudo |
否 |
完成修复 |
2023-03-16 |
2026-01-22 |
| CVE-2023-28486 |
A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where sudo improperly escapes terminal control characters during logging operations. As sudo's log messages may contain user-controlled strings, this may allow an attacker to inject terminal control commands, leading to a leak of restricted information. |
Moderate |
sudo |
否 |
完成修复 |
2023-03-16 |
2026-01-22 |
| CVE-2023-28466 |
|
Moderate |
kernel(ANCK)5.10, kernel |
否 |
完成修复 |
2023-03-16 |
2026-01-06 |
| CVE-2023-28450 |
A flaw was found in Dnsmasq. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020. |
Important |
dnsmasq |
是 |
完成修复 |
2023-03-16 |
2026-01-09 |
| CVE-2022-43441 |
A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability. |
Critical |
sqlite |
否 |
完成修复 |
2023-03-16 |
2025-12-29 |
| CVE-2023-26464 |
A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2. |
Important |
slf4j, log4j |
否 |
完成修复 |
2023-03-15 |
2026-01-04 |
| CVE-2023-25345 |
Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags. |
Important |
swig |
否 |
完成修复 |
2023-03-15 |
2026-01-04 |
| CVE-2023-25344 |
An issue was discovered in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to execute arbitrary code via crafted Object.prototype anonymous function. |
Critical |
swig |
否 |
完成修复 |
2023-03-15 |
2026-01-07 |
| CVE-2023-1390 |
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-15 |
2026-01-04 |
| CVE-2023-1078 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-03-15 |
2026-01-06 |
| CVE-2023-1073 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-03-15 |
2026-01-06 |
| CVE-2023-28163 |
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue that when downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the current user's context. This bug only affects Firefox on Windows. Other versions of Firefox are unaffected. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-03-14 |
2026-01-24 |
| CVE-2023-1032 |
No description is available for this CVE. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-13 |
2026-01-06 |
| CVE-2023-0160 |
No description is available for this CVE. |
Low |
kernel |
是 |
完成修复 |
2023-03-12 |
2026-01-22 |
| CVE-2023-1313 |
Unrestricted Upload of File with Dangerous Type in GitHub repository cockpit-hq/cockpit prior to 2.4.1. |
Important |
cockpit |
否 |
完成修复 |
2023-03-10 |
2026-01-08 |
| CVE-2021-33360 |
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s). |
Critical |
gnuplot |
否 |
完成修复 |
2023-03-10 |
2026-01-10 |
| CVE-2023-27986 |
A flaw was found in the Emacs text editor. A crafted mailto URI, when opened with emacsclient-mail.desktop, can result in Emacs Lisp code injection. |
Important |
emacs |
否 |
完成修复 |
2023-03-08 |
2026-01-07 |
| CVE-2023-27985 |
A flaw was found in the Emacs text editor. When opened with emacsclient-mail.desktop, a crafted mailto URI can result in shell command injection due to lack of compliance with the Desktop Entry Specification. |
Important |
emacs |
否 |
完成修复 |
2023-03-08 |
2026-01-07 |
| CVE-2023-25690 |
A vulnerability was found in httpd. This security issue occurs when some mod_proxy configurations on Apache HTTP Server allow an HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2023-03-08 |
2026-01-09 |
| CVE-2023-24533 |
Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this. |
Important |
golang |
是 |
完成修复 |
2023-03-08 |
2025-12-11 |
| CVE-2023-24532 |
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. |
Moderate |
golang |
是 |
完成修复 |
2023-03-08 |
2025-12-10 |
| CVE-2023-27522 |
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2023-03-07 |
2026-01-09 |
| CVE-2023-1476 |
此CVE没有可用的描述。 |
Important |
kernel |
是 |
完成修复 |
2023-03-07 |
2025-12-04 |
| CVE-2022-40540 |
A flaw was found in the Linux kernel. Memory corruption occurs to the buffer copy without checking the input size while loading firmware in qcom_mdt_read_metadata in drivers/soc/qcom/mdt_loader.c. |
Important |
kernel |
否 |
完成修复 |
2023-03-06 |
2025-12-04 |
| CVE-2023-26604 |
A vulnerability was found in the systemd package. The systemd package does not adequately block local privilege escalation for some Sudo configurations, for example, plausible sudoers files, in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This issue presents a substantial security risk when running systemctl from Sudo because less executes as root when the terminal size is too small to show the complete systemctl output. |
Important |
systemd |
否 |
完成修复 |
2023-03-04 |
2026-01-08 |
| CVE-2023-1161 |
A flaw was found in the ISO 15765 and ISO 10681 dissectors of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing an out-of-bounds write, resulting in a Denial of Service and limited memory corruption. |
Moderate |
wireshark |
否 |
完成修复 |
2023-03-04 |
2026-01-25 |
| CVE-2023-1118 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-03-03 |
2026-01-06 |
| CVE-2023-23006 |
In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Moderate |
kernel |
否 |
完成修复 |
2023-03-02 |
2026-01-04 |
| CVE-2023-23004 |
|
Low |
kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-03-02 |
2026-01-22 |