From c370789ebaf29baea47b705a9f7e50ad6d11b558 Mon Sep 17 00:00:00 2001 From: Moncef STITI Date: Sun, 4 May 2025 13:34:24 +0200 Subject: [PATCH] =?UTF-8?q?J'avais=20oubli=C3=A9=20de=20push...?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- TP5/Analyses-nginx/nginx114_scan.txt | 792 ++ TP5/Analyses-nginx/nginx122_scan.txt | 1212 +++ TP5/Analyses-nginx/nginx_latest_scan.txt | 577 ++ TP5/Exercice-2.2/Dockerfile | 7 + TP5/Exercice-2.2/app.py | 9 + TP5/Exercice-2.2/custom_flask_app_scan.txt | 4949 +++++++++++ TP5/Exercice-2.2/requirements.txt | 2 + TP5/Exercice-4.2/Dockerfile | 18 + TP5/Exercice-4.2/app.py | 10 + TP5/Exercice-4.2/requirements.txt | 2 + TP5/Exercice-4.3/Dockerfile | 18 + TP5/Exercice-4.3/app.py | 10 + TP5/Exercice-4.3/requirements.txt | 2 + TP5/Reponses.md | 268 + TP5/reports/nginx-scan.html | 3287 +++++++ TP5/reports/nginx-scan.json | 9181 ++++++++++++++++++++ 16 files changed, 20344 insertions(+) create mode 100644 TP5/Analyses-nginx/nginx114_scan.txt create mode 100644 TP5/Analyses-nginx/nginx122_scan.txt create mode 100644 TP5/Analyses-nginx/nginx_latest_scan.txt create mode 100644 TP5/Exercice-2.2/Dockerfile create mode 100644 TP5/Exercice-2.2/app.py create mode 100644 TP5/Exercice-2.2/custom_flask_app_scan.txt create mode 100644 TP5/Exercice-2.2/requirements.txt create mode 100644 TP5/Exercice-4.2/Dockerfile create mode 100644 TP5/Exercice-4.2/app.py create mode 100644 TP5/Exercice-4.2/requirements.txt create mode 100644 TP5/Exercice-4.3/Dockerfile create mode 100644 TP5/Exercice-4.3/app.py create mode 100644 TP5/Exercice-4.3/requirements.txt create mode 100644 TP5/Reponses.md create mode 100644 TP5/reports/nginx-scan.html create mode 100644 TP5/reports/nginx-scan.json diff --git a/TP5/Analyses-nginx/nginx114_scan.txt b/TP5/Analyses-nginx/nginx114_scan.txt new file mode 100644 index 0000000..1fd2b26 --- /dev/null +++ b/TP5/Analyses-nginx/nginx114_scan.txt @@ -0,0 +1,792 @@ + +Report Summary + +┌─────────────────────────┬────────┬─────────────────┬─────────┐ +│ Target │ Type │ Vulnerabilities │ Secrets │ +├─────────────────────────┼────────┼─────────────────┼─────────┤ +│ nginx:1.14 (debian 9.8) │ debian │ 217 │ - │ +└─────────────────────────┴────────┴─────────────────┴─────────┘ +Legend: +- '-': Not scanned +- '0': Clean (no security findings detected) + + +nginx:1.14 (debian 9.8) +======================= +Total: 217 (UNKNOWN: 7, LOW: 43, MEDIUM: 54, HIGH: 81, CRITICAL: 32) + +┌────────────────────────┬──────────────────┬──────────┬──────────────┬────────────────────────┬────────────────────────┬──────────────────────────────────────────────────────────────┐ +│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ apt │ CVE-2020-27350 │ MEDIUM │ fixed │ 1.4.9 │ 1.4.11 │ APT had several integer overflows and underflows while │ +│ │ │ │ │ │ │ parsing .deb pa ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-27350 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-3810 │ │ │ │ 1.4.10 │ Missing input validation in the ar/tar implementations of │ +│ │ │ │ │ │ │ APT before v ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-3810 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ bsdutils │ CVE-2016-2779 │ HIGH │ affected │ 1:2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ coreutils │ CVE-2016-2781 │ │ will_not_fix │ 8.26-3 │ │ coreutils: Non-privileged session can escape to the parent │ +│ │ │ │ │ │ │ session in chroot │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2781 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ debian-archive-keyring │ DLA-2948-1 │ UNKNOWN │ fixed │ 2017.5 │ 2017.5+deb9u2 │ debian-archive-keyring - security update │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ dpkg │ CVE-2022-1664 │ CRITICAL │ │ 1.18.25 │ 1.18.26 │ Dpkg::Source::Archive in dpkg, the Debian package management │ +│ │ │ │ │ │ │ system, b ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1664 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ e2fslibs │ CVE-2022-1304 │ HIGH │ affected │ 1.43.4-2 │ │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5094 │ MEDIUM │ fixed │ │ 1.43.4-2+deb9u1 │ e2fsprogs: Crafted ext4 partition leads to out-of-bounds │ +│ │ │ │ │ │ │ write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5094 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5188 │ │ │ │ 1.43.4-2+deb9u2 │ e2fsprogs: Out-of-bounds write in e2fsck/rehash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5188 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ e2fsprogs │ CVE-2022-1304 │ HIGH │ affected │ │ │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5094 │ MEDIUM │ fixed │ │ 1.43.4-2+deb9u1 │ e2fsprogs: Crafted ext4 partition leads to out-of-bounds │ +│ │ │ │ │ │ │ write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5094 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5188 │ │ │ │ 1.43.4-2+deb9u2 │ e2fsprogs: Out-of-bounds write in e2fsck/rehash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5188 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ gcc-6-base │ CVE-2018-12886 │ HIGH │ will_not_fix │ 6.3.0-18+deb9u1 │ │ gcc: spilling of stack protection address in cfgexpand.c and │ +│ │ │ │ │ │ │ function.c leads to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12886 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ gpgv │ CVE-2018-1000858 │ │ affected │ 2.1.18-8~deb9u4 │ │ gnupg2: Cross site request forgery in dirmngr resulting in │ +│ │ │ │ │ │ │ an information disclosure... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-1000858 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-9234 │ LOW │ │ │ │ GnuPG: Unenforced configuration allows for apparently valid │ +│ │ │ │ │ │ │ certifications actually signed by signing... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-9234 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-14855 │ │ │ │ │ gnupg2: OpenPGP Key Certification Forgeries with SHA-1 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-14855 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ gzip │ CVE-2022-1271 │ HIGH │ fixed │ 1.6-5+b1 │ 1.6-5+deb9u1 │ gzip: arbitrary-file-write vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1271 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libapt-pkg5.0 │ CVE-2020-27350 │ MEDIUM │ │ 1.4.9 │ 1.4.11 │ APT had several integer overflows and underflows while │ +│ │ │ │ │ │ │ parsing .deb pa ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-27350 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-3810 │ │ │ │ 1.4.10 │ Missing input validation in the ar/tar implementations of │ +│ │ │ │ │ │ │ APT before v ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-3810 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libblkid1 │ CVE-2016-2779 │ HIGH │ affected │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libbsd0 │ CVE-2019-20367 │ CRITICAL │ fixed │ 0.8.3-1 │ 0.8.3-1+deb9u1 │ nlist.c in libbsd before 0.10.0 has an out-of-bounds read │ +│ │ │ │ │ │ │ during a com... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-20367 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libbz2-1.0 │ CVE-2019-12900 │ │ affected │ 1.0.6-8.1 │ │ bzip2: bzip2: Data integrity error when decompressing (with │ +│ │ │ │ │ │ │ data integrity tests fail).... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-12900 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libcomerr2 │ CVE-2022-1304 │ HIGH │ │ 1.43.4-2 │ │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5094 │ MEDIUM │ fixed │ │ 1.43.4-2+deb9u1 │ e2fsprogs: Crafted ext4 partition leads to out-of-bounds │ +│ │ │ │ │ │ │ write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5094 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5188 │ │ │ │ 1.43.4-2+deb9u2 │ e2fsprogs: Out-of-bounds write in e2fsck/rehash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5188 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libdb5.3 │ CVE-2019-8457 │ CRITICAL │ will_not_fix │ 5.3.28-12+deb9u1 │ │ sqlite: heap out-of-bound read in function rtreenode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-8457 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libexpat1 │ CVE-2022-22822 │ │ fixed │ 2.2.0-2+deb9u1 │ 2.2.0-2+deb9u4 │ expat: Integer overflow in addBinding in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22822 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22823 │ │ │ │ │ expat: Integer overflow in build_model in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22823 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22824 │ │ │ │ │ expat: Integer overflow in defineAttribute in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22824 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-23852 │ │ │ │ 2.2.0-2+deb9u5 │ expat: Integer overflow in function XML_GetBuffer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23852 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-25235 │ │ │ │ │ expat: Malformed 2- and 3-byte UTF-8 sequences can lead to │ +│ │ │ │ │ │ │ arbitrary code... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-25235 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-25236 │ │ │ │ │ expat: Namespace-separator characters in "xmlns[:prefix]" │ +│ │ │ │ │ │ │ attribute values can lead to arbitrary code... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-25236 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-25315 │ │ │ │ │ expat: Integer overflow in storeRawNames() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-25315 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-20843 │ HIGH │ │ │ 2.2.0-2+deb9u2 │ expat: large number of colons in input makes parser consume │ +│ │ │ │ │ │ │ high amount... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20843 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-15903 │ │ │ │ 2.2.0-2+deb9u3 │ expat: heap-based buffer over-read via crafted XML input │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-15903 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-45960 │ │ │ │ 2.2.0-2+deb9u4 │ expat: Large number of prefixed XML attributes on a single │ +│ │ │ │ │ │ │ tag can... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-45960 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-46143 │ │ │ │ │ expat: Integer overflow in doProlog in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46143 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22825 │ │ │ │ │ expat: Integer overflow in lookup in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22825 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22826 │ │ │ │ │ expat: Integer overflow in nextScaffoldPart in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22826 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22827 │ │ │ │ │ expat: Integer overflow in storeAtts in xmlparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22827 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-23990 │ │ │ │ │ expat: integer overflow in the doProlog function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23990 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-25313 │ MEDIUM │ │ │ 2.2.0-2+deb9u5 │ expat: Stack exhaustion in doctype parsing │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-25313 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libfdisk1 │ CVE-2016-2779 │ HIGH │ affected │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libfreetype6 │ CVE-2020-15999 │ CRITICAL │ fixed │ 2.6.3-3.2 │ 2.6.3-3.2+deb9u2 │ freetype: Heap-based buffer overflow due to integer │ +│ │ │ │ │ │ │ truncation in Load_SBit_Png │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-15999 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-27404 │ │ affected │ │ │ FreeType: Buffer overflow in sfnt_init_face │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27404 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-27405 │ HIGH │ │ │ │ FreeType: Segmentation violation via FNT_Size_Request │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27405 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-27406 │ │ │ │ │ Freetype: Segmentation violation via FT_Request_Size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27406 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcc1 │ CVE-2018-12886 │ │ will_not_fix │ 1:6.3.0-18+deb9u1 │ │ gcc: spilling of stack protection address in cfgexpand.c and │ +│ │ │ │ │ │ │ function.c leads to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12886 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcrypt20 │ CVE-2021-33560 │ │ affected │ 1.7.6-2+deb9u3 │ │ libgcrypt: mishandles ElGamal encryption because it lacks │ +│ │ │ │ │ │ │ exponent blinding to address a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33560 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-13627 │ MEDIUM │ │ │ │ libgcrypt: ECDSA timing attack allowing private key leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-13627 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-40528 │ │ fixed │ │ 1.7.6-2+deb9u4 │ libgcrypt: ElGamal implementation allows plaintext recovery │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-40528 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgd3 │ CVE-2017-6363 │ HIGH │ affected │ 2.2.4-2+deb9u4 │ │ In the GD Graphics Library (aka LibGD) through 2.2.5, there │ +│ │ │ │ │ │ │ is a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-6363 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-38115 │ MEDIUM │ │ │ │ read_header_tga in gd_tga.c in the GD Graphics Library (aka │ +│ │ │ │ │ │ │ LibGD) thr ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-38115 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-40812 │ │ │ │ │ The GD Graphics Library (aka LibGD) through 2.3.2 has an │ +│ │ │ │ │ │ │ out-of-bounds ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-40812 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-14553 │ LOW │ │ │ │ gd: NULL pointer dereference in gdImageClone │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-14553 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-11038 │ │ fixed │ │ 2.2.4-2+deb9u5 │ gd: Information disclosure in gdImageCreateFromXbm() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-11038 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libicu57 │ CVE-2020-10531 │ HIGH │ │ 57.1-6+deb9u2 │ 57.1-6+deb9u4 │ ICU: Integer overflow in UnicodeString::doAppend() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-10531 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-21913 │ MEDIUM │ │ │ 57.1-6+deb9u5 │ icu: Use after free in pkg_createWithAssemblyCode function │ +│ │ │ │ │ │ │ in tools/pkgdata/pkgdata.cpp │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-21913 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libjpeg62-turbo │ CVE-2019-2201 │ HIGH │ │ 1:1.5.1-2 │ 1:1.5.1-2+deb9u2 │ libjpeg-turbo: several integer overflows and subsequent │ +│ │ │ │ │ │ │ segfaults when attempting to compress/decompress │ +│ │ │ │ │ │ │ gigapixel... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-2201 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-13790 │ │ │ │ 1:1.5.1-2+deb9u1 │ libjpeg-turbo: heap-based buffer over-read in get_rgb_row() │ +│ │ │ │ │ │ │ in rdppm.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-13790 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14152 │ │ │ │ │ libjpeg: improper handling of max_memory_to_use setting can │ +│ │ │ │ │ │ │ lead to excessive memory consumption... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14152 │ +│ ├──────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-1152 │ MEDIUM │ │ │ │ libjpeg-turbo: Divide by zero allows for denial of service │ +│ │ │ │ │ │ │ via crafted BMP... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-1152 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-14498 │ │ │ │ │ libjpeg-turbo: heap-based buffer over-read via crafted 8-bit │ +│ │ │ │ │ │ │ BMP in get_8bit_row in rdbmp.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-14498 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ liblz4-1 │ CVE-2021-3520 │ CRITICAL │ │ 0.0~r131-2+b1 │ 0.0~r131-2+deb9u1 │ lz4: memory corruption due to an integer overflow bug caused │ +│ │ │ │ │ │ │ by memmove... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3520 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17543 │ LOW │ will_not_fix │ │ │ lz4: heap-based buffer overflow in LZ4_write32 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17543 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ liblzma5 │ CVE-2022-1271 │ HIGH │ fixed │ 5.2.2-1.2+b1 │ 5.2.2-1.2+deb9u1 │ gzip: arbitrary-file-write vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1271 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libmount1 │ CVE-2016-2779 │ │ affected │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libncurses5 │ CVE-2022-29458 │ HIGH │ │ 6.0+20161126-1+deb9u2 │ │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19211 │ LOW │ fix_deferred │ │ │ ncurses: Null pointer dereference at function │ +│ │ │ │ │ │ │ _nc_parse_entry in parse_entry.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19211 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17594 │ │ affected │ │ │ ncurses: heap-based buffer overflow in the _nc_find_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17594 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17595 │ │ │ │ │ ncurses: heap-based buffer overflow in the fmt_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17595 │ +├────────────────────────┼──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libncursesw5 │ CVE-2022-29458 │ HIGH │ │ │ │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19211 │ LOW │ fix_deferred │ │ │ ncurses: Null pointer dereference at function │ +│ │ │ │ │ │ │ _nc_parse_entry in parse_entry.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19211 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17594 │ │ affected │ │ │ ncurses: heap-based buffer overflow in the _nc_find_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17594 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17595 │ │ │ │ │ ncurses: heap-based buffer overflow in the fmt_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17595 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpcre3 │ CVE-2020-14155 │ MEDIUM │ │ 2:8.39-3 │ │ pcre: Integer overflow when parsing callout numeric │ +│ │ │ │ │ │ │ arguments │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14155 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpng16-16 │ CVE-2017-12652 │ CRITICAL │ will_not_fix │ 1.6.28-1 │ │ libpng: does not check length of chunks against user limit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-12652 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-7317 │ MEDIUM │ fixed │ │ 1.6.28-1+deb9u1 │ libpng: use-after-free in png_image_free in png.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-7317 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsepol1 │ CVE-2021-36084 │ LOW │ affected │ 2.6-2 │ │ libsepol: use-after-free in __cil_verify_classperms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36084 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36085 │ │ │ │ │ libsepol: use-after-free in __cil_verify_classperms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36085 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36086 │ │ │ │ │ libsepol: use-after-free in cil_reset_classpermission() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36086 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36087 │ │ │ │ │ libsepol: heap-based buffer overflow in ebitmap_match_any() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36087 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsmartcols1 │ CVE-2016-2779 │ HIGH │ │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libss2 │ CVE-2022-1304 │ HIGH │ │ 1.43.4-2 │ │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5094 │ MEDIUM │ fixed │ │ 1.43.4-2+deb9u1 │ e2fsprogs: Crafted ext4 partition leads to out-of-bounds │ +│ │ │ │ │ │ │ write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5094 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-5188 │ │ │ │ 1.43.4-2+deb9u2 │ e2fsprogs: Out-of-bounds write in e2fsck/rehash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-5188 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libssl1.1 │ CVE-2022-1292 │ CRITICAL │ │ 1.1.0j-1~deb9u1 │ 1.1.0l-1~deb9u6 │ openssl: c_rehash script allows command injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1292 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1543 │ HIGH │ │ │ 1.1.0k-1~deb9u1 │ openssl: ChaCha20-Poly1305 with long nonces │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1543 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-23840 │ │ │ │ 1.1.0l-1~deb9u3 │ openssl: integer overflow in CipherUpdate │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-23840 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3712 │ │ │ │ 1.1.0l-1~deb9u4 │ openssl: Read buffer overruns processing ASN.1 strings │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3712 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0778 │ │ │ │ 1.1.0l-1~deb9u5 │ openssl: Infinite loop in BN_mod_sqrt() reachable when │ +│ │ │ │ │ │ │ parsing certificates │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0778 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1547 │ MEDIUM │ │ │ 1.1.0l-1~deb9u1 │ openssl: side-channel weak encryption vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1547 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1551 │ │ │ │ 1.1.0l-1~deb9u5 │ openssl: Integer overflow in RSAZ modular exponentiation on │ +│ │ │ │ │ │ │ x86_64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1551 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-1971 │ │ │ │ 1.1.0l-1~deb9u2 │ openssl: EDIPARTYNAME NULL pointer de-reference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-1971 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-23841 │ │ │ │ 1.1.0l-1~deb9u3 │ openssl: NULL pointer dereference in │ +│ │ │ │ │ │ │ X509_issuer_and_serial_hash() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-23841 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-4160 │ │ will_not_fix │ │ │ openssl: Carry propagation bug in the MIPS32 and MIPS64 │ +│ │ │ │ │ │ │ squaring procedure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-4160 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1563 │ LOW │ fixed │ │ 1.1.0l-1~deb9u1 │ openssl: information disclosure in PKCS7_dataDecode and │ +│ │ │ │ │ │ │ CMS_decrypt_set1_pkey │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1563 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libstdc++6 │ CVE-2018-12886 │ HIGH │ will_not_fix │ 6.3.0-18+deb9u1 │ │ gcc: spilling of stack protection address in cfgexpand.c and │ +│ │ │ │ │ │ │ function.c leads to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12886 │ +├────────────────────────┼──────────────────┤ ├──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsystemd0 │ CVE-2018-15686 │ │ fixed │ 232-25+deb9u9 │ 232-25+deb9u10 │ systemd: line splitting via fgets() allows for state │ +│ │ │ │ │ │ │ injection during daemon-reexec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-15686 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3842 │ │ │ │ 232-25+deb9u11 │ systemd: Spoofing of XDG_SEAT allows for actions to be │ +│ │ │ │ │ │ │ checked against "allow_active"... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3842 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3843 │ │ will_not_fix │ │ │ systemd: services with DynamicUser can create SUID/SGID │ +│ │ │ │ │ │ │ binaries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3843 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3844 │ │ │ │ │ systemd: services with DynamicUser can get new privileges │ +│ │ │ │ │ │ │ and create SGID binaries... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3844 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-1712 │ │ fixed │ │ 232-25+deb9u14 │ systemd: use-after-free when asynchronous polkit queries are │ +│ │ │ │ │ │ │ performed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-1712 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-1049 │ MEDIUM │ │ │ 232-25+deb9u10 │ systemd: automount: access to automounted volumes can lock │ +│ │ │ │ │ │ │ up │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-1049 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-33910 │ │ │ │ 232-25+deb9u13 │ systemd: uncontrolled allocation on the stack in function │ +│ │ │ │ │ │ │ unit_name_path_escape leads to crash... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33910 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3997 │ │ will_not_fix │ │ │ systemd: Uncontrolled recursion in systemd-tmpfiles when │ +│ │ │ │ │ │ │ removing files │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3997 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-16888 │ LOW │ │ │ │ systemd: kills privileged process if unprivileged PIDFile │ +│ │ │ │ │ │ │ was tampered │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-16888 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-6954 │ │ │ │ │ systemd: Mishandled symlinks in systemd-tmpfiles allows │ +│ │ │ │ │ │ │ local users to obtain ownership of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-6954 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libtiff5 │ CVE-2018-12900 │ HIGH │ fixed │ 4.0.8-2+deb9u4 │ 4.0.8-2+deb9u5 │ libtiff: Heap-based buffer overflow in the │ +│ │ │ │ │ │ │ cpSeparateBufToContigBuf function resulting in a denial... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12900 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-17100 │ │ │ │ │ libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-17100 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17546 │ │ │ │ │ libtiff: integer overflow leading to heap-based buffer │ +│ │ │ │ │ │ │ overflow in tif_getimage.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17546 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-19131 │ │ │ │ 4.0.8-2+deb9u7 │ libtiff: a buffer overflow via the "invertImage()" may lead │ +│ │ │ │ │ │ │ to DoS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-19131 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-35523 │ │ │ │ 4.0.8-2+deb9u6 │ libtiff: Integer overflow in tif_getimage.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-35523 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-35524 │ │ │ │ │ libtiff: Heap-based buffer overflow in TIFF2PDF tool │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-35524 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-17000 │ MEDIUM │ │ │ 4.0.8-2+deb9u5 │ libtiff: NULL pointer dereference in function _TIFFmemcmp at │ +│ │ │ │ │ │ │ tif_unix.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-17000 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19210 │ │ │ │ │ libtiff: NULL pointer dereference in TIFFWriteDirectorySec │ +│ │ │ │ │ │ │ function in tif_dirwrite.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19210 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-14973 │ │ │ │ │ libtiff: integer overflow in _TIFFCheckMalloc and │ +│ │ │ │ │ │ │ _TIFFCheckRealloc in tif_aux.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-14973 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-7663 │ │ │ │ │ libtiff: integer overflow in libtiff/tif_dirwrite.c │ +│ │ │ │ │ │ │ resulting in an invalid pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-7663 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-18768 │ │ │ │ 4.0.8-2+deb9u7 │ libtiff: heap-based buffer overflow in _TIFFmemcpy() in │ +│ │ │ │ │ │ │ tif_unix.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-18768 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-19144 │ │ │ │ │ libtiff: heap-based buffer overflow in _TIFFmemcpy() in │ +│ │ │ │ │ │ │ tif_unix.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-19144 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0561 │ │ │ │ 4.0.8-2+deb9u8 │ libtiff: Denial of Service via crafted TIFF file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0561 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0562 │ │ │ │ │ libtiff: Null source pointer lead to Denial of Service via │ +│ │ │ │ │ │ │ crafted TIFF... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0562 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-22844 │ │ │ │ │ libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-22844 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libtinfo5 │ CVE-2022-29458 │ HIGH │ affected │ 6.0+20161126-1+deb9u2 │ │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19211 │ LOW │ fix_deferred │ │ │ ncurses: Null pointer dereference at function │ +│ │ │ │ │ │ │ _nc_parse_entry in parse_entry.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19211 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17594 │ │ affected │ │ │ ncurses: heap-based buffer overflow in the _nc_find_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17594 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17595 │ │ │ │ │ ncurses: heap-based buffer overflow in the fmt_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17595 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libudev1 │ CVE-2018-15686 │ HIGH │ fixed │ 232-25+deb9u9 │ 232-25+deb9u10 │ systemd: line splitting via fgets() allows for state │ +│ │ │ │ │ │ │ injection during daemon-reexec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-15686 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3842 │ │ │ │ 232-25+deb9u11 │ systemd: Spoofing of XDG_SEAT allows for actions to be │ +│ │ │ │ │ │ │ checked against "allow_active"... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3842 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3843 │ │ will_not_fix │ │ │ systemd: services with DynamicUser can create SUID/SGID │ +│ │ │ │ │ │ │ binaries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3843 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-3844 │ │ │ │ │ systemd: services with DynamicUser can get new privileges │ +│ │ │ │ │ │ │ and create SGID binaries... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-3844 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-1712 │ │ fixed │ │ 232-25+deb9u14 │ systemd: use-after-free when asynchronous polkit queries are │ +│ │ │ │ │ │ │ performed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-1712 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-1049 │ MEDIUM │ │ │ 232-25+deb9u10 │ systemd: automount: access to automounted volumes can lock │ +│ │ │ │ │ │ │ up │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-1049 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-33910 │ │ │ │ 232-25+deb9u13 │ systemd: uncontrolled allocation on the stack in function │ +│ │ │ │ │ │ │ unit_name_path_escape leads to crash... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33910 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3997 │ │ will_not_fix │ │ │ systemd: Uncontrolled recursion in systemd-tmpfiles when │ +│ │ │ │ │ │ │ removing files │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3997 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-16888 │ LOW │ │ │ │ systemd: kills privileged process if unprivileged PIDFile │ +│ │ │ │ │ │ │ was tampered │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-16888 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-6954 │ │ │ │ │ systemd: Mishandled symlinks in systemd-tmpfiles allows │ +│ │ │ │ │ │ │ local users to obtain ownership of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-6954 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libuuid1 │ CVE-2016-2779 │ HIGH │ affected │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libwebp6 │ CVE-2018-25009 │ CRITICAL │ fixed │ 0.5.2-1 │ 0.5.2-1+deb9u1 │ libwebp: out-of-bounds read in WebPMuxCreateInternal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25009 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-25010 │ │ │ │ │ libwebp: out-of-bounds read in ApplyFilter() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25010 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-25011 │ │ │ │ │ libwebp: heap-based buffer overflow in PutLE16() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25011 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-25012 │ │ │ │ │ libwebp: out-of-bounds read in WebPMuxCreateInternal() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25012 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-25013 │ │ │ │ │ libwebp: out-of-bounds read in ShiftBytes() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25013 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-25014 │ │ │ │ │ libwebp: use of uninitialized value in ReadSymbol() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25014 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36328 │ │ │ │ │ libwebp: heap-based buffer overflow in WebPDecode*Into │ +│ │ │ │ │ │ │ functions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36328 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36329 │ │ │ │ │ libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36329 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36330 │ │ │ │ │ libwebp: out-of-bounds read in ChunkVerifyAndAssign() in │ +│ │ │ │ │ │ │ mux/muxread.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36330 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36331 │ │ │ │ │ libwebp: out-of-bounds read in ChunkAssignData() in │ +│ │ │ │ │ │ │ mux/muxinternal.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36331 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36332 │ HIGH │ will_not_fix │ │ │ libwebp: excessive memory allocation when reading a file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36332 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libx11-6 │ CVE-2021-31535 │ CRITICAL │ fixed │ 2:1.6.4-3+deb9u1 │ 2:1.6.4-3+deb9u4 │ libX11: missing request length checks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-31535 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14363 │ HIGH │ │ │ 2:1.6.4-3+deb9u3 │ libX11: integer overflow leads to double free in locale │ +│ │ │ │ │ │ │ handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14363 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14344 │ MEDIUM │ │ │ 2:1.6.4-3+deb9u2 │ libX11: Heap overflow in the X input method client │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14344 │ +├────────────────────────┼──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libx11-data │ CVE-2021-31535 │ CRITICAL │ │ │ 2:1.6.4-3+deb9u4 │ libX11: missing request length checks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-31535 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14363 │ HIGH │ │ │ 2:1.6.4-3+deb9u3 │ libX11: integer overflow leads to double free in locale │ +│ │ │ │ │ │ │ handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14363 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14344 │ MEDIUM │ │ │ 2:1.6.4-3+deb9u2 │ libX11: Heap overflow in the X input method client │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14344 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libxml2 │ CVE-2017-8872 │ CRITICAL │ │ 2.9.4+dfsg1-2.2+deb9u2 │ 2.9.4+dfsg1-2.2+deb9u3 │ libxml2: Out-of-bounds read in htmlParseTryOrFinish │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-8872 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-16932 │ HIGH │ │ │ 2.9.4+dfsg1-2.2+deb9u6 │ libxml2: Infinite recursion in parameter entities │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-16932 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-5130 │ │ │ │ │ chromium-browser: heap overflow in libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-5130 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-14404 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u3 │ libxml2: NULL pointer dereference in xmlXPathCompOpEval() │ +│ │ │ │ │ │ │ function in xpath.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-14404 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-19956 │ │ │ │ │ libxml2: memory leak in xmlParseBalancedChunkMemoryRecover │ +│ │ │ │ │ │ │ in parser.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-19956 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-20388 │ │ │ │ │ libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-20388 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-7595 │ │ │ │ │ libxml2: infinite loop in xmlStringLenDecodeEntities in some │ +│ │ │ │ │ │ │ end-of-file situations │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-7595 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3516 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u4 │ libxml2: Use-after-free in xmlEncodeEntitiesInternal() in │ +│ │ │ │ │ │ │ entities.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3516 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3517 │ │ │ │ │ libxml2: Heap-based buffer overflow in │ +│ │ │ │ │ │ │ xmlEncodeEntitiesInternal() in entities.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3517 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3518 │ │ │ │ │ libxml2: Use-after-free in xmlXIncludeDoProcess() in │ +│ │ │ │ │ │ │ xinclude.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3518 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-23308 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u6 │ libxml2: Use-after-free of ID and IDREF attributes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23308 │ +│ ├──────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2016-9318 │ MEDIUM │ │ │ │ libxml2: XML External Entity vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-9318 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-18258 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u3 │ libxml2: Unrestricted memory usage in xz_head() function in │ +│ │ │ │ │ │ │ xzlib.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-18258 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-5969 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u6 │ libxml2: Null pointer dereference in xmlSaveDoc │ +│ │ │ │ │ │ │ implementation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-5969 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-14567 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u3 │ libxml2: Infinite loop caused by incorrect error detection │ +│ │ │ │ │ │ │ during LZMA decompression │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-14567 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-24977 │ │ │ │ │ libxml2: Buffer overflow vulnerability in │ +│ │ │ │ │ │ │ xmlEncodeEntitiesInternal() in entities.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-24977 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3537 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u4 │ libxml2: NULL pointer dereference when post-validating mixed │ +│ │ │ │ │ │ │ content parsed in recovery mode... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3537 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3541 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u5 │ libxml2: Exponential entity expansion attack bypasses all │ +│ │ │ │ │ │ │ existing protection mechanisms │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3541 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-29824 │ │ │ │ 2.9.4+dfsg1-2.2+deb9u7 │ libxml2: integer overflows in xmlBuf and xmlBuffer lead to │ +│ │ │ │ │ │ │ out-of-bounds write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29824 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libxslt1.1 │ CVE-2019-11068 │ CRITICAL │ │ 1.1.29-2.1 │ 1.1.29-2.1+deb9u1 │ libxslt: xsltCheckRead and xsltCheckWrite routines security │ +│ │ │ │ │ │ │ bypass by crafted URL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-11068 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-18197 │ HIGH │ │ │ 1.1.29-2.1+deb9u2 │ libxslt: use after free in xsltCopyText in transform.c could │ +│ │ │ │ │ │ │ lead to information... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-18197 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-13117 │ LOW │ │ │ 1.1.29-2.1+deb9u1 │ libxslt: an xsl number with certain format strings could │ +│ │ │ │ │ │ │ lead to a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-13117 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-13118 │ │ │ │ │ libxslt: read of uninitialized stack data due to too narrow │ +│ │ │ │ │ │ │ xsl:number instruction... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-13118 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ login │ CVE-2017-12424 │ CRITICAL │ │ 1:4.4-4.1 │ 1:4.4-4.1+deb9u1 │ shadow-utils: Buffer overflow via newusers tool │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-12424 │ +│ ├──────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-20002 │ HIGH │ │ │ │ The Debian shadow package before 1:4.5-1 for Shadow │ +│ │ │ │ │ │ │ incorrectly lists ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-20002 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-7169 │ LOW │ affected │ │ │ shadow-utils: newgidmap allows unprivileged user to drop │ +│ │ │ │ │ │ │ supplementary groups potentially allowing privilege... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-7169 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ mount │ CVE-2016-2779 │ HIGH │ │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-base │ CVE-2022-29458 │ HIGH │ │ 6.0+20161126-1+deb9u2 │ │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19211 │ LOW │ fix_deferred │ │ │ ncurses: Null pointer dereference at function │ +│ │ │ │ │ │ │ _nc_parse_entry in parse_entry.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19211 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17594 │ │ affected │ │ │ ncurses: heap-based buffer overflow in the _nc_find_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17594 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17595 │ │ │ │ │ ncurses: heap-based buffer overflow in the fmt_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17595 │ +├────────────────────────┼──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-bin │ CVE-2022-29458 │ HIGH │ │ │ │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-19211 │ LOW │ fix_deferred │ │ │ ncurses: Null pointer dereference at function │ +│ │ │ │ │ │ │ _nc_parse_entry in parse_entry.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-19211 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17594 │ │ affected │ │ │ ncurses: heap-based buffer overflow in the _nc_find_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17594 │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-17595 │ │ │ │ │ ncurses: heap-based buffer overflow in the fmt_entry │ +│ │ │ │ │ │ │ function in tinfo/comp_hash.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-17595 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ nginx │ CVE-2021-3618 │ HIGH │ │ 1.14.2-1~stretch │ │ ALPACA: Application Layer Protocol Confusion - Analyzing and │ +│ │ │ │ │ │ │ Mitigating Cracks in TLS... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3618 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36309 │ MEDIUM │ fix_deferred │ │ │ ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in │ +│ │ │ │ │ │ │ OpenResty ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36309 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-0337 │ LOW │ will_not_fix │ │ │ The default configuration of nginx, possibly 1.3.13 and │ +│ │ │ │ │ │ │ earlier, uses ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-0337 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ passwd │ CVE-2017-12424 │ CRITICAL │ fixed │ 1:4.4-4.1 │ 1:4.4-4.1+deb9u1 │ shadow-utils: Buffer overflow via newusers tool │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-12424 │ +│ ├──────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-20002 │ HIGH │ │ │ │ The Debian shadow package before 1:4.5-1 for Shadow │ +│ │ │ │ │ │ │ incorrectly lists ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-20002 │ +│ ├──────────────────┼──────────┼──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-7169 │ LOW │ affected │ │ │ shadow-utils: newgidmap allows unprivileged user to drop │ +│ │ │ │ │ │ │ supplementary groups potentially allowing privilege... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-7169 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ perl-base │ CVE-2020-10543 │ HIGH │ fixed │ 5.24.1-3+deb9u5 │ 5.24.1-3+deb9u7 │ perl: heap-based buffer overflow in regular expression │ +│ │ │ │ │ │ │ compiler leads to DoS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-10543 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-10878 │ │ │ │ │ perl: corruption of intermediate language state of compiled │ +│ │ │ │ │ │ │ regular expression due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-10878 │ +│ ├──────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-12723 │ │ │ │ │ perl: corruption of intermediate language state of compiled │ +│ │ │ │ │ │ │ regular expression due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-12723 │ +│ ├──────────────────┤ ├──────────────┤ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-16156 │ │ affected │ │ │ perl-CPAN: Bypass of verification of signatures in CHECKSUMS │ +│ │ │ │ │ │ │ files │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-16156 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ tar │ CVE-2018-20482 │ MEDIUM │ fixed │ 1.29b-1.1 │ 1.29b-1.1+deb9u1 │ tar: Infinite read loop in sparse_dump_region function in │ +│ │ │ │ │ │ │ sparse.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20482 │ +├────────────────────────┼──────────────────┼──────────┤ ├────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ tzdata │ DLA-2424-1 │ UNKNOWN │ │ 2018i-0+deb9u1 │ 2020d-0+deb9u1 │ tzdata - new upstream version │ +│ ├──────────────────┤ │ │ ├────────────────────────┤ │ +│ │ DLA-2509-1 │ │ │ │ 2020e-0+deb9u1 │ │ +│ ├──────────────────┤ │ │ ├────────────────────────┤ │ +│ │ DLA-2542-1 │ │ │ │ 2021a-0+deb9u1 │ │ +│ ├──────────────────┤ │ │ ├────────────────────────┤ │ +│ │ DLA-2797-1 │ │ │ │ 2021a-0+deb9u2 │ │ +│ ├──────────────────┤ │ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ DLA-2963-1 │ │ │ │ 2021a-0+deb9u3 │ tzdata - new timezone database │ +│ ├──────────────────┤ │ │ ├────────────────────────┤ │ +│ │ DLA-3051-1 │ │ │ │ 2021a-0+deb9u4 │ │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ util-linux │ CVE-2016-2779 │ HIGH │ affected │ 2.29.2-1+deb9u1 │ │ util-linux: runuser tty hijack via TIOCSTI ioctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2779 │ +│ ├──────────────────┼──────────┤ │ ├────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-37600 │ LOW │ │ │ │ util-linux: integer overflow can lead to buffer overflow in │ +│ │ │ │ │ │ │ get_sem_elements() in sys-utils/ipcutils.c... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-37600 │ +├────────────────────────┼──────────────────┼──────────┼──────────────┼────────────────────────┼────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ zlib1g │ CVE-2018-25032 │ HIGH │ fixed │ 1:1.2.8.dfsg-5 │ 1:1.2.8.dfsg-5+deb9u1 │ zlib: A flaw found in zlib when compressing (not │ +│ │ │ │ │ │ │ decompressing) certain inputs... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-25032 │ +└────────────────────────┴──────────────────┴──────────┴──────────────┴────────────────────────┴────────────────────────┴──────────────────────────────────────────────────────────────┘ diff --git a/TP5/Analyses-nginx/nginx122_scan.txt b/TP5/Analyses-nginx/nginx122_scan.txt new file mode 100644 index 0000000..0da25e8 --- /dev/null +++ b/TP5/Analyses-nginx/nginx122_scan.txt @@ -0,0 +1,1212 @@ + +Report Summary + +┌──────────────────────────┬────────┬─────────────────┬─────────┐ +│ Target │ Type │ Vulnerabilities │ Secrets │ +├──────────────────────────┼────────┼─────────────────┼─────────┤ +│ nginx:1.22 (debian 11.6) │ debian │ 344 │ - │ +└──────────────────────────┴────────┴─────────────────┴─────────┘ +Legend: +- '-': Not scanned +- '0': Clean (no security findings detected) + + +nginx:1.22 (debian 11.6) +======================== +Total: 344 (UNKNOWN: 4, LOW: 130, MEDIUM: 124, HIGH: 74, CRITICAL: 12) + +┌────────────────────┬─────────────────────┬──────────┬──────────────┬─────────────────────────┬─────────────────────────┬──────────────────────────────────────────────────────────────┐ +│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ apt │ CVE-2011-3374 │ LOW │ affected │ 2.2.4 │ │ It was found that apt-key in apt, all versions, do not │ +│ │ │ │ │ │ │ correctly... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3374 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ bash │ CVE-2022-3715 │ HIGH │ │ 5.1-2+deb11u1 │ │ bash: a heap-buffer-overflow in valid_parameter_transform │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3715 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0841856-B18BAF │ LOW │ │ │ │ [Privilege escalation possible to other user than root] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0841856-B1- │ +│ │ │ │ │ │ │ 8BAF │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ bsdutils │ CVE-2024-28085 │ MEDIUM │ fixed │ 1:2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ coreutils │ CVE-2016-2781 │ │ will_not_fix │ 8.32-4+b1 │ │ coreutils: Non-privileged session can escape to the parent │ +│ │ │ │ │ │ │ session in chroot │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2781 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-18018 │ │ affected │ │ │ coreutils: race condition vulnerability in chown and chgrp │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-18018 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ curl │ CVE-2023-23914 │ CRITICAL │ will_not_fix │ 7.74.0-1.3+deb11u7 │ │ curl: HSTS ignored on multiple requests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-23914 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-38545 │ │ fixed │ │ 7.74.0-1.3+deb11u10 │ curl: heap based buffer overflow in the SOCKS5 proxy │ +│ │ │ │ │ │ │ handshake │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-38545 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-42916 │ HIGH │ will_not_fix │ │ │ curl: HSTS bypass via IDN │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-42916 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-43551 │ │ │ │ │ curl: HSTS bypass via IDN │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-43551 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27533 │ │ fixed │ │ 7.74.0-1.3+deb11u8 │ curl: TELNET option IAC injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27533 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27534 │ │ │ │ │ curl: SFTP path ~ resolving discrepancy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27534 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2398 │ │ │ │ 7.74.0-1.3+deb11u12 │ curl: HTTP/2 push headers memory-leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2398 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-23915 │ MEDIUM │ will_not_fix │ │ │ curl: HSTS amnesia with --parallel │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-23915 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27535 │ │ fixed │ │ 7.74.0-1.3+deb11u8 │ curl: FTP too eager connection reuse │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27535 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27536 │ │ │ │ │ curl: GSS delegation too eager connection re-use │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27536 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27538 │ │ │ │ │ curl: SSH connection too eager reuse still │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27538 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28321 │ │ │ │ 7.74.0-1.3+deb11u9 │ curl: IDN wildcard match may lead to Improper Cerificate │ +│ │ │ │ │ │ │ Validation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28321 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-46218 │ │ │ │ 7.74.0-1.3+deb11u11 │ curl: information disclosure by exploiting a mixed case flaw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-46218 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-46219 │ │ will_not_fix │ │ │ curl: excessively long file name may lead to unknown HSTS │ +│ │ │ │ │ │ │ status │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-46219 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-7264 │ │ fixed │ │ 7.74.0-1.3+deb11u13 │ curl: libcurl: ASN.1 date parser overread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-7264 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-8096 │ │ │ │ 7.74.0-1.3+deb11u14 │ curl: OCSP stapling bypass with GnuTLS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-8096 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-9681 │ │ will_not_fix │ │ │ curl: HSTS subdomain overwrites parent cache entry │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-9681 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-22922 │ LOW │ affected │ │ │ curl: Content not matching hash in Metalink is not being │ +│ │ │ │ │ │ │ discarded │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-22922 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-22923 │ │ │ │ │ curl: Metalink download sends credentials │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-22923 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28320 │ │ │ │ │ curl: siglongjmp race condition may lead to crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28320 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28322 │ │ fixed │ │ 7.74.0-1.3+deb11u9 │ curl: more POST-after-PUT confusion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28322 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-38546 │ │ │ │ 7.74.0-1.3+deb11u10 │ curl: cookie injection with none file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-38546 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2379 │ │ affected │ │ │ curl: QUIC certificate check bypass with wolfSSL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2379 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0725 │ │ │ │ │ libcurl: Buffer Overflow in libcurl via zlib Integer │ +│ │ │ │ │ │ │ Overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0725 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ e2fsprogs │ CVE-2022-1304 │ HIGH │ fixed │ 1.46.2-2 │ 1.46.2-2+deb11u1 │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ gcc-10-base │ CVE-2023-4039 │ LOW │ affected │ 10.2.1-6 │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┤ │ │ ├─────────────────────────┼─────────────────────────┤ │ +│ gcc-9-base │ │ │ │ 9.3.0-22 │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ gpgv │ CVE-2022-3219 │ │ │ 2.2.27-2+deb11u2 │ │ gnupg: denial of service issue (resource consumption) using │ +│ │ │ │ │ │ │ compressed packets │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3219 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-30258 │ │ fix_deferred │ │ │ gnupg: verification DoS due to a malicious subkey in the │ +│ │ │ │ │ │ │ keyring │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-30258 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libapt-pkg6.0 │ CVE-2011-3374 │ │ affected │ 2.2.4 │ │ It was found that apt-key in apt, all versions, do not │ +│ │ │ │ │ │ │ correctly... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3374 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libblkid1 │ CVE-2024-28085 │ MEDIUM │ fixed │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libc-bin │ CVE-2023-4911 │ HIGH │ fixed │ 2.31-13+deb11u5 │ 2.31-13+deb11u7 │ glibc: buffer overflow in ld.so leading to privilege │ +│ │ │ │ │ │ │ escalation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4911 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2961 │ │ │ │ 2.31-13+deb11u9 │ glibc: Out of bounds write in iconv may lead to remote │ +│ │ │ │ │ │ │ code... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2961 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33599 │ │ │ │ 2.31-13+deb11u10 │ glibc: stack-based buffer overflow in netgroup cache │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33599 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4806 │ MEDIUM │ will_not_fix │ │ │ glibc: potential use-after-free in getaddrinfo() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4806 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4813 │ │ │ │ │ glibc: potential use-after-free in gaih_inet() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4813 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33600 │ │ fixed │ │ 2.31-13+deb11u10 │ glibc: null pointer dereferences after failed netgroup cache │ +│ │ │ │ │ │ │ insertion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33600 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33601 │ │ │ │ │ glibc: netgroup cache may terminate daemon on memory │ +│ │ │ │ │ │ │ allocation failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33601 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33602 │ │ │ │ │ glibc: netgroup cache assumes NSS callback uses in-buffer │ +│ │ │ │ │ │ │ strings │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33602 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0395 │ │ │ │ 2.31-13+deb11u12 │ glibc: buffer overflow in the GNU C Library's assert() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0395 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2010-4756 │ LOW │ affected │ │ │ glibc: glob implementation can cause excessive CPU and │ +│ │ │ │ │ │ │ memory consumption due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2010-4756 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-20796 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20796 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010022 │ │ │ │ │ glibc: stack guard protection bypass │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010022 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010023 │ │ │ │ │ glibc: running ldd on malicious ELF leads to code execution │ +│ │ │ │ │ │ │ because of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010023 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010024 │ │ │ │ │ glibc: ASLR bypass using cache of thread stack and heap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010024 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010025 │ │ │ │ │ glibc: information disclosure of heap addresses of │ +│ │ │ │ │ │ │ pthread_created thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010025 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-9192 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-9192 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libc6 │ CVE-2023-4911 │ HIGH │ fixed │ │ 2.31-13+deb11u7 │ glibc: buffer overflow in ld.so leading to privilege │ +│ │ │ │ │ │ │ escalation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4911 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2961 │ │ │ │ 2.31-13+deb11u9 │ glibc: Out of bounds write in iconv may lead to remote │ +│ │ │ │ │ │ │ code... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2961 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33599 │ │ │ │ 2.31-13+deb11u10 │ glibc: stack-based buffer overflow in netgroup cache │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33599 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4806 │ MEDIUM │ will_not_fix │ │ │ glibc: potential use-after-free in getaddrinfo() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4806 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4813 │ │ │ │ │ glibc: potential use-after-free in gaih_inet() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4813 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33600 │ │ fixed │ │ 2.31-13+deb11u10 │ glibc: null pointer dereferences after failed netgroup cache │ +│ │ │ │ │ │ │ insertion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33600 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33601 │ │ │ │ │ glibc: netgroup cache may terminate daemon on memory │ +│ │ │ │ │ │ │ allocation failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33601 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-33602 │ │ │ │ │ glibc: netgroup cache assumes NSS callback uses in-buffer │ +│ │ │ │ │ │ │ strings │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33602 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0395 │ │ │ │ 2.31-13+deb11u12 │ glibc: buffer overflow in the GNU C Library's assert() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0395 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2010-4756 │ LOW │ affected │ │ │ glibc: glob implementation can cause excessive CPU and │ +│ │ │ │ │ │ │ memory consumption due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2010-4756 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-20796 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20796 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010022 │ │ │ │ │ glibc: stack guard protection bypass │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010022 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010023 │ │ │ │ │ glibc: running ldd on malicious ELF leads to code execution │ +│ │ │ │ │ │ │ because of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010023 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010024 │ │ │ │ │ glibc: ASLR bypass using cache of thread stack and heap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010024 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010025 │ │ │ │ │ glibc: information disclosure of heap addresses of │ +│ │ │ │ │ │ │ pthread_created thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010025 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-9192 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-9192 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libcom-err2 │ CVE-2022-1304 │ HIGH │ fixed │ 1.46.2-2 │ 1.46.2-2+deb11u1 │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libcurl4 │ CVE-2023-23914 │ CRITICAL │ will_not_fix │ 7.74.0-1.3+deb11u7 │ │ curl: HSTS ignored on multiple requests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-23914 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-38545 │ │ fixed │ │ 7.74.0-1.3+deb11u10 │ curl: heap based buffer overflow in the SOCKS5 proxy │ +│ │ │ │ │ │ │ handshake │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-38545 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-42916 │ HIGH │ will_not_fix │ │ │ curl: HSTS bypass via IDN │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-42916 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-43551 │ │ │ │ │ curl: HSTS bypass via IDN │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-43551 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27533 │ │ fixed │ │ 7.74.0-1.3+deb11u8 │ curl: TELNET option IAC injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27533 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27534 │ │ │ │ │ curl: SFTP path ~ resolving discrepancy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27534 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2398 │ │ │ │ 7.74.0-1.3+deb11u12 │ curl: HTTP/2 push headers memory-leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2398 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-23915 │ MEDIUM │ will_not_fix │ │ │ curl: HSTS amnesia with --parallel │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-23915 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27535 │ │ fixed │ │ 7.74.0-1.3+deb11u8 │ curl: FTP too eager connection reuse │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27535 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27536 │ │ │ │ │ curl: GSS delegation too eager connection re-use │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27536 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-27538 │ │ │ │ │ curl: SSH connection too eager reuse still │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-27538 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28321 │ │ │ │ 7.74.0-1.3+deb11u9 │ curl: IDN wildcard match may lead to Improper Cerificate │ +│ │ │ │ │ │ │ Validation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28321 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-46218 │ │ │ │ 7.74.0-1.3+deb11u11 │ curl: information disclosure by exploiting a mixed case flaw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-46218 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-46219 │ │ will_not_fix │ │ │ curl: excessively long file name may lead to unknown HSTS │ +│ │ │ │ │ │ │ status │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-46219 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-7264 │ │ fixed │ │ 7.74.0-1.3+deb11u13 │ curl: libcurl: ASN.1 date parser overread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-7264 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-8096 │ │ │ │ 7.74.0-1.3+deb11u14 │ curl: OCSP stapling bypass with GnuTLS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-8096 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-9681 │ │ will_not_fix │ │ │ curl: HSTS subdomain overwrites parent cache entry │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-9681 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-22922 │ LOW │ affected │ │ │ curl: Content not matching hash in Metalink is not being │ +│ │ │ │ │ │ │ discarded │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-22922 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-22923 │ │ │ │ │ curl: Metalink download sends credentials │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-22923 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28320 │ │ │ │ │ curl: siglongjmp race condition may lead to crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28320 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28322 │ │ fixed │ │ 7.74.0-1.3+deb11u9 │ curl: more POST-after-PUT confusion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28322 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-38546 │ │ │ │ 7.74.0-1.3+deb11u10 │ curl: cookie injection with none file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-38546 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2379 │ │ affected │ │ │ curl: QUIC certificate check bypass with wolfSSL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2379 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0725 │ │ │ │ │ libcurl: Buffer Overflow in libcurl via zlib Integer │ +│ │ │ │ │ │ │ Overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0725 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libdb5.3 │ CVE-2019-8457 │ CRITICAL │ will_not_fix │ 5.3.28+dfsg1-0.8 │ │ sqlite: heap out-of-bound read in function rtreenode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-8457 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libexpat1 │ CVE-2024-45491 │ │ fixed │ 2.2.10-2+deb11u5 │ 2.2.10-2+deb11u6 │ libexpat: Integer Overflow or Wraparound │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45491 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-45492 │ │ │ │ │ libexpat: integer overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45492 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52425 │ HIGH │ │ │ │ expat: parsing large tokens can trigger a denial of service │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52425 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-45490 │ │ │ │ │ libexpat: Negative Length Parsing Vulnerability in libexpat │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45490 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-8176 │ │ will_not_fix │ │ │ libexpat: expat: Improper Restriction of XML Entity │ +│ │ │ │ │ │ │ Expansion Depth in libexpat │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-8176 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50602 │ MEDIUM │ fixed │ │ 2.2.10-2+deb11u7 │ libexpat: expat: DoS via XML_ResumeParser │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50602 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-0340 │ LOW │ affected │ │ │ expat: internal entity expansion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-0340 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52426 │ │ │ │ │ expat: recursive XML entity expansion vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52426 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-28757 │ │ │ │ │ expat: XML Entity Expansion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28757 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libext2fs2 │ CVE-2022-1304 │ HIGH │ fixed │ 1.46.2-2 │ 1.46.2-2+deb11u1 │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libfreetype6 │ CVE-2025-27363 │ │ │ 2.10.4+dfsg-1+deb11u1 │ 2.10.4+dfsg-1+deb11u2 │ freetype: OOB write when attempting to parse font subglyph │ +│ │ │ │ │ │ │ structures related to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-27363 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-31782 │ LOW │ affected │ │ │ ftbench.c in FreeType Demo Programs through 2.12.1 has a │ +│ │ │ │ │ │ │ heap-based bu ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-31782 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcc-s1 │ CVE-2023-4039 │ │ │ 10.2.1-6 │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcrypt20 │ CVE-2021-33560 │ HIGH │ │ 1.8.7-6 │ │ libgcrypt: mishandles ElGamal encryption because it lacks │ +│ │ │ │ │ │ │ exponent blinding to address a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33560 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-6829 │ LOW │ │ │ │ libgcrypt: ElGamal implementation doesn't have semantic │ +│ │ │ │ │ │ │ security due to incorrectly encoded plaintexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-6829 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2236 │ │ │ │ │ libgcrypt: vulnerable to Marvin Attack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2236 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgd3 │ CVE-2021-38115 │ MEDIUM │ │ 2.3.0-2 │ │ read_header_tga in gd_tga.c in the GD Graphics Library (aka │ +│ │ │ │ │ │ │ LibGD) thr ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-38115 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-40812 │ │ │ │ │ The GD Graphics Library (aka LibGD) through 2.3.2 has an │ +│ │ │ │ │ │ │ out-of-bounds ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-40812 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-40145 │ LOW │ │ │ │ gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka │ +│ │ │ │ │ │ │ LibGD) throu ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-40145 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgnutls30 │ CVE-2024-0553 │ HIGH │ fixed │ 3.7.1-5+deb11u3 │ 3.7.1-5+deb11u5 │ gnutls: incomplete fix for CVE-2023-5981 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-0553 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-0567 │ │ │ │ │ gnutls: rejects certificate chain with distributed trust │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-0567 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-5981 │ MEDIUM │ │ │ 3.7.1-5+deb11u4 │ gnutls: timing side-channel in the RSA-PSK authentication │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-5981 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-12243 │ │ │ │ 3.7.1-5+deb11u7 │ gnutls: GnuTLS Impacted by Inefficient DER Decoding in │ +│ │ │ │ │ │ │ libtasn1 Leading to Remote... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-12243 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-28834 │ │ │ │ 3.7.1-5+deb11u6 │ gnutls: vulnerable to Minerva side-channel information leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28834 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-28835 │ │ │ │ │ gnutls: potential crash during chain building/verification │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28835 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2011-3389 │ LOW │ affected │ │ │ HTTPS: block-wise chosen-plaintext attack against SSL/TLS │ +│ │ │ │ │ │ │ (BEAST) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3389 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libgssapi-krb5-2 │ CVE-2024-37371 │ CRITICAL │ fixed │ 1.18.3-6+deb11u3 │ 1.18.3-6+deb11u5 │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37371 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37370 │ HIGH │ │ │ │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37370 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-36054 │ MEDIUM │ │ │ 1.18.3-6+deb11u4 │ krb5: Denial of service through freeing uninitialized │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-36054 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ 1.18.3-6+deb11u6 │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ affected │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libjbig0 │ CVE-2017-9937 │ │ │ 2.1-3.1+b2 │ │ libtiff: memory malloc failure in tif_jbig.c could cause │ +│ │ │ │ │ │ │ DOS. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-9937 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libjpeg62-turbo │ CVE-2021-46822 │ MEDIUM │ │ 1:2.0.6-4 │ │ libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in │ +│ │ │ │ │ │ │ rdppm.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46822 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libk5crypto3 │ CVE-2024-37371 │ CRITICAL │ fixed │ 1.18.3-6+deb11u3 │ 1.18.3-6+deb11u5 │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37371 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37370 │ HIGH │ │ │ │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37370 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-36054 │ MEDIUM │ │ │ 1.18.3-6+deb11u4 │ krb5: Denial of service through freeing uninitialized │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-36054 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ 1.18.3-6+deb11u6 │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ affected │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libkrb5-3 │ CVE-2024-37371 │ CRITICAL │ fixed │ │ 1.18.3-6+deb11u5 │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37371 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37370 │ HIGH │ │ │ │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37370 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-36054 │ MEDIUM │ │ │ 1.18.3-6+deb11u4 │ krb5: Denial of service through freeing uninitialized │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-36054 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ 1.18.3-6+deb11u6 │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ affected │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libkrb5support0 │ CVE-2024-37371 │ CRITICAL │ fixed │ │ 1.18.3-6+deb11u5 │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37371 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37370 │ HIGH │ │ │ │ krb5: GSS message token handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37370 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-36054 │ MEDIUM │ │ │ 1.18.3-6+deb11u4 │ krb5: Denial of service through freeing uninitialized │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-36054 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ 1.18.3-6+deb11u6 │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ affected │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libldap-2.4-2 │ CVE-2023-2953 │ HIGH │ │ 2.4.57+dfsg-3+deb11u1 │ │ openldap: null pointer dereference in ber_memalloc_x │ +│ │ │ │ │ │ │ function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2953 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2015-3276 │ LOW │ │ │ │ openldap: incorrect multi-keyword mode cipherstring parsing │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-3276 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-14159 │ │ │ │ │ openldap: Privilege escalation via PID file manipulation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-14159 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-17740 │ │ │ │ │ openldap: contrib/slapd-modules/nops/nops.c attempts to free │ +│ │ │ │ │ │ │ stack buffer allowing remote attackers to cause... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-17740 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-15719 │ │ │ │ │ openldap: Certificate validation incorrectly matches name │ +│ │ │ │ │ │ │ against CN-ID │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-15719 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libmount1 │ CVE-2024-28085 │ MEDIUM │ fixed │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libnghttp2-14 │ CVE-2023-44487 │ HIGH │ fixed │ 1.43.0-1 │ 1.43.0-1+deb11u1 │ HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable │ +│ │ │ │ │ │ │ to a DDoS attack... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-44487 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-28182 │ MEDIUM │ │ │ 1.43.0-1+deb11u2 │ nghttp2: CONTINUATION frames DoS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28182 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-modules │ CVE-2024-10041 │ │ fix_deferred │ 1.4.0-9+deb11u1 │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ affected │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-modules-bin │ CVE-2024-10041 │ │ fix_deferred │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ affected │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-runtime │ CVE-2024-10041 │ │ fix_deferred │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ affected │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam0g │ CVE-2024-10041 │ │ fix_deferred │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ affected │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpcre2-8-0 │ CVE-2022-41409 │ LOW │ │ 10.36-2+deb11u1 │ │ pcre2: negative repeat value in a pcre2test subject line │ +│ │ │ │ │ │ │ leads to inifinite... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-41409 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpcre3 │ CVE-2017-11164 │ │ │ 2:8.39-13 │ │ pcre: OP_KETRMAX feature in the match function in │ +│ │ │ │ │ │ │ pcre_exec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-11164 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-16231 │ │ │ │ │ pcre: self-recursive call in match() in pcre_exec.c leads to │ +│ │ │ │ │ │ │ denial of service... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-16231 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-7245 │ │ │ │ │ pcre: stack-based buffer overflow write in │ +│ │ │ │ │ │ │ pcre32_copy_substring │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-7245 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-7246 │ │ │ │ │ pcre: stack-based buffer overflow write in │ +│ │ │ │ │ │ │ pcre32_copy_substring │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-7246 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-20838 │ │ │ │ │ pcre: Buffer over-read in JIT when UTF is disabled and \X │ +│ │ │ │ │ │ │ or... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-20838 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libpng16-16 │ CVE-2019-6129 │ │ │ 1.6.37-3 │ │ libpng: memory leak of png_info struct in pngcp.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-6129 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-4214 │ │ │ │ │ libpng: hardcoded value leads to heap-overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-4214 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsepol1 │ CVE-2021-36084 │ │ fixed │ 3.1-1 │ 3.1-1+deb11u1 │ libsepol: use-after-free in __cil_verify_classperms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36084 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36085 │ │ │ │ │ libsepol: use-after-free in __cil_verify_classperms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36085 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36086 │ │ │ │ │ libsepol: use-after-free in cil_reset_classpermission() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36086 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-36087 │ │ │ │ │ libsepol: heap-based buffer overflow in ebitmap_match_any() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-36087 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsmartcols1 │ CVE-2024-28085 │ MEDIUM │ │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libss2 │ CVE-2022-1304 │ HIGH │ fixed │ 1.46.2-2 │ 1.46.2-2+deb11u1 │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libssh2-1 │ CVE-2020-22218 │ │ │ 1.9.0-2 │ 1.9.0-2+deb11u1 │ libssh2: use-of-uninitialized-value in │ +│ │ │ │ │ │ │ _libssh2_transport_read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-22218 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libssl1.1 │ CVE-2023-0464 │ │ │ 1.1.1n-0+deb11u4 │ 1.1.1n-0+deb11u5 │ openssl: Denial of service by excessive resource usage in │ +│ │ │ │ │ │ │ verifying X509 policy... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0464 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0465 │ MEDIUM │ │ │ │ openssl: Invalid certificate policies in leaf certificates │ +│ │ │ │ │ │ │ are silently ignored │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0465 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0466 │ │ │ │ │ openssl: Certificate policy check not enabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0466 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-2650 │ │ │ │ │ openssl: Possible DoS translating ASN.1 object identifiers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2650 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3446 │ │ │ │ 1.1.1v-0~deb11u1 │ openssl: Excessive time spent checking DH keys and │ +│ │ │ │ │ │ │ parameters │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3446 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3817 │ │ │ │ │ OpenSSL: Excessive time spent checking DH q parameter value │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3817 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-5678 │ │ │ │ 1.1.1w-0+deb11u2 │ openssl: Generating excessively long X9.42 DH keys or │ +│ │ │ │ │ │ │ checking excessively long X9.42... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-5678 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-0727 │ │ │ │ │ openssl: denial of service via null dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-0727 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-13176 │ │ fix_deferred │ │ │ openssl: Timing side-channel in ECDSA signature computation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-13176 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-4741 │ │ fixed │ │ 1.1.1w-0+deb11u2 │ openssl: Use After Free with SSL_free_buffers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-4741 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-5535 │ │ │ │ │ openssl: SSL_select_next_proto buffer overread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-5535 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2511 │ LOW │ │ │ │ openssl: Unbounded memory growth with session handling in │ +│ │ │ │ │ │ │ TLSv1.3 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2511 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-9143 │ │ │ │ │ openssl: Low-level invalid GF(2^m) parameters lead to OOB │ +│ │ │ │ │ │ │ memory access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-9143 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libstdc++6 │ CVE-2023-4039 │ │ affected │ 10.2.1-6 │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libsystemd0 │ CVE-2023-50387 │ HIGH │ fixed │ 247.3-7+deb11u1 │ 247.3-7+deb11u6 │ bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50387 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50868 │ │ │ │ │ bind9: Preparing an NSEC3 closest encloser proof can exhaust │ +│ │ │ │ │ │ │ CPU resources │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50868 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-3821 │ MEDIUM │ │ │ 247.3-7+deb11u2 │ systemd: buffer overrun in format_timespan() function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3821 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-4415 │ │ │ │ │ systemd: local information leak due to systemd-coredump not │ +│ │ │ │ │ │ │ respecting fs.suid_dumpable kernel setting... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-4415 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-7008 │ │ │ │ 247.3-7+deb11u6 │ systemd-resolved: Unsigned name response in signed zone is │ +│ │ │ │ │ │ │ not refused when DNSSEC=yes... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-7008 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-4392 │ LOW │ affected │ │ │ systemd: TOCTOU race condition when updating file │ +│ │ │ │ │ │ │ permissions and SELinux security contexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4392 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-13529 │ │ │ │ │ systemd: DHCP FORCERENEW authentication not implemented can │ +│ │ │ │ │ │ │ cause a system running the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-13529 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31437 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31437 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31438 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ truncate a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31438 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31439 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31439 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libtasn1-6 │ CVE-2024-12133 │ MEDIUM │ fixed │ 4.16.0-2+deb11u1 │ 4.16.0-2+deb11u2 │ libtasn1: Inefficient DER Decoding in libtasn1 Leading to │ +│ │ │ │ │ │ │ Potential Remote DoS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-12133 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libtiff5 │ CVE-2023-52355 │ HIGH │ will_not_fix │ 4.2.0-1+deb11u4 │ │ libtiff: TIFFRasterScanlineSize64 produce too-big size and │ +│ │ │ │ │ │ │ could cause OOM │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52355 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52356 │ │ fixed │ │ 4.2.0-1+deb11u6 │ libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() │ +│ │ │ │ │ │ │ leading to denial of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52356 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-7006 │ │ │ │ │ libtiff: NULL pointer dereference in tif_dirinfo.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-7006 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-40090 │ MEDIUM │ affected │ │ │ libtiff: infinite loop via a crafted TIFF file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-40090 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-25433 │ │ fixed │ │ 4.2.0-1+deb11u6 │ libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-25433 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-26965 │ │ │ │ │ libtiff: heap-based use after free via a crafted TIFF image │ +│ │ │ │ │ │ │ in loadImage()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-26965 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-26966 │ │ │ │ │ libtiff: Buffer Overflow in uv_encode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-26966 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-2908 │ │ │ │ │ libtiff: null pointer dereference in tif_dir.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2908 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3316 │ │ │ │ │ libtiff: tiffcrop: null pointer dereference in TIFFClose() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3316 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3576 │ │ │ │ 4.2.0-1+deb11u5 │ libtiff: memory leak in tiffcrop.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3576 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3618 │ │ │ │ 4.2.0-1+deb11u6 │ libtiff: segmentation fault in Fax3Encode in │ +│ │ │ │ │ │ │ libtiff/tif_fax3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3618 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-40745 │ │ │ │ 4.2.0-1+deb11u5 │ libtiff: integer overflow in tiffcp.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-40745 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-41175 │ │ │ │ │ libtiff: potential integer overflow in raw2tiff.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-41175 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-6277 │ │ will_not_fix │ │ │ libtiff: Out-of-memory in TIFFOpen via a craft file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6277 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-16232 │ LOW │ affected │ │ │ libtiff: Memory leaks in tif_open.c, tif_lzw.c, and │ +│ │ │ │ │ │ │ tif_aux.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-16232 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-17973 │ │ │ │ │ libtiff: heap-based use after free in │ +│ │ │ │ │ │ │ tiff2pdf.c:t2p_writeproc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-17973 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-5563 │ │ │ │ │ libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-5563 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-9117 │ │ │ │ │ libtiff: Heap-based buffer over-read in bmp2tiff │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-9117 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-10126 │ │ │ │ │ libtiff: NULL pointer dereference in the jpeg_fdct_16x16 │ +│ │ │ │ │ │ │ function in jfdctint.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-10126 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1056 │ │ │ │ │ libtiff: heap-based buffer overflow in _TIFFmemcpy() in │ +│ │ │ │ │ │ │ tif_unix.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1056 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1210 │ │ │ │ │ tiff: Malicious file leads to a denial of service in TIFF │ +│ │ │ │ │ │ │ File... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1210 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-1916 │ │ │ │ │ libtiff: out-of-bounds read in extractImageSection() in │ +│ │ │ │ │ │ │ tools/tiffcrop.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-1916 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-30775 │ │ │ │ │ libtiff: Heap buffer overflow in extractContigSamples32bits, │ +│ │ │ │ │ │ │ tiffcrop.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-30775 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3164 │ │ │ │ │ libtiff: heap-buffer-overflow in extractImageSection() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3164 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-6228 │ │ │ │ │ libtiff: heap-based buffer overflow in cpStripToTile() in │ +│ │ │ │ │ │ │ tools/tiffcp.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6228 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libtinfo6 │ CVE-2022-29458 │ HIGH │ fixed │ 6.2+20201114-2 │ 6.2+20201114-2+deb11u1 │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29491 │ │ │ │ 6.2+20201114-2+deb11u2 │ ncurses: Local users can trigger security-relevant memory │ +│ │ │ │ │ │ │ corruption via malformed data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29491 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ MEDIUM │ affected │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libudev1 │ CVE-2023-50387 │ HIGH │ fixed │ 247.3-7+deb11u1 │ 247.3-7+deb11u6 │ bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50387 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50868 │ │ │ │ │ bind9: Preparing an NSEC3 closest encloser proof can exhaust │ +│ │ │ │ │ │ │ CPU resources │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50868 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-3821 │ MEDIUM │ │ │ 247.3-7+deb11u2 │ systemd: buffer overrun in format_timespan() function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3821 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-4415 │ │ │ │ │ systemd: local information leak due to systemd-coredump not │ +│ │ │ │ │ │ │ respecting fs.suid_dumpable kernel setting... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-4415 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-7008 │ │ │ │ 247.3-7+deb11u6 │ systemd-resolved: Unsigned name response in signed zone is │ +│ │ │ │ │ │ │ not refused when DNSSEC=yes... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-7008 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-4392 │ LOW │ affected │ │ │ systemd: TOCTOU race condition when updating file │ +│ │ │ │ │ │ │ permissions and SELinux security contexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4392 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-13529 │ │ │ │ │ systemd: DHCP FORCERENEW authentication not implemented can │ +│ │ │ │ │ │ │ cause a system running the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-13529 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31437 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31437 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31438 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ truncate a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31438 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31439 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31439 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libuuid1 │ CVE-2024-28085 │ MEDIUM │ fixed │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libwebp6 │ CVE-2023-1999 │ HIGH │ fixed │ 0.6.1-2.1 │ 0.6.1-2.1+deb11u1 │ Mozilla: libwebp: Double-free in libwebp │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-1999 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4863 │ │ │ │ 0.6.1-2.1+deb11u2 │ libwebp: Heap buffer overflow in WebP Codec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4863 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libx11-6 │ CVE-2023-3138 │ │ │ 2:1.7.2-1 │ 2:1.7.2-1+deb11u1 │ libX11: InitExt.c can overwrite unintended portions of the │ +│ │ │ │ │ │ │ Display structure if the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3138 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43787 │ │ │ │ 2:1.7.2-1+deb11u2 │ libX11: integer overflow in XCreateImage() leading to a heap │ +│ │ │ │ │ │ │ overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43787 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43785 │ MEDIUM │ │ │ │ libX11: out-of-bounds memory access in _XkbReadKeySyms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43785 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43786 │ │ │ │ │ libX11: stack exhaustion from infinite recursion in │ +│ │ │ │ │ │ │ PutSubImage() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43786 │ +├────────────────────┼─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libx11-data │ CVE-2023-3138 │ HIGH │ │ │ 2:1.7.2-1+deb11u1 │ libX11: InitExt.c can overwrite unintended portions of the │ +│ │ │ │ │ │ │ Display structure if the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3138 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43787 │ │ │ │ 2:1.7.2-1+deb11u2 │ libX11: integer overflow in XCreateImage() leading to a heap │ +│ │ │ │ │ │ │ overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43787 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43785 │ MEDIUM │ │ │ │ libX11: out-of-bounds memory access in _XkbReadKeySyms() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43785 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43786 │ │ │ │ │ libX11: stack exhaustion from infinite recursion in │ +│ │ │ │ │ │ │ PutSubImage() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43786 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libxml2 │ CVE-2022-2309 │ HIGH │ │ 2.9.10+dfsg-6.7+deb11u3 │ 2.9.10+dfsg-6.7+deb11u5 │ lxml: NULL Pointer Dereference in lxml │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2309 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-25062 │ │ │ │ 2.9.10+dfsg-6.7+deb11u6 │ libxml2: use-after-free in XMLReader │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-25062 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56171 │ │ │ │ │ libxml2: Use-After-Free in libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56171 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24928 │ │ │ │ │ libxml2: Stack-based buffer overflow in xmlSnprintfElements │ +│ │ │ │ │ │ │ of libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24928 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-27113 │ │ │ │ │ libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-27113 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-32414 │ │ │ │ 2.9.10+dfsg-6.7+deb11u7 │ libxml2: Out-of-Bounds Read in libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-32414 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-32415 │ │ │ │ │ libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-32415 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2016-3709 │ MEDIUM │ │ │ 2.9.10+dfsg-6.7+deb11u5 │ libxml2: Incorrect server side include parsing can lead to │ +│ │ │ │ │ │ │ XSS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-3709 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49043 │ │ │ │ 2.9.10+dfsg-6.7+deb11u6 │ libxml: use-after-free in xmlXIncludeAddNode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49043 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-28484 │ │ │ │ 2.9.10+dfsg-6.7+deb11u4 │ libxml2: NULL dereference in xmlSchemaFixupComplexType │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-28484 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29469 │ │ │ │ │ libxml2: Hashing of empty dict strings isn't deterministic │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29469 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39615 │ │ │ │ 2.9.10+dfsg-6.7+deb11u6 │ libxml2: crafted xml can cause global buffer overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39615 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-45322 │ │ │ │ │ libxml2: use-after-free in xmlUnlinkNode() in tree.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45322 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-34459 │ LOW │ affected │ │ │ libxml2: buffer over-read in xmlHTMLPrintFileContext in │ +│ │ │ │ │ │ │ xmllint.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-34459 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libxpm4 │ CVE-2022-44617 │ HIGH │ fixed │ 1:3.5.12-1 │ 1:3.5.12-1.1~deb11u1 │ libXpm: Runaway loop on width of 0 and enormous height │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-44617 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-46285 │ │ │ │ │ libXpm: Infinite loop on unclosed comments │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-46285 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-4883 │ │ │ │ │ libXpm: compression commands depend on $PATH │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-4883 │ +│ ├─────────────────────┼──────────┤ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43788 │ MEDIUM │ │ │ 1:3.5.12-1.1+deb11u1 │ libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43788 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43789 │ │ │ │ │ libXpm: out of bounds read on XPM with corrupted colormap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43789 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libxslt1.1 │ CVE-2024-55549 │ HIGH │ │ 1.1.34-4+deb11u1 │ 1.1.34-4+deb11u2 │ libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-55549 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24855 │ │ │ │ │ libxslt: Use-After-Free in libxslt numbers.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24855 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2015-9019 │ LOW │ affected │ │ │ libxslt: math.random() in xslt uses unseeded randomness │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-9019 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ libzstd1 │ CVE-2022-4899 │ HIGH │ │ 1.4.8+dfsg-2.1 │ │ zstd: mysql: buffer overrun in util.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-4899 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ login │ CVE-2023-4641 │ MEDIUM │ fixed │ 1:4.8.1-1 │ 1:4.8.1-1+deb11u1 │ shadow-utils: possible password leak during passwd(1) change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4641 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2007-5686 │ LOW │ affected │ │ │ initscripts in rPath Linux 1 sets insecure permissions for │ +│ │ │ │ │ │ │ the /var/lo ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2007-5686 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-4235 │ │ │ │ │ shadow-utils: TOCTOU race conditions by copying and removing │ +│ │ │ │ │ │ │ directory trees │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4235 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ fixed │ │ 1:4.8.1-1+deb11u1 │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ fix_deferred │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0628843-DBAD28 │ │ affected │ │ │ [more related to CVE-2005-4890] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0628843-DB- │ +│ │ │ │ │ │ │ AD28 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ logsave │ CVE-2022-1304 │ HIGH │ fixed │ 1.46.2-2 │ 1.46.2-2+deb11u1 │ e2fsprogs: out-of-bounds read/write via crafted filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1304 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ mount │ CVE-2024-28085 │ MEDIUM │ │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-base │ CVE-2022-29458 │ HIGH │ fixed │ 6.2+20201114-2 │ 6.2+20201114-2+deb11u1 │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29491 │ │ │ │ 6.2+20201114-2+deb11u2 │ ncurses: Local users can trigger security-relevant memory │ +│ │ │ │ │ │ │ corruption via malformed data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29491 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ MEDIUM │ affected │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-bin │ CVE-2022-29458 │ HIGH │ fixed │ │ 6.2+20201114-2+deb11u1 │ ncurses: segfaulting OOB read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29458 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29491 │ │ │ │ 6.2+20201114-2+deb11u2 │ ncurses: Local users can trigger security-relevant memory │ +│ │ │ │ │ │ │ corruption via malformed data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29491 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ MEDIUM │ affected │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ nginx │ CVE-2024-33452 │ HIGH │ │ 1.22.1-1~bullseye │ │ lua-nginx-module: HTTP request smuggling via a crafted HEAD │ +│ │ │ │ │ │ │ request │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33452 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36309 │ MEDIUM │ will_not_fix │ │ │ ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in │ +│ │ │ │ │ │ │ OpenResty ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36309 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2009-4487 │ LOW │ affected │ │ │ nginx: Absent sanitation of escape sequences in web server │ +│ │ │ │ │ │ │ log │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2009-4487 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-0337 │ │ will_not_fix │ │ │ The default configuration of nginx, possibly 1.3.13 and │ +│ │ │ │ │ │ │ earlier, uses ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-0337 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-44487 │ │ affected │ │ │ HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable │ +│ │ │ │ │ │ │ to a DDoS attack... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-44487 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ openssl │ CVE-2023-0464 │ HIGH │ fixed │ 1.1.1n-0+deb11u4 │ 1.1.1n-0+deb11u5 │ openssl: Denial of service by excessive resource usage in │ +│ │ │ │ │ │ │ verifying X509 policy... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0464 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0465 │ MEDIUM │ │ │ │ openssl: Invalid certificate policies in leaf certificates │ +│ │ │ │ │ │ │ are silently ignored │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0465 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0466 │ │ │ │ │ openssl: Certificate policy check not enabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0466 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-2650 │ │ │ │ │ openssl: Possible DoS translating ASN.1 object identifiers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2650 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3446 │ │ │ │ 1.1.1v-0~deb11u1 │ openssl: Excessive time spent checking DH keys and │ +│ │ │ │ │ │ │ parameters │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3446 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3817 │ │ │ │ │ OpenSSL: Excessive time spent checking DH q parameter value │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3817 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-5678 │ │ │ │ 1.1.1w-0+deb11u2 │ openssl: Generating excessively long X9.42 DH keys or │ +│ │ │ │ │ │ │ checking excessively long X9.42... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-5678 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-0727 │ │ │ │ │ openssl: denial of service via null dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-0727 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-13176 │ │ fix_deferred │ │ │ openssl: Timing side-channel in ECDSA signature computation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-13176 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-4741 │ │ fixed │ │ 1.1.1w-0+deb11u2 │ openssl: Use After Free with SSL_free_buffers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-4741 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-5535 │ │ │ │ │ openssl: SSL_select_next_proto buffer overread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-5535 │ +│ ├─────────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2511 │ LOW │ │ │ │ openssl: Unbounded memory growth with session handling in │ +│ │ │ │ │ │ │ TLSv1.3 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2511 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-9143 │ │ │ │ │ openssl: Low-level invalid GF(2^m) parameters lead to OOB │ +│ │ │ │ │ │ │ memory access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-9143 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ passwd │ CVE-2023-4641 │ MEDIUM │ │ 1:4.8.1-1 │ 1:4.8.1-1+deb11u1 │ shadow-utils: possible password leak during passwd(1) change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4641 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2007-5686 │ LOW │ affected │ │ │ initscripts in rPath Linux 1 sets insecure permissions for │ +│ │ │ │ │ │ │ the /var/lo ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2007-5686 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-4235 │ │ │ │ │ shadow-utils: TOCTOU race conditions by copying and removing │ +│ │ │ │ │ │ │ directory trees │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4235 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ fixed │ │ 1:4.8.1-1+deb11u1 │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ fix_deferred │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0628843-DBAD28 │ │ affected │ │ │ [more related to CVE-2005-4890] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0628843-DB- │ +│ │ │ │ │ │ │ AD28 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ perl-base │ CVE-2020-16156 │ HIGH │ fixed │ 5.32.1-4+deb11u2 │ 5.32.1-4+deb11u4 │ perl-CPAN: Bypass of verification of signatures in CHECKSUMS │ +│ │ │ │ │ │ │ files │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-16156 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31484 │ │ │ │ │ perl: CPAN.pm does not verify TLS certificates when │ +│ │ │ │ │ │ │ downloading distributions over HTTPS... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31484 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-47038 │ │ │ │ 5.32.1-4+deb11u3 │ perl: Write past buffer end via illegal user-defined Unicode │ +│ │ │ │ │ │ │ property │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-47038 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2011-4116 │ LOW │ affected │ │ │ perl: File:: Temp insecure temporary file handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-4116 │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31486 │ │ │ │ │ http-tiny: insecure TLS cert default │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31486 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ sysvinit-utils │ TEMP-0517018-A83CE6 │ │ │ 2.96-7+deb11u1 │ │ [sysvinit: no-root option in expert installer exposes │ +│ │ │ │ │ │ │ locally exploitable security flaw] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0517018-A8- │ +│ │ │ │ │ │ │ 3CE6 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ tar │ CVE-2005-2541 │ │ │ 1.34+dfsg-1 │ │ tar: does not properly warn the user when extracting setuid │ +│ │ │ │ │ │ │ or setgid... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2005-2541 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48303 │ │ fixed │ │ 1.34+dfsg-1+deb11u1 │ tar: heap buffer overflow at from_header() in list.c via │ +│ │ │ │ │ │ │ specially crafted checksum... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48303 │ +│ ├─────────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39804 │ │ │ │ │ tar: Incorrectly handled extension attributes in PAX │ +│ │ │ │ │ │ │ archives can lead to a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39804 │ +│ ├─────────────────────┤ ├──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0290435-0B57B5 │ │ affected │ │ │ [tar's rmt command may have undesired side effects] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0290435-0B- │ +│ │ │ │ │ │ │ 57B5 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ tzdata │ DLA-3972-1 │ UNKNOWN │ fixed │ 2021a-1+deb11u8 │ 2024b-0+deb11u1 │ tzdata - new timezone database │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┤ │ +│ │ DLA-4085-1 │ │ │ │ 2025a-0+deb11u1 │ │ +│ ├─────────────────────┤ │ │ ├─────────────────────────┤ │ +│ │ DLA-4105-1 │ │ │ │ 2025b-0+deb11u1 │ │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ ucf │ DLA-4016-1 │ │ │ 3.0043 │ 3.0043+deb11u2 │ ucf - security update │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ util-linux │ CVE-2024-28085 │ MEDIUM │ │ 2.36.1-8+deb11u1 │ 2.36.1-8+deb11u2 │ util-linux: CVE-2024-28085: wall: escape sequence injection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28085 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0563 │ LOW │ affected │ │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ +│ zlib1g │ CVE-2023-45853 │ CRITICAL │ will_not_fix │ 1:1.2.11.dfsg-2+deb11u2 │ │ zlib: integer overflow and resultant heap-based buffer │ +│ │ │ │ │ │ │ overflow in zipOpenNewFileInZip4_6 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45853 │ +└────────────────────┴─────────────────────┴──────────┴──────────────┴─────────────────────────┴─────────────────────────┴──────────────────────────────────────────────────────────────┘ diff --git a/TP5/Analyses-nginx/nginx_latest_scan.txt b/TP5/Analyses-nginx/nginx_latest_scan.txt new file mode 100644 index 0000000..4cf17c8 --- /dev/null +++ b/TP5/Analyses-nginx/nginx_latest_scan.txt @@ -0,0 +1,577 @@ + +Report Summary + +┌─────────────────────────────┬────────┬─────────────────┬─────────┐ +│ Target │ Type │ Vulnerabilities │ Secrets │ +├─────────────────────────────┼────────┼─────────────────┼─────────┤ +│ nginx:latest (debian 12.10) │ debian │ 154 │ - │ +└─────────────────────────────┴────────┴─────────────────┴─────────┘ +Legend: +- '-': Not scanned +- '0': Clean (no security findings detected) + + +nginx:latest (debian 12.10) +=========================== +Total: 154 (UNKNOWN: 2, LOW: 99, MEDIUM: 39, HIGH: 12, CRITICAL: 2) + +┌────────────────────┬─────────────────────┬──────────┬──────────────┬─────────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐ +│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ apt │ CVE-2011-3374 │ LOW │ affected │ 2.6.1 │ │ It was found that apt-key in apt, all versions, do not │ +│ │ │ │ │ │ │ correctly... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3374 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ bash │ TEMP-0841856-B18BAF │ │ │ 5.2.15-2+b7 │ │ [Privilege escalation possible to other user than root] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0841856-B1- │ +│ │ │ │ │ │ │ 8BAF │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ bsdutils │ CVE-2022-0563 │ │ │ 1:2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ coreutils │ CVE-2016-2781 │ │ will_not_fix │ 9.1-1 │ │ coreutils: Non-privileged session can escape to the parent │ +│ │ │ │ │ │ │ session in chroot │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2781 │ +│ ├─────────────────────┤ ├──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-18018 │ │ affected │ │ │ coreutils: race condition vulnerability in chown and chgrp │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-18018 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ curl │ CVE-2024-2379 │ │ │ 7.88.1-10+deb12u12 │ │ curl: QUIC certificate check bypass with wolfSSL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2379 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0725 │ │ │ │ │ libcurl: Buffer Overflow in libcurl via zlib Integer │ +│ │ │ │ │ │ │ Overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0725 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ gcc-12-base │ CVE-2022-27943 │ │ │ 12.2.0-14 │ │ binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows │ +│ │ │ │ │ │ │ stack exhaustion in demangle_const │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27943 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4039 │ │ │ │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ gpgv │ CVE-2022-3219 │ │ │ 2.2.40-1.1 │ │ gnupg: denial of service issue (resource consumption) using │ +│ │ │ │ │ │ │ compressed packets │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3219 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-30258 │ │ │ │ │ gnupg: verification DoS due to a malicious subkey in the │ +│ │ │ │ │ │ │ keyring │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-30258 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libabsl20220623 │ CVE-2025-0838 │ MEDIUM │ │ 20220623.1-1 │ │ abseil-cpp: Heap Buffer overflow in Abseil │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0838 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libaom3 │ CVE-2023-6879 │ CRITICAL │ │ 3.6.0-1+deb12u1 │ │ aom: heap-buffer-overflow on frame size change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6879 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39616 │ HIGH │ will_not_fix │ │ │ AOMedia v3.0.0 to v3.5.0 was discovered to contain an │ +│ │ │ │ │ │ │ invalid read mem... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39616 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libapt-pkg6.0 │ CVE-2011-3374 │ LOW │ affected │ 2.6.1 │ │ It was found that apt-key in apt, all versions, do not │ +│ │ │ │ │ │ │ correctly... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3374 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libblkid1 │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libc-bin │ CVE-2010-4756 │ │ │ 2.36-9+deb12u10 │ │ glibc: glob implementation can cause excessive CPU and │ +│ │ │ │ │ │ │ memory consumption due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2010-4756 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-20796 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20796 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010022 │ │ │ │ │ glibc: stack guard protection bypass │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010022 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010023 │ │ │ │ │ glibc: running ldd on malicious ELF leads to code execution │ +│ │ │ │ │ │ │ because of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010023 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010024 │ │ │ │ │ glibc: ASLR bypass using cache of thread stack and heap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010024 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010025 │ │ │ │ │ glibc: information disclosure of heap addresses of │ +│ │ │ │ │ │ │ pthread_created thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010025 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-9192 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-9192 │ +├────────────────────┼─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libc6 │ CVE-2010-4756 │ │ │ │ │ glibc: glob implementation can cause excessive CPU and │ +│ │ │ │ │ │ │ memory consumption due to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2010-4756 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-20796 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-20796 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010022 │ │ │ │ │ glibc: stack guard protection bypass │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010022 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010023 │ │ │ │ │ glibc: running ldd on malicious ELF leads to code execution │ +│ │ │ │ │ │ │ because of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010023 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010024 │ │ │ │ │ glibc: ASLR bypass using cache of thread stack and heap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010024 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010025 │ │ │ │ │ glibc: information disclosure of heap addresses of │ +│ │ │ │ │ │ │ pthread_created thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010025 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-9192 │ │ │ │ │ glibc: uncontrolled recursion in function │ +│ │ │ │ │ │ │ check_dst_limits_calc_pos_1 in posix/regexec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-9192 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libcap2 │ CVE-2025-1390 │ MEDIUM │ │ 1:2.66-4 │ │ libcap: pam_cap: Fix potential configuration parsing error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-1390 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libcurl4 │ CVE-2024-2379 │ LOW │ │ 7.88.1-10+deb12u12 │ │ curl: QUIC certificate check bypass with wolfSSL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2379 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-0725 │ │ │ │ │ libcurl: Buffer Overflow in libcurl via zlib Integer │ +│ │ │ │ │ │ │ Overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-0725 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libdav1d6 │ CVE-2023-32570 │ MEDIUM │ will_not_fix │ 1.0.0-2+deb12u1 │ │ VideoLAN dav1d before 1.2.0 has a thread_task.c race │ +│ │ │ │ │ │ │ condition that ca ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-32570 │ +├────────────────────┼─────────────────────┤ ├──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libde265-0 │ CVE-2023-51792 │ │ affected │ 1.0.11-1+deb12u2 │ │ Buffer Overflow vulnerability in libde265 v1.0.12 allows a │ +│ │ │ │ │ │ │ local attac ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-51792 │ +│ ├─────────────────────┤ ├──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38949 │ │ fix_deferred │ │ │ Heap Buffer Overflow vulnerability in Libde265 v1.0.15 │ +│ │ │ │ │ │ │ allows attacker ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38949 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38950 │ │ │ │ │ Heap Buffer Overflow vulnerability in Libde265 v1.0.15 │ +│ │ │ │ │ │ │ allows attacker ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38950 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libexpat1 │ CVE-2023-52425 │ HIGH │ affected │ 2.5.0-1+deb12u1 │ │ expat: parsing large tokens can trigger a denial of service │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52425 │ +│ ├─────────────────────┤ ├──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-8176 │ │ will_not_fix │ │ │ libexpat: expat: Improper Restriction of XML Entity │ +│ │ │ │ │ │ │ Expansion Depth in libexpat │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-8176 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50602 │ MEDIUM │ affected │ │ │ libexpat: expat: DoS via XML_ResumeParser │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50602 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52426 │ LOW │ │ │ │ expat: recursive XML entity expansion vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52426 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-28757 │ │ │ │ │ expat: XML Entity Expansion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-28757 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcc-s1 │ CVE-2022-27943 │ │ │ 12.2.0-14 │ │ binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows │ +│ │ │ │ │ │ │ stack exhaustion in demangle_const │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27943 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4039 │ │ │ │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcrypt20 │ CVE-2018-6829 │ │ │ 1.10.1-3 │ │ libgcrypt: ElGamal implementation doesn't have semantic │ +│ │ │ │ │ │ │ security due to incorrectly encoded plaintexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-6829 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-2236 │ │ │ │ │ libgcrypt: vulnerable to Marvin Attack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2236 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libgnutls30 │ CVE-2011-3389 │ │ │ 3.7.9-2+deb12u4 │ │ HTTPS: block-wise chosen-plaintext attack against SSL/TLS │ +│ │ │ │ │ │ │ (BEAST) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-3389 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libgssapi-krb5-2 │ CVE-2024-26462 │ MEDIUM │ │ 1.20.1-2+deb12u2 │ │ krb5: Memory leak at /krb5/src/kdc/ndr.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26462 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libheif1 │ CVE-2023-49463 │ │ │ 1.15.1-1+deb12u1 │ │ libheif v1.17.5 was discovered to contain a segmentation │ +│ │ │ │ │ │ │ violation via ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-49463 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-25269 │ │ │ │ │ libheif <= 1.17.6 contains a memory leak in the function │ +│ │ │ │ │ │ │ JpegEncoder:: ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-25269 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-43966 │ UNKNOWN │ │ │ │ libheif before 1.19.6 has a NULL pointer dereference in │ +│ │ │ │ │ │ │ ImageItem_iden ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-43966 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-43967 │ │ │ │ │ libheif before 1.19.6 has a NULL pointer dereference in │ +│ │ │ │ │ │ │ ImageItem_Grid ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-43967 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libjbig0 │ CVE-2017-9937 │ LOW │ │ 2.1-6.1 │ │ libtiff: memory malloc failure in tif_jbig.c could cause │ +│ │ │ │ │ │ │ DOS. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-9937 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libk5crypto3 │ CVE-2024-26462 │ MEDIUM │ │ 1.20.1-2+deb12u2 │ │ krb5: Memory leak at /krb5/src/kdc/ndr.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26462 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libkrb5-3 │ CVE-2024-26462 │ MEDIUM │ │ │ │ krb5: Memory leak at /krb5/src/kdc/ndr.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26462 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libkrb5support0 │ CVE-2024-26462 │ MEDIUM │ │ │ │ krb5: Memory leak at /krb5/src/kdc/ndr.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26462 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24528 │ │ │ │ │ krb5: overflow when calculating ulog block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24528 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-3576 │ │ │ │ │ krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling │ +│ │ │ │ │ │ │ Message Spoofing via MD5 Collisions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-3576 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-5709 │ LOW │ │ │ │ krb5: integer overflow in dbentry->n_key_data in │ +│ │ │ │ │ │ │ kadmin/dbutil/dump.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-5709 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26458 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26458 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26461 │ │ │ │ │ krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26461 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libldap-2.5-0 │ CVE-2023-2953 │ HIGH │ │ 2.5.13+dfsg-5 │ │ openldap: null pointer dereference in ber_memalloc_x │ +│ │ │ │ │ │ │ function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2953 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2015-3276 │ LOW │ │ │ │ openldap: incorrect multi-keyword mode cipherstring parsing │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-3276 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-14159 │ │ │ │ │ openldap: Privilege escalation via PID file manipulation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-14159 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-17740 │ │ │ │ │ openldap: contrib/slapd-modules/nops/nops.c attempts to free │ +│ │ │ │ │ │ │ stack buffer allowing remote attackers to cause... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-17740 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-15719 │ │ │ │ │ openldap: Certificate validation incorrectly matches name │ +│ │ │ │ │ │ │ against CN-ID │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-15719 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libmount1 │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-modules │ CVE-2024-10041 │ MEDIUM │ │ 1.5.2-6+deb12u1 │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-modules-bin │ CVE-2024-10041 │ │ │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-runtime │ CVE-2024-10041 │ │ │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam0g │ CVE-2024-10041 │ │ │ │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-22365 │ │ │ │ │ pam: allowing unprivileged user to block another user │ +│ │ │ │ │ │ │ namespace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-22365 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpng16-16 │ CVE-2021-4214 │ LOW │ │ 1.6.39-2 │ │ libpng: hardcoded value leads to heap-overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-4214 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libsmartcols1 │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libssl3 │ CVE-2024-13176 │ MEDIUM │ │ 3.0.15-1~deb12u1 │ │ openssl: Timing side-channel in ECDSA signature computation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-13176 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libstdc++6 │ CVE-2022-27943 │ LOW │ │ 12.2.0-14 │ │ binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows │ +│ │ │ │ │ │ │ stack exhaustion in demangle_const │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27943 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4039 │ │ │ │ │ gcc: -fstack-protector fails to guard dynamic stack │ +│ │ │ │ │ │ │ allocations on ARM64 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4039 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libsystemd0 │ CVE-2013-4392 │ │ │ 252.36-1~deb12u1 │ │ systemd: TOCTOU race condition when updating file │ +│ │ │ │ │ │ │ permissions and SELinux security contexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4392 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31437 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31437 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31438 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ truncate a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31438 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31439 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31439 │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libtiff6 │ CVE-2023-52355 │ HIGH │ will_not_fix │ 4.5.0-6+deb12u2 │ │ libtiff: TIFFRasterScanlineSize64 produce too-big size and │ +│ │ │ │ │ │ │ could cause OOM │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52355 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-6277 │ MEDIUM │ │ │ │ libtiff: Out-of-memory in TIFFOpen via a craft file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6277 │ +│ ├─────────────────────┼──────────┼──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-16232 │ LOW │ affected │ │ │ libtiff: Memory leaks in tif_open.c, tif_lzw.c, and │ +│ │ │ │ │ │ │ tif_aux.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-16232 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-17973 │ │ │ │ │ libtiff: heap-based use after free in │ +│ │ │ │ │ │ │ tiff2pdf.c:t2p_writeproc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-17973 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-5563 │ │ │ │ │ libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-5563 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-9117 │ │ │ │ │ libtiff: Heap-based buffer over-read in bmp2tiff │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-9117 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-10126 │ │ │ │ │ libtiff: NULL pointer dereference in the jpeg_fdct_16x16 │ +│ │ │ │ │ │ │ function in jfdctint.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-10126 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1210 │ │ │ │ │ tiff: Malicious file leads to a denial of service in TIFF │ +│ │ │ │ │ │ │ File... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1210 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-1916 │ │ │ │ │ libtiff: out-of-bounds read in extractImageSection() in │ +│ │ │ │ │ │ │ tools/tiffcrop.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-1916 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-3164 │ │ │ │ │ libtiff: heap-buffer-overflow in extractImageSection() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-3164 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-6228 │ │ │ │ │ libtiff: heap-based buffer overflow in cpStripToTile() in │ +│ │ │ │ │ │ │ tools/tiffcp.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6228 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libtinfo6 │ CVE-2023-50495 │ MEDIUM │ │ 6.4-4 │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libudev1 │ CVE-2013-4392 │ LOW │ │ 252.36-1~deb12u1 │ │ systemd: TOCTOU race condition when updating file │ +│ │ │ │ │ │ │ permissions and SELinux security contexts... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4392 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31437 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31437 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31438 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ truncate a... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31438 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31439 │ │ │ │ │ An issue was discovered in systemd 253. An attacker can │ +│ │ │ │ │ │ │ modify the... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31439 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libuuid1 │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libxml2 │ CVE-2024-25062 │ HIGH │ │ 2.9.14+dfsg-1.3~deb12u1 │ │ libxml2: use-after-free in XMLReader │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-25062 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56171 │ │ │ │ │ libxml2: Use-After-Free in libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56171 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-24928 │ │ │ │ │ libxml2: Stack-based buffer overflow in xmlSnprintfElements │ +│ │ │ │ │ │ │ of libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-24928 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-27113 │ │ │ │ │ libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-27113 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-32414 │ │ │ │ │ libxml2: Out-of-Bounds Read in libxml2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-32414 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-32415 │ │ │ │ │ libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-32415 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49043 │ MEDIUM │ │ │ │ libxml: use-after-free in xmlXIncludeAddNode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49043 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39615 │ │ │ │ │ libxml2: crafted xml can cause global buffer overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39615 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-45322 │ │ │ │ │ libxml2: use-after-free in xmlUnlinkNode() in tree.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45322 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-34459 │ LOW │ │ │ │ libxml2: buffer over-read in xmlHTMLPrintFileContext in │ +│ │ │ │ │ │ │ xmllint.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-34459 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libxslt1.1 │ CVE-2015-9019 │ │ │ 1.1.35-1+deb12u1 │ │ libxslt: math.random() in xslt uses unseeded randomness │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-9019 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ login │ CVE-2023-4641 │ MEDIUM │ │ 1:4.13+dfsg1-1+b1 │ │ shadow-utils: possible password leak during passwd(1) change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4641 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2007-5686 │ LOW │ │ │ │ initscripts in rPath Linux 1 sets insecure permissions for │ +│ │ │ │ │ │ │ the /var/lo ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2007-5686 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ │ │ │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0628843-DBAD28 │ │ │ │ │ [more related to CVE-2005-4890] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0628843-DB- │ +│ │ │ │ │ │ │ AD28 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ mount │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-base │ CVE-2023-50495 │ MEDIUM │ │ 6.4-4 │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────┤ │ │ │ ├───────────────┤ │ +│ ncurses-bin │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ nginx │ CVE-2024-7347 │ │ │ 1.27.5-1~bookworm │ │ nginx: specially crafted MP4 file may cause denial of │ +│ │ │ │ │ │ │ service │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-7347 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2009-4487 │ LOW │ │ │ │ nginx: Absent sanitation of escape sequences in web server │ +│ │ │ │ │ │ │ log │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2009-4487 │ +│ ├─────────────────────┤ ├──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-0337 │ │ will_not_fix │ │ │ The default configuration of nginx, possibly 1.3.13 and │ +│ │ │ │ │ │ │ earlier, uses ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-0337 │ +│ ├─────────────────────┤ ├──────────────┤ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-44487 │ │ affected │ │ │ HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable │ +│ │ │ │ │ │ │ to a DDoS attack... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-44487 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ openssl │ CVE-2024-13176 │ MEDIUM │ │ 3.0.15-1~deb12u1 │ │ openssl: Timing side-channel in ECDSA signature computation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-13176 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ passwd │ CVE-2023-4641 │ │ │ 1:4.13+dfsg1-1+b1 │ │ shadow-utils: possible password leak during passwd(1) change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4641 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2007-5686 │ LOW │ │ │ │ initscripts in rPath Linux 1 sets insecure permissions for │ +│ │ │ │ │ │ │ the /var/lo ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2007-5686 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ │ │ │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0628843-DBAD28 │ │ │ │ │ [more related to CVE-2005-4890] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0628843-DB- │ +│ │ │ │ │ │ │ AD28 │ +├────────────────────┼─────────────────────┼──────────┤ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ perl-base │ CVE-2023-31484 │ HIGH │ │ 5.36.0-7+deb12u2 │ │ perl: CPAN.pm does not verify TLS certificates when │ +│ │ │ │ │ │ │ downloading distributions over HTTPS... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31484 │ +│ ├─────────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2011-4116 │ LOW │ │ │ │ perl: File:: Temp insecure temporary file handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2011-4116 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31486 │ │ │ │ │ http-tiny: insecure TLS cert default │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31486 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ sysvinit-utils │ TEMP-0517018-A83CE6 │ │ │ 3.06-4 │ │ [sysvinit: no-root option in expert installer exposes │ +│ │ │ │ │ │ │ locally exploitable security flaw] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0517018-A8- │ +│ │ │ │ │ │ │ 3CE6 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ tar │ CVE-2005-2541 │ │ │ 1.34+dfsg-1.2+deb12u1 │ │ tar: does not properly warn the user when extracting setuid │ +│ │ │ │ │ │ │ or setgid... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2005-2541 │ +│ ├─────────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ TEMP-0290435-0B57B5 │ │ │ │ │ [tar's rmt command may have undesired side effects] │ +│ │ │ │ │ │ │ https://security-tracker.debian.org/tracker/TEMP-0290435-0B- │ +│ │ │ │ │ │ │ 57B5 │ +├────────────────────┼─────────────────────┤ │ ├─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ util-linux │ CVE-2022-0563 │ │ │ 2.38.1-5+deb12u3 │ │ util-linux: partial disclosure of arbitrary files in chfn │ +│ │ │ │ │ │ │ and chsh when compiled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0563 │ +├────────────────────┤ │ │ │ ├───────────────┤ │ +│ util-linux-extra │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────┼─────────────────────┼──────────┼──────────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ zlib1g │ CVE-2023-45853 │ CRITICAL │ will_not_fix │ 1:1.2.13.dfsg-1 │ │ zlib: integer overflow and resultant heap-based buffer │ +│ │ │ │ │ │ │ overflow in zipOpenNewFileInZip4_6 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45853 │ +└────────────────────┴─────────────────────┴──────────┴──────────────┴─────────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘ diff --git a/TP5/Exercice-2.2/Dockerfile b/TP5/Exercice-2.2/Dockerfile new file mode 100644 index 0000000..0adca21 --- /dev/null +++ b/TP5/Exercice-2.2/Dockerfile @@ -0,0 +1,7 @@ +FROM ubuntu:20.04 +RUN apt-get update && \ + apt-get install -y python3 python3-pip +COPY requirements.txt . +RUN pip3 install -r requirements.txt +COPY app.py . +CMD ["python3", "app.py"] diff --git a/TP5/Exercice-2.2/app.py b/TP5/Exercice-2.2/app.py new file mode 100644 index 0000000..f595931 --- /dev/null +++ b/TP5/Exercice-2.2/app.py @@ -0,0 +1,9 @@ +from flask import Flask +app = Flask(__name__) + +@app.route('/') +def hello(): + return "Hello, World!" + +if __name__ == '__main__': + app.run(host='0.0.0.0', port=5000) diff --git a/TP5/Exercice-2.2/custom_flask_app_scan.txt b/TP5/Exercice-2.2/custom_flask_app_scan.txt new file mode 100644 index 0000000..ace7609 --- /dev/null +++ b/TP5/Exercice-2.2/custom_flask_app_scan.txt @@ -0,0 +1,4949 @@ + +Report Summary + +┌─────────────────────────────────────────────────────────────────────────────┬────────────┬─────────────────┬─────────┐ +│ Target │ Type │ Vulnerabilities │ Secrets │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ custom-flask-app (ubuntu 20.04) │ ubuntu │ 1338 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/Flask-1.1.1.dist-info/METADATA │ python-pkg │ 1 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/MarkupSafe-2.1.5.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/certifi-2025.4.26.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/chardet-3.0.4.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/click-8.1.8.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/idna-2.8.dist-info/METADATA │ python-pkg │ 1 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/itsdangerous-2.2.0.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/jinja2-3.1.6.dist-info/METADATA │ python-pkg │ 0 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/requests-2.22.0.dist-info/METADATA │ python-pkg │ 2 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/urllib3-1.25.11.dist-info/METADATA │ python-pkg │ 4 │ - │ +├─────────────────────────────────────────────────────────────────────────────┼────────────┼─────────────────┼─────────┤ +│ usr/local/lib/python3.8/dist-packages/werkzeug-3.0.6.dist-info/METADATA │ python-pkg │ 0 │ - │ +└─────────────────────────────────────────────────────────────────────────────┴────────────┴─────────────────┴─────────┘ +Legend: +- '-': Not scanned +- '0': Clean (no security findings detected) + + +custom-flask-app (ubuntu 20.04) +=============================== +Total: 1338 (UNKNOWN: 0, LOW: 102, MEDIUM: 1235, HIGH: 1, CRITICAL: 0) + +┌────────────────────────────┬──────────────────┬──────────┬──────────┬──────────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐ +│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ +├────────────────────────────┼──────────────────┼──────────┼──────────┼──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ binutils │ CVE-2017-13716 │ LOW │ affected │ 2.34-6ubuntu1.11 │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ binutils-aarch64-linux-gnu │ CVE-2017-13716 │ │ │ │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ binutils-common │ CVE-2017-13716 │ │ │ │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ coreutils │ CVE-2016-2781 │ │ │ 8.30-3ubuntu2 │ │ coreutils: Non-privileged session can escape to the parent │ +│ │ │ │ │ │ │ session in chroot │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-2781 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ dirmngr │ CVE-2022-3219 │ │ │ 2.2.19-3ubuntu2.4 │ │ gnupg: denial of service issue (resource consumption) using │ +│ │ │ │ │ │ │ compressed packets │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3219 │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gnupg │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gnupg-l10n │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gnupg-utils │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpg │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpg-agent │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpg-wks-client │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpg-wks-server │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpgconf │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpgsm │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ gpgv │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libbinutils │ CVE-2017-13716 │ │ │ 2.34-6ubuntu1.11 │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libc-bin │ CVE-2016-20013 │ │ │ 2.31-0ubuntu9.17 │ │ sha256crypt and sha512crypt through 0.6 allow attackers to │ +│ │ │ │ │ │ │ cause a denial of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-20013 │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libc-dev-bin │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libc6 │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libc6-dev │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libctf-nobfd0 │ CVE-2017-13716 │ │ │ 2.34-6ubuntu1.11 │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libctf0 │ CVE-2017-13716 │ │ │ │ │ binutils: Memory leak with the C++ symbol demangler routine │ +│ │ │ │ │ │ │ in libiberty │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-1010204 │ │ │ │ │ binutils: Improper Input Validation, Signed/Unsigned │ +│ │ │ │ │ │ │ Comparison, Out-of-bounds Read in gold/fileread.cc and │ +│ │ │ │ │ │ │ elfcpp/elfcpp_file.h... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-1010204 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48064 │ │ │ │ │ binutils: excessive memory consumption in │ +│ │ │ │ │ │ │ _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48064 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libgcrypt20 │ CVE-2024-2236 │ │ │ 1.8.5-5ubuntu1.1 │ │ libgcrypt: vulnerable to Marvin Attack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2236 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libncurses6 │ CVE-2023-45918 │ │ │ 6.2-0ubuntu2.1 │ │ ncurses: NULL pointer dereference in tgetstr in │ +│ │ │ │ │ │ │ tinfo/lib_termcap.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ │ │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────────────┼──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ libncursesw6 │ CVE-2023-45918 │ │ │ │ │ ncurses: NULL pointer dereference in tgetstr in │ +│ │ │ │ │ │ │ tinfo/lib_termcap.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ │ │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpam-modules │ CVE-2024-10041 │ MEDIUM │ │ 1.3.1-5ubuntu4.7 │ │ pam: libpam: Libpam vulnerable to read hashed password │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-10041 │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libpam-modules-bin │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libpam-runtime │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ libpam0g │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpcre2-8-0 │ CVE-2022-41409 │ LOW │ │ 10.34-7ubuntu0.1 │ │ pcre2: negative repeat value in a pcre2test subject line │ +│ │ │ │ │ │ │ leads to inifinite... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-41409 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libpcre3 │ CVE-2017-11164 │ │ │ 2:8.39-12ubuntu0.1 │ │ pcre: OP_KETRMAX feature in the match function in │ +│ │ │ │ │ │ │ pcre_exec.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-11164 │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libsqlite3-0 │ CVE-2025-29088 │ MEDIUM │ │ 3.31.1-4ubuntu0.6 │ │ sqlite: Denial of Service in SQLite │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-29088 │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libsystemd0 │ CVE-2023-26604 │ LOW │ │ 245.4-4ubuntu3.24 │ │ systemd: privilege escalation via the less pager │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-26604 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-7008 │ │ │ │ │ systemd-resolved: Unsigned name response in signed zone is │ +│ │ │ │ │ │ │ not refused when DNSSEC=yes... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-7008 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libtinfo6 │ CVE-2023-45918 │ │ │ 6.2-0ubuntu2.1 │ │ ncurses: NULL pointer dereference in tgetstr in │ +│ │ │ │ │ │ │ tinfo/lib_termcap.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ │ │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ libudev1 │ CVE-2023-26604 │ │ │ 245.4-4ubuntu3.24 │ │ systemd: privilege escalation via the less pager │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-26604 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-7008 │ │ │ │ │ systemd-resolved: Unsigned name response in signed zone is │ +│ │ │ │ │ │ │ not refused when DNSSEC=yes... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-7008 │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ linux-libc-dev │ CVE-2024-53168 │ HIGH │ │ 5.4.0-215.235 │ │ kernel: sunrpc: fix one UAF issue caused by sunrpc kernel │ +│ │ │ │ │ │ │ tcp socket... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53168 │ +│ ├──────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2013-7445 │ MEDIUM │ │ │ │ kernel: memory exhaustion via crafted Graphics Execution │ +│ │ │ │ │ │ │ Manager (GEM) objects │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-7445 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2015-7837 │ │ │ │ │ kernel: securelevel disabled after kexec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-7837 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2015-8553 │ │ │ │ │ xen: non-maskable interrupts triggerable by guests (xsa120) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2015-8553 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2016-8660 │ │ │ │ │ kernel: xfs: local DoS due to a page lock order bug in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2016-8660 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-17977 │ │ │ │ │ kernel: Mishandled interactions among XFRM Netlink messages, │ +│ │ │ │ │ │ │ IPPROTO_AH packets, and IPPROTO_IP packets... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-17977 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-7191 │ │ │ │ │ kernel: denial of service via ioctl call in network tun │ +│ │ │ │ │ │ │ handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-7191 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-12362 │ │ │ │ │ kernel: Integer overflow in Intel(R) Graphics Drivers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-12362 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14356 │ │ │ │ │ kernel: Use After Free vulnerability in cgroup BPF component │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14356 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-24504 │ │ │ │ │ kernel: Uncontrolled resource consumption in some Intel(R) │ +│ │ │ │ │ │ │ Ethernet E810 Adapter drivers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-24504 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-26144 │ │ │ │ │ kernel: accepting unencrypted A-MSDU frames that start with │ +│ │ │ │ │ │ │ RFC1042 header │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-26144 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-27835 │ │ │ │ │ kernel: child process is able to access parent mm through │ +│ │ │ │ │ │ │ hfi dev... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-27835 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36310 │ │ │ │ │ kernel: infinite loop in set_memory_region_test in │ +│ │ │ │ │ │ │ arch/x86/kvm/svm/svm.c for certain nested page faults... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36310 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36776 │ │ │ │ │ kernel: thermal/drivers/cpufreq_cooling: Fix slab OOB issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36776 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36784 │ │ │ │ │ kernel: i2c: cadence: fix reference leak when │ +│ │ │ │ │ │ │ pm_runtime_get_sync fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36784 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-36788 │ │ │ │ │ kernel: drm/nouveau: avoid a use-after-free when BO init │ +│ │ │ │ │ │ │ fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-36788 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3714 │ │ │ │ │ kernel: Remote Page Deduplication Attacks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3714 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-3864 │ │ │ │ │ kernel: descendant's dumpable setting with certain SUID │ +│ │ │ │ │ │ │ binaries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-3864 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-4148 │ │ │ │ │ kernel: Improper implementation of block_invalidatepage() │ +│ │ │ │ │ │ │ allows users to crash the kernel │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-4148 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-4440 │ │ │ │ │ kernel: x86/xen: Drop USERGS_SYSRET64 paravirt call │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-4440 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-46925 │ │ │ │ │ kernel: net/smc: fix kernel panic caused by race of smc_sock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46925 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-46941 │ │ │ │ │ kernel: usb: dwc3: core: Do core softreset when switch mode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46941 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-46982 │ │ │ │ │ kernel: f2fs: compress: fix race condition of overwrite vs │ +│ │ │ │ │ │ │ truncate │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46982 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-46987 │ │ │ │ │ kernel: btrfs: fix deadlock when cloning inline extents and │ +│ │ │ │ │ │ │ using qgroups │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46987 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47004 │ │ │ │ │ kernel: f2fs: fix to avoid touching checkpointed data in │ +│ │ │ │ │ │ │ get_victim() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47004 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47024 │ │ │ │ │ kernel: vsock/virtio: free queued packets when closing │ +│ │ │ │ │ │ │ socket │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47024 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47049 │ │ │ │ │ kernel: Drivers: hv: vmbus: Use after free in __vmbus_open() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47049 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47061 │ │ │ │ │ kernel: KVM: use-after-free while destroy I/O bus devices on │ +│ │ │ │ │ │ │ unregister failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47061 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47074 │ │ │ │ │ kernel: nvme-loop: fix memory leak in │ +│ │ │ │ │ │ │ nvme_loop_create_ctrl() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47074 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47077 │ │ │ │ │ kernel: scsi: qedf: Add pointer checks in │ +│ │ │ │ │ │ │ qedf_update_link_speed() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47077 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47113 │ │ │ │ │ kernel: btrfs: abort in rename_exchange if we fail to insert │ +│ │ │ │ │ │ │ the second... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47113 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47116 │ │ │ │ │ kernel: ext4: fix memory leak in ext4_mb_init_backend on │ +│ │ │ │ │ │ │ error path. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47116 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47139 │ │ │ │ │ kernel: net: hns3: put off calling register_netdev() until │ +│ │ │ │ │ │ │ client initialize complete │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47139 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47143 │ │ │ │ │ kernel: net/smc: remove device from smcd_dev_list after │ +│ │ │ │ │ │ │ failed device_add() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47143 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47158 │ │ │ │ │ kernel: net: dsa: sja1105: add error handling in │ +│ │ │ │ │ │ │ sja1105_setup() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47158 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47182 │ │ │ │ │ kernel: scsi: core: Fix scsi_mode_sense() buffer length │ +│ │ │ │ │ │ │ handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47182 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47183 │ │ │ │ │ kernel: scsi: lpfc: Fix link down processing to address NULL │ +│ │ │ │ │ │ │ pointer dereference... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47183 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47186 │ │ │ │ │ kernel: tipc: check for null after calling kmemdup │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47186 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47205 │ │ │ │ │ kernel: clk: sunxi-ng: Unregister clocks/resets when │ +│ │ │ │ │ │ │ unbinding │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47205 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47211 │ │ │ │ │ kernel: ALSA: usb-audio: fix null pointer dereference on │ +│ │ │ │ │ │ │ pointer cs_desc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47211 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47221 │ │ │ │ │ kernel: mm/slub: actually fix freelist pointer vs redzoning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47221 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47226 │ │ │ │ │ kernel: x86/fpu: Invalidate FPU state after a failed XRSTOR │ +│ │ │ │ │ │ │ from a user... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47226 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47233 │ │ │ │ │ kernel: regulator: rt4801: Fix NULL pointer dereference if │ +│ │ │ │ │ │ │ priv->enable_gpios is NULL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47233 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47234 │ │ │ │ │ kernel: phy: phy-mtk-tphy: Fix some resource leaks in │ +│ │ │ │ │ │ │ mtk_phy_init() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47234 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47247 │ │ │ │ │ kernel: net/mlx5e: Fix use-after-free of encap entry in │ +│ │ │ │ │ │ │ neigh update handler │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47247 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47253 │ │ │ │ │ kernel: drm/amd/display: Fix potential memory leak in DMUB │ +│ │ │ │ │ │ │ hw_init │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47253 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47265 │ │ │ │ │ kernel: RDMA: Verify port when creating flow rule │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47265 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47275 │ │ │ │ │ kernel: bcache: avoid oversized read request in cache │ +│ │ │ │ │ │ │ missing code path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47275 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47281 │ │ │ │ │ kernel: ALSA: seq: Fix race of snd_seq_timer_open() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47281 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47283 │ │ │ │ │ kernel: net:sfc: fix non-freed irq in legacy irq mode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47283 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47331 │ │ │ │ │ kernel: usb: common: usb-conn-gpio: fix NULL pointer │ +│ │ │ │ │ │ │ dereference of charger │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47331 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47335 │ │ │ │ │ kernel: f2fs: fix to avoid racing on fsync_entry_slab by │ +│ │ │ │ │ │ │ multi filesystem instances... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47335 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47339 │ │ │ │ │ kernel: media: v4l2-core: explicitly clear ioctl input data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47339 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47342 │ │ │ │ │ kernel: ext4: fix possible UAF when remounting r/o a │ +│ │ │ │ │ │ │ mmp-protected file system... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47342 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47348 │ │ │ │ │ kernel: drm/amd/display: Avoid HDCP over-read and corruption │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47348 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47352 │ │ │ │ │ kernel: virtio-net: Add validation for used length │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47352 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47362 │ │ │ │ │ kernel: drm/amd/pm: Update intermediate power state for SI │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47362 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47366 │ │ │ │ │ kernel: afs: Fix corruption in reads at fpos 2G-4G from an │ +│ │ │ │ │ │ │ OpenAFS... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47366 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47374 │ │ │ │ │ kernel: dma-debug: prevent an error message from causing │ +│ │ │ │ │ │ │ runtime problems │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47374 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47378 │ │ │ │ │ kernel: nvme-rdma: destroy cm id before destroy qp to avoid │ +│ │ │ │ │ │ │ use after... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47378 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47381 │ │ │ │ │ kernel: ASoC: SOF: Fix DSP oops stack dump output contents │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47381 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47391 │ │ │ │ │ kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before │ +│ │ │ │ │ │ │ issuing more requests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47391 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47399 │ │ │ │ │ kernel: ixgbe: Fix NULL pointer dereference in │ +│ │ │ │ │ │ │ ixgbe_xdp_setup │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47399 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47407 │ │ │ │ │ kernel: KVM: x86: Handle SRCU initialization failure during │ +│ │ │ │ │ │ │ page track init │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47407 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47408 │ │ │ │ │ kernel: netfilter: conntrack: serialize hash resizes and │ +│ │ │ │ │ │ │ cleanups │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47408 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47410 │ │ │ │ │ kernel: drm/amdkfd: fix svm_migrate_fini warning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47410 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47412 │ │ │ │ │ kernel: block: don't call rq_qos_ops->done_bio if the bio │ +│ │ │ │ │ │ │ isn't tracked │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47412 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47414 │ │ │ │ │ kernel: riscv: Flush current cpu icache before other cpus │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47414 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47428 │ │ │ │ │ kernel: powerpc/64s: fix program check interrupt emergency │ +│ │ │ │ │ │ │ stack path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47428 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47432 │ │ │ │ │ kernel: lib/generic-radix-tree.c: Don't overflow in peek() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47432 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47433 │ │ │ │ │ kernel: btrfs: fix abort logic in btrfs_replace_file_extents │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47433 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47438 │ │ │ │ │ kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() │ +│ │ │ │ │ │ │ error path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47438 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47452 │ │ │ │ │ kernel: netfilter: nf_tables: skip netdev events generated │ +│ │ │ │ │ │ │ on netns removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47452 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47467 │ │ │ │ │ kernel: kunit: fix reference count leak in kfree_at_end │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47467 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47473 │ │ │ │ │ kernel: scsi: qla2xxx: Fix a memory leak in an error path │ +│ │ │ │ │ │ │ of... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47473 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47479 │ │ │ │ │ kernel: staging: rtl8712: fix use-after-free in │ +│ │ │ │ │ │ │ rtl8712_dl_fw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47479 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47488 │ │ │ │ │ kernel: cgroup: Fix memory leak caused by missing │ +│ │ │ │ │ │ │ cgroup_bpf_offline │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47488 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47490 │ │ │ │ │ kernel: drm/ttm: fix memleak in ttm_transfered_destroy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47490 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47491 │ │ │ │ │ kernel: mm: khugepaged: skip huge page collapse for special │ +│ │ │ │ │ │ │ files │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47491 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47492 │ │ │ │ │ kernel: mm, thp: bail out early in collapse_file for │ +│ │ │ │ │ │ │ writeback page │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47492 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47493 │ │ │ │ │ kernel: ocfs2: fix race between searching chunks and release │ +│ │ │ │ │ │ │ journal_head from buffer_head... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47493 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47498 │ │ │ │ │ kernel: dm rq: don't queue request to blk-mq during DM │ +│ │ │ │ │ │ │ suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47498 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47504 │ │ │ │ │ kernel: io_uring: ensure task_work gets run as part of │ +│ │ │ │ │ │ │ cancelations │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47504 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47508 │ │ │ │ │ kernel: btrfs: free exchange changeset on failures │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47508 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47523 │ │ │ │ │ kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47523 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47544 │ │ │ │ │ kernel: tcp: fix page frag corruption on page fault │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47544 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47551 │ │ │ │ │ kernel: drm/amd/amdkfd: Fix kernel panic when reset failed │ +│ │ │ │ │ │ │ and been triggered again... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47551 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47552 │ │ │ │ │ kernel: blk-mq: cancel blk-mq dispatch work in both │ +│ │ │ │ │ │ │ blk_cleanup_queue and disk_release() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47552 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47559 │ │ │ │ │ kernel: net/smc: Fix NULL pointer dereferencing in │ +│ │ │ │ │ │ │ smc_vlan_by_tcpsk() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47559 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47560 │ │ │ │ │ kernel: mlxsw: spectrum: Protect driver from buggy firmware │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47560 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47577 │ │ │ │ │ kernel: io-wq: check for wq exit after adding new worker │ +│ │ │ │ │ │ │ task_work │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47577 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47580 │ │ │ │ │ kernel: scsi: scsi_debug: Fix type in min_t to avoid stack │ +│ │ │ │ │ │ │ OOB │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47580 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47582 │ │ │ │ │ kernel: USB: core: Make do_proc_control() and do_proc_bulk() │ +│ │ │ │ │ │ │ killable │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47582 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47599 │ │ │ │ │ kernel: btrfs: use latest_dev in btrfs_show_devname │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47599 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47618 │ │ │ │ │ kernel: ARM: 9170/1: fix panic when kasan and kprobe are │ +│ │ │ │ │ │ │ enabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47618 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47622 │ │ │ │ │ kernel: scsi: ufs: Fix a deadlock in the error handler │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47622 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47623 │ │ │ │ │ kernel: powerpc/fixmap: Fix VM debug warning on unmap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47623 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47632 │ │ │ │ │ kernel: powerpc/set_memory: Avoid spinlock recursion in │ +│ │ │ │ │ │ │ change_page_attr() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47632 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47635 │ │ │ │ │ kernel: ubifs: Fix to add refcount once page is set private │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47635 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47643 │ │ │ │ │ kernel: media: ir_toy: free before error exiting │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47643 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47644 │ │ │ │ │ kernel: media: staging: media: zoran: move videodev alloc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47644 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47645 │ │ │ │ │ kernel: media: staging: media: zoran: calculate the right │ +│ │ │ │ │ │ │ buffer number for zoran_reap_stat_com... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47645 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47648 │ │ │ │ │ kernel: gpu: host1x: Fix a memory leak in 'host1x_remove()' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47648 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47653 │ │ │ │ │ kernel: media: davinci: vpif: fix use-after-free on driver │ +│ │ │ │ │ │ │ unbind │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47653 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47654 │ │ │ │ │ kernel: samples/landlock: Fix path_list memory leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47654 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0400 │ │ │ │ │ kernel: Out of bounds read in the smc protocol stack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0400 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-0480 │ │ │ │ │ kernel: memcg does not limit the number of POSIX file locks │ +│ │ │ │ │ │ │ allowing... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-0480 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1205 │ │ │ │ │ kernel: Null pointer dereference and use after free in │ +│ │ │ │ │ │ │ net/ax25/ax25_timer.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1205 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1247 │ │ │ │ │ kernel: A race condition bug in rose_connect() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1247 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-1280 │ │ │ │ │ kernel: concurrency use-after-free between │ +│ │ │ │ │ │ │ drm_setmaster_ioctl and drm_mode_getresources │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1280 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-25836 │ │ │ │ │ Bluetooth® Low Energy Pairing in Bluetooth Core │ +│ │ │ │ │ │ │ Specification v4.0 through v5.3 may... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-25836 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-2961 │ │ │ │ │ kernel: race condition in rose_bind() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2961 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-29900 │ │ │ │ │ hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution │ +│ │ │ │ │ │ │ with Return Instructions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29900 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-3344 │ │ │ │ │ kernel: KVM: SVM: nested shutdown interception could lead to │ +│ │ │ │ │ │ │ host crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3344 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-3523 │ │ │ │ │ Kernel: race when faulting a device private page in memory │ +│ │ │ │ │ │ │ manager │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-3523 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-38457 │ │ │ │ │ kernel: vmwgfx: use-after-free in vmw_cmd_res_check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-38457 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-39189 │ │ │ │ │ kernel: TLB flush operations are mishandled in certain │ +│ │ │ │ │ │ │ KVM_VCPU_PREEMPTED leading to guest... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-39189 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-40133 │ │ │ │ │ kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-40133 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-4543 │ │ │ │ │ kernel: KASLR Prefetch Bypass Breaks KPTI │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-4543 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48628 │ │ │ │ │ kernel: ceph: drop messages from MDS when unmounting │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48628 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48633 │ │ │ │ │ kernel: drm/gma500: Fix WARN_ON(lock-->magic != lock) error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48633 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48634 │ │ │ │ │ kernel: drm/gma500: Fix BUG: sleeping function called from │ +│ │ │ │ │ │ │ invalid context errors │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48634 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48642 │ │ │ │ │ kernel: netfilter: nf_tables: fix percpu memory leak at │ +│ │ │ │ │ │ │ nf_tables_addchain() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48642 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48664 │ │ │ │ │ kernel: btrfs: fix hang during unmount when stopping a space │ +│ │ │ │ │ │ │ reclaim worker... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48664 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48673 │ │ │ │ │ kernel: net/smc: Fix possible access to freed memory in link │ +│ │ │ │ │ │ │ clear │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48673 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48698 │ │ │ │ │ kernel: drm/amd/display: fix memory leak when using │ +│ │ │ │ │ │ │ debugfs_lookup() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48698 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48699 │ │ │ │ │ kernel: sched/debug: fix dentry leak in │ +│ │ │ │ │ │ │ update_sched_domain_debugfs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48699 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48700 │ │ │ │ │ kernel: vfio/type1: Unpin zero pages │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48700 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48703 │ │ │ │ │ kernel: thermal/int340x_thermal: handle data_vault when the │ +│ │ │ │ │ │ │ value is ZERO_SIZE_PTR │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48703 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48706 │ │ │ │ │ kernel: vdpa: ifcvf: Do proper cleanup if IFCVF init fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48706 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48712 │ │ │ │ │ kernel: ext4: fix error handling in │ +│ │ │ │ │ │ │ ext4_fc_record_modified_inode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48712 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48721 │ │ │ │ │ kernel: net/smc: Forward wakeup to smc socket waitqueue │ +│ │ │ │ │ │ │ after fallback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48721 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48739 │ │ │ │ │ kernel: ASoC: hdmi-codec: Fix OOB memory accesses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48739 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48744 │ │ │ │ │ kernel: net/mlx5e: Avoid field-overflowing memcpy() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48744 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48751 │ │ │ │ │ kernel: net/smc: Transitional solution for clcsock race │ +│ │ │ │ │ │ │ issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48751 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48755 │ │ │ │ │ kernel: powerpc64/bpf: Limit 'ldbrx' to processors │ +│ │ │ │ │ │ │ compliant with ISA v2.06 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48755 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48761 │ │ │ │ │ kernel: usb: xhci-plat: fix crash when suspend if remote │ +│ │ │ │ │ │ │ wake enable │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48761 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48763 │ │ │ │ │ kernel: KVM: x86: Forcibly leave nested virt when SMM state │ +│ │ │ │ │ │ │ is toggled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48763 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48765 │ │ │ │ │ kernel: KVM: LAPIC: Also cancel preemption timer during │ +│ │ │ │ │ │ │ SET_LAPIC │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48765 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48766 │ │ │ │ │ kernel: drm/amd/display: Wrap dcn301_calculate_wm_and_dlg │ +│ │ │ │ │ │ │ for FPU. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48766 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48769 │ │ │ │ │ kernel: efi: runtime: avoid EFIv2 runtime services on Apple │ +│ │ │ │ │ │ │ x86 machines │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48769 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48771 │ │ │ │ │ kernel: drm/vmwgfx: Fix stale file descriptors on failed │ +│ │ │ │ │ │ │ usercopy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48771 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48792 │ │ │ │ │ kernel: scsi: pm8001: Fix use-after-free for aborted SSP/STP │ +│ │ │ │ │ │ │ sas_task │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48792 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48802 │ │ │ │ │ kernel: fs/proc: task_mmu.c: don't read mapcount for │ +│ │ │ │ │ │ │ migration entry │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48802 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48811 │ │ │ │ │ kernel: ibmvnic: don't release napi in __ibmvnic_open() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48811 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48818 │ │ │ │ │ kernel: net: dsa: mv88e6xxx: don't use devres for │ +│ │ │ │ │ │ │ mdiobus │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48818 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48825 │ │ │ │ │ kernel: scsi: qedf: Add stag_work to all the vports │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48825 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48826 │ │ │ │ │ kernel: drm/vc4: Fix deadlock on DSI device attach error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48826 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48827 │ │ │ │ │ kernel: NFSD: Fix the behavior of READ near OFFSET_MAX │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48827 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48828 │ │ │ │ │ kernel: NFSD: Fix ia_size underflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48828 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48829 │ │ │ │ │ kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of │ +│ │ │ │ │ │ │ large file sizes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48829 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48833 │ │ │ │ │ kernel: btrfs: skip reserved bytes warning on unmount after │ +│ │ │ │ │ │ │ log cleanup failure... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48833 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48852 │ │ │ │ │ kernel: drm/vc4: hdmi: Unregister codec device on unbind │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48852 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48865 │ │ │ │ │ kernel: tipc: fix kernel panic when enabling bearer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48865 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48875 │ │ │ │ │ kernel: wifi: mac80211: sdata can be NULL during AMPDU start │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48875 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48887 │ │ │ │ │ kernel: drm/vmwgfx: Remove rcu locks from user resources │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48887 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48893 │ │ │ │ │ kernel: drm/i915/gt: Cleanup partial engine discovery │ +│ │ │ │ │ │ │ failures │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48893 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48901 │ │ │ │ │ kernel: btrfs: do not start relocation until in progress │ +│ │ │ │ │ │ │ drops are done... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48901 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48909 │ │ │ │ │ kernel: net/smc: fix connection leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48909 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48920 │ │ │ │ │ kernel: btrfs: get rid of warning on transaction commit when │ +│ │ │ │ │ │ │ using flushoncommit... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48920 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48950 │ │ │ │ │ kernel: perf: Fix perf_pending_task() UaF │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48950 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48952 │ │ │ │ │ kernel: PCI: mt7621: Add sentinel to quirks table │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48952 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48953 │ │ │ │ │ kernel: rtc: cmos: Fix event handler registration ordering │ +│ │ │ │ │ │ │ issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48953 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48961 │ │ │ │ │ kernel: net: mdio: fix unbalanced fwnode reference count in │ +│ │ │ │ │ │ │ mdio_device_release() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48961 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48975 │ │ │ │ │ kernel: gpiolib: fix memory leak in gpiochip_setup_dev() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48975 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48979 │ │ │ │ │ kernel: drm/amd/display: fix array index out of bound error │ +│ │ │ │ │ │ │ in DCN32 DML... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48979 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48982 │ │ │ │ │ kernel: Bluetooth: Fix crash when replugging CSR fake │ +│ │ │ │ │ │ │ controllers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48982 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-48990 │ │ │ │ │ kernel: drm/amdgpu: fix use-after-free during gpu recovery │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-48990 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49000 │ │ │ │ │ kernel: iommu/vt-d: Fix PCI device refcount leak in │ +│ │ │ │ │ │ │ has_external_pci() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49000 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49026 │ │ │ │ │ kernel: e100: Fix possible use after free in │ +│ │ │ │ │ │ │ e100_xmit_prepare │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49026 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49027 │ │ │ │ │ kernel: iavf: Fix error handling in iavf_init_module() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49027 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49028 │ │ │ │ │ kernel: ixgbevf: Fix resource leak in ixgbevf_init_module() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49028 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49046 │ │ │ │ │ kernel: i2c: dev: check return value when calling │ +│ │ │ │ │ │ │ dev_set_name() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49046 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49049 │ │ │ │ │ kernel: mm/secretmem: fix panic when growing a memfd_secret │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49049 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49054 │ │ │ │ │ kernel: Drivers: hv: vmbus: Deactivate │ +│ │ │ │ │ │ │ sysctl_record_panic_msg by default in isolated guests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49054 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49065 │ │ │ │ │ kernel: SUNRPC: Fix the svc_deferred_event trace class │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49065 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49069 │ │ │ │ │ kernel: drm/amd/display: Fix by adding FPU protection for │ +│ │ │ │ │ │ │ dcn30_internal_validate_bw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49069 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49072 │ │ │ │ │ kernel: gpio: Restrict usage of GPIO chip irq members before │ +│ │ │ │ │ │ │ initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49072 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49082 │ │ │ │ │ kernel: scsi: mpt3sas: Fix use after free in │ +│ │ │ │ │ │ │ _scsih_expander_node_remove() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49082 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49097 │ │ │ │ │ kernel: NFS: Avoid writeback threads getting stuck in │ +│ │ │ │ │ │ │ mempool_alloc() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49097 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49102 │ │ │ │ │ kernel: habanalabs: fix possible memory leak in MMU DR fini │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49102 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49103 │ │ │ │ │ kernel: NFSv4.2: fix reference count leaks in │ +│ │ │ │ │ │ │ _nfs42_proc_copy_notify() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49103 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49104 │ │ │ │ │ kernel: staging: vchiq_core: handle NULL result of │ +│ │ │ │ │ │ │ find_service_by_handle │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49104 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49105 │ │ │ │ │ kernel: staging: wfx: fix an error handling in │ +│ │ │ │ │ │ │ wfx_init_common() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49105 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49106 │ │ │ │ │ kernel: staging: vchiq_arm: Avoid NULL ptr deref in │ +│ │ │ │ │ │ │ vchiq_dump_platform_instances │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49106 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49107 │ │ │ │ │ kernel: ceph: fix memory leak in ceph_readdir when │ +│ │ │ │ │ │ │ note_last_dentry returns error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49107 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49108 │ │ │ │ │ kernel: clk: mediatek: Fix memory leaks on probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49108 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49109 │ │ │ │ │ kernel: ceph: fix inode reference leakage in │ +│ │ │ │ │ │ │ ceph_get_snapdir() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49109 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49110 │ │ │ │ │ kernel: netfilter: conntrack: revisit gc autotuning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49110 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49112 │ │ │ │ │ kernel: mt76: fix monitor mode crash with sdio driver │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49112 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49113 │ │ │ │ │ kernel: powerpc/secvar: fix refcount leak in format_show() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49113 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49115 │ │ │ │ │ kernel: PCI: endpoint: Fix misused goto label │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49115 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49116 │ │ │ │ │ kernel: Bluetooth: use memset avoid memory leaks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49116 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49118 │ │ │ │ │ kernel: scsi: hisi_sas: Free irq vectors in order for v3 HW │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49118 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49119 │ │ │ │ │ kernel: scsi: pm8001: Fix memory leak in │ +│ │ │ │ │ │ │ pm8001_chip_fw_flash_update_req() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49119 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49120 │ │ │ │ │ kernel: scsi: pm8001: Fix task leak in │ +│ │ │ │ │ │ │ pm8001_send_abort_all() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49120 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49121 │ │ │ │ │ kernel: scsi: pm8001: Fix tag leaks on error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49121 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49123 │ │ │ │ │ kernel: ath11k: Fix frames flush failure caused by deadlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49123 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49124 │ │ │ │ │ kernel: x86/mce: Work around an erratum on fast string copy │ +│ │ │ │ │ │ │ instructions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49124 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49125 │ │ │ │ │ kernel: drm/sprd: fix potential NULL dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49125 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49126 │ │ │ │ │ kernel: scsi: mpi3mr: Fix memory leaks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49126 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49127 │ │ │ │ │ kernel: ref_tracker: implement use-after-free detection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49127 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49128 │ │ │ │ │ kernel: drm/bridge: Add missing pm_runtime_put_sync │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49128 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49129 │ │ │ │ │ kernel: mt76: mt7921: fix crash when startup fails. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49129 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49130 │ │ │ │ │ kernel: ath11k: mhi: use mhi_sync_power_up() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49130 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49131 │ │ │ │ │ kernel: ath11k: fix kernel panic during unload/load ath11k │ +│ │ │ │ │ │ │ modules │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49131 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49132 │ │ │ │ │ kernel: ath11k: pci: fix crash on suspend if board file is │ +│ │ │ │ │ │ │ not... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49132 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49133 │ │ │ │ │ kernel: drm/amdkfd: svm range restore work deadlock when │ +│ │ │ │ │ │ │ process exit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49133 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49134 │ │ │ │ │ kernel: mlxsw: spectrum: Guard against invalid local ports │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49134 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49135 │ │ │ │ │ kernel: drm/amd/display: Fix memory leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49135 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49136 │ │ │ │ │ kernel: Bluetooth: hci_sync: Fix queuing commands when │ +│ │ │ │ │ │ │ HCI_UNREGISTER is set │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49136 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49138 │ │ │ │ │ kernel: Bluetooth: hci_event: Ignore multiple conn complete │ +│ │ │ │ │ │ │ events │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49138 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49142 │ │ │ │ │ kernel: net: preserve skb_end_offset() in │ +│ │ │ │ │ │ │ skb_unclone_keeptruesize() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49142 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49149 │ │ │ │ │ kernel: rxrpc: Fix call timer start racing with call │ +│ │ │ │ │ │ │ destruction │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49149 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49154 │ │ │ │ │ kernel: KVM: SVM: fix panic on out-of-bounds guest IRQ │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49154 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49156 │ │ │ │ │ kernel: scsi: qla2xxx: Fix scheduling while atomic │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49156 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49157 │ │ │ │ │ kernel: scsi: qla2xxx: Fix premature hw access after PCI │ +│ │ │ │ │ │ │ error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49157 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49158 │ │ │ │ │ kernel: scsi: qla2xxx: Fix warning message due to adisc │ +│ │ │ │ │ │ │ being flushed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49158 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49159 │ │ │ │ │ kernel: scsi: qla2xxx: Implement ref count for SRB │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49159 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49161 │ │ │ │ │ kernel: ASoC: mediatek: Fix error handling in │ +│ │ │ │ │ │ │ mt8183_da7219_max98357_dev_probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49161 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49163 │ │ │ │ │ kernel: media: imx-jpeg: fix a bug of accessing array out of │ +│ │ │ │ │ │ │ bounds... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49163 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49164 │ │ │ │ │ kernel: powerpc/tm: Fix more userspace r13 corruption │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49164 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49165 │ │ │ │ │ kernel: media: imx-jpeg: Prevent decoding NV12M jpegs into │ +│ │ │ │ │ │ │ single-planar buffers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49165 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49167 │ │ │ │ │ kernel: btrfs: do not double complete bio on errors during │ +│ │ │ │ │ │ │ compressed reads... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49167 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49168 │ │ │ │ │ kernel: btrfs: do not clean up repair bio if submit fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49168 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49169 │ │ │ │ │ kernel: f2fs: use spin_lock to avoid hang │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49169 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49170 │ │ │ │ │ kernel: f2fs: fix to do sanity check on curseg->alloc_type │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49170 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49172 │ │ │ │ │ kernel: parisc: Fix non-access data TLB cache flush faults │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49172 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49173 │ │ │ │ │ kernel: spi: fsi: Implement a timeout for polling status │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49173 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49174 │ │ │ │ │ kernel: ext4: fix ext4_mb_mark_bb() with flex_bg with │ +│ │ │ │ │ │ │ fast_commit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49174 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49177 │ │ │ │ │ kernel: hwrng: cavium - fix NULL but dereferenced coccicheck │ +│ │ │ │ │ │ │ error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49177 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49178 │ │ │ │ │ kernel: memstick/mspro_block: fix handling of read-only │ +│ │ │ │ │ │ │ devices │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49178 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49182 │ │ │ │ │ kernel: net: hns3: add vlan list lock to protect vlan list │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49182 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49188 │ │ │ │ │ kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in │ +│ │ │ │ │ │ │ q6v5_alloc_memory_region │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49188 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49190 │ │ │ │ │ kernel: kernel/resource: fix kfree() of bootmem memory again │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49190 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49194 │ │ │ │ │ kernel: net: bcmgenet: Use stronger register read/writes to │ +│ │ │ │ │ │ │ assure ordering │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49194 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49196 │ │ │ │ │ kernel: powerpc/pseries: Fix use after free in │ +│ │ │ │ │ │ │ remove_phb_dynamic() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49196 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49201 │ │ │ │ │ kernel: ibmvnic: fix race between xmit and reset │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49201 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49215 │ │ │ │ │ kernel: xsk: Fix race at socket teardown │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49215 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49219 │ │ │ │ │ kernel: vfio/pci: fix memory leak during D3hot to D0 │ +│ │ │ │ │ │ │ transition │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49219 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49226 │ │ │ │ │ kernel: net: asix: add proper error handling of usb read │ +│ │ │ │ │ │ │ errors │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49226 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49234 │ │ │ │ │ kernel: net: dsa: Avoid cross-chip syncing of VLAN filtering │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49234 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49241 │ │ │ │ │ kernel: ASoC: atmel: Fix error handling in │ +│ │ │ │ │ │ │ sam9x5_wm8731_driver_probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49241 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49245 │ │ │ │ │ kernel: ASoC: rockchip: Fix PM usage reference of │ +│ │ │ │ │ │ │ rockchip_i2s_tdm_resume │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49245 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49246 │ │ │ │ │ kernel: ASoC: atmel: Fix error handling in snd_proto_probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49246 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49258 │ │ │ │ │ kernel: crypto: ccree - Fix use after free in │ +│ │ │ │ │ │ │ cc_cipher_exit() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49258 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49267 │ │ │ │ │ kernel: mmc: core: use sysfs_emit() instead of sprintf() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49267 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49281 │ │ │ │ │ kernel: cifs: fix handlecache and multiuser │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49281 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49285 │ │ │ │ │ kernel: iio: accel: mma8452: use the correct logic to get │ +│ │ │ │ │ │ │ mma8452_data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49285 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49289 │ │ │ │ │ kernel: uaccess: fix integer overflow on access_ok() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49289 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49294 │ │ │ │ │ kernel: drm/amd/display: Check if modulo is 0 before │ +│ │ │ │ │ │ │ dividing. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49294 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49296 │ │ │ │ │ kernel: ceph: fix possible deadlock when holding Fwb to get │ +│ │ │ │ │ │ │ inline_data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49296 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49303 │ │ │ │ │ kernel: drivers: staging: rtl8192eu: Fix deadlock in │ +│ │ │ │ │ │ │ rtw_joinbss_event_prehandle │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49303 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49306 │ │ │ │ │ kernel: usb: dwc3: host: Stop setting the ACPI companion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49306 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49309 │ │ │ │ │ kernel: drivers: staging: rtl8723bs: Fix deadlock in │ +│ │ │ │ │ │ │ rtw_surveydone_event_callback() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49309 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49310 │ │ │ │ │ kernel: char: xillybus: fix a refcount leak in cleanup_dev() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49310 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49311 │ │ │ │ │ kernel: drivers: staging: rtl8192bs: Fix deadlock in │ +│ │ │ │ │ │ │ rtw_joinbss_event_prehandle() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49311 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49312 │ │ │ │ │ kernel: staging: rtl8712: fix a potential memory leak in │ +│ │ │ │ │ │ │ r871xu_drv_init() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49312 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49317 │ │ │ │ │ kernel: f2fs: avoid infinite loop to flush node pages │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49317 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49319 │ │ │ │ │ kernel: iommu/arm-smmu-v3: check return value after calling │ +│ │ │ │ │ │ │ platform_get_resource() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49319 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49323 │ │ │ │ │ kernel: iommu/arm-smmu: fix possible null-ptr-deref in │ +│ │ │ │ │ │ │ arm_smmu_device_probe() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49323 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49325 │ │ │ │ │ kernel: tcp: add accessors to read/set tp->snd_cwnd │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49325 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49327 │ │ │ │ │ kernel: bcache: avoid journal no-space deadlock by reserving │ +│ │ │ │ │ │ │ 1 journal bucket │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49327 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49328 │ │ │ │ │ kernel: mt76: fix use-after-free by removing a non-RCU wcid │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49328 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49342 │ │ │ │ │ kernel: net: ethernet: bgmac: Fix refcount leak in │ +│ │ │ │ │ │ │ bcma_mdio_mii_register │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49342 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49348 │ │ │ │ │ kernel: ext4: filter out EXT4_FC_REPLAY from on-disk │ +│ │ │ │ │ │ │ superblock field s_state │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49348 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49360 │ │ │ │ │ kernel: f2fs: fix to do sanity check on total_data_blocks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49360 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49361 │ │ │ │ │ kernel: f2fs: fix to do sanity check for inline inode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49361 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49376 │ │ │ │ │ kernel: scsi: sd: Fix potential NULL pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49376 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49390 │ │ │ │ │ kernel: macsec: fix UAF bug for real_dev │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49390 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49393 │ │ │ │ │ kernel: misc: fastrpc: fix list iterator in │ +│ │ │ │ │ │ │ fastrpc_req_mem_unmap_impl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49393 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49398 │ │ │ │ │ kernel: usb: dwc3: gadget: Replace │ +│ │ │ │ │ │ │ list_for_each_entry_safe() if using giveback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49398 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49401 │ │ │ │ │ kernel: mm/page_owner: use strscpy() instead of strlcpy() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49401 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49420 │ │ │ │ │ kernel: net: annotate races around sk->sk_bound_dev_if │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49420 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49428 │ │ │ │ │ kernel: f2fs: fix to do sanity check on inline_dots inode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49428 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49430 │ │ │ │ │ kernel: Input: gpio-keys - cancel delayed work only in case │ +│ │ │ │ │ │ │ of GPIO... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49430 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49437 │ │ │ │ │ kernel: powerpc/xive: Fix refcount leak in xive_spapr_init │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49437 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49440 │ │ │ │ │ kernel: powerpc/rtas: Keep MSR[RI] set when calling RTAS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49440 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49443 │ │ │ │ │ kernel: list: fix a data-race around ep->rdllist │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49443 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49444 │ │ │ │ │ kernel: module: fix [e_shstrndx].sh_size=0 OOB access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49444 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49445 │ │ │ │ │ kernel: pinctrl: renesas: core: Fix possible null-ptr-deref │ +│ │ │ │ │ │ │ in sh_pfc_map_resources() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49445 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49449 │ │ │ │ │ kernel: pinctrl: renesas: rzn1: Fix possible null-ptr-deref │ +│ │ │ │ │ │ │ in sh_pfc_map_resources() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49449 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49453 │ │ │ │ │ kernel: soc: ti: ti_sci_pm_domains: Check for null return of │ +│ │ │ │ │ │ │ devm_kcalloc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49453 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49465 │ │ │ │ │ kernel: blk-throttle: Set BIO_THROTTLED when bio has been │ +│ │ │ │ │ │ │ throttled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49465 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49468 │ │ │ │ │ kernel: thermal/core: Fix memory leak in │ +│ │ │ │ │ │ │ __thermal_cooling_device_register() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49468 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49469 │ │ │ │ │ kernel: btrfs: fix anon_dev leak in create_subvol() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49469 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49470 │ │ │ │ │ kernel: Bluetooth: btmtksdio: fix use-after-free at │ +│ │ │ │ │ │ │ btmtksdio_recv_event │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49470 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49471 │ │ │ │ │ kernel: rtw89: cfo: check mac_id to avoid out-of-bounds │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49471 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49496 │ │ │ │ │ kernel: media: mediatek: vcodec: prevent kernel crash when │ +│ │ │ │ │ │ │ rmmod mtk-vcodec-dec.ko │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49496 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49497 │ │ │ │ │ kernel: net: remove two BUG() from skb_checksum_help() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49497 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49501 │ │ │ │ │ kernel: usbnet: Run unregister_netdev() before unbind() │ +│ │ │ │ │ │ │ again │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49501 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49502 │ │ │ │ │ kernel: media: rga: fix possible memory leak in rga_probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49502 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49504 │ │ │ │ │ kernel: scsi: lpfc: Inhibit aborts if external loopback plug │ +│ │ │ │ │ │ │ is inserted │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49504 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49512 │ │ │ │ │ kernel: mtd: rawnand: denali: Use managed device resources │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49512 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49513 │ │ │ │ │ kernel: cpufreq: governor: Use kobject release() method to │ +│ │ │ │ │ │ │ free dbs_data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49513 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49516 │ │ │ │ │ kernel: ice: always check VF VSI pointer values │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49516 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49518 │ │ │ │ │ kernel: ASoC: SOF: ipc3-topology: Correct get_control_data │ +│ │ │ │ │ │ │ for non bytes payload │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49518 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49519 │ │ │ │ │ kernel: ath10k: skip ath10k_halt during suspend for driver │ +│ │ │ │ │ │ │ state RESTARTING │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49519 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49521 │ │ │ │ │ kernel: scsi: lpfc: Fix resource leak in │ +│ │ │ │ │ │ │ lpfc_sli4_send_seq_to_ulp() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49521 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49523 │ │ │ │ │ kernel: ath11k: disable spectral scan during spectral deinit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49523 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49528 │ │ │ │ │ kernel: media: i2c: dw9714: Disable the regulator when the │ +│ │ │ │ │ │ │ driver fails to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49528 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49529 │ │ │ │ │ kernel: drm/amdgpu/pm: fix the null pointer while the smu is │ +│ │ │ │ │ │ │ disabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49529 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49531 │ │ │ │ │ kernel: loop: implement ->free_disk │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49531 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49533 │ │ │ │ │ kernel: ath11k: Change max no of active probe SSID and BSSID │ +│ │ │ │ │ │ │ to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49533 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49534 │ │ │ │ │ kernel: scsi: lpfc: Protect memory leak for NPIV ports │ +│ │ │ │ │ │ │ sending PLOGI_RJT │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49534 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49535 │ │ │ │ │ kernel: scsi: lpfc: Fix null pointer dereference after │ +│ │ │ │ │ │ │ failing to issue FLOGI... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49535 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49536 │ │ │ │ │ kernel: scsi: lpfc: Fix SCSI I/O completion and abort │ +│ │ │ │ │ │ │ handler deadlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49536 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49537 │ │ │ │ │ kernel: scsi: lpfc: Fix call trace observed during I/O with │ +│ │ │ │ │ │ │ CMF enabled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49537 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49539 │ │ │ │ │ kernel: rtw89: ser: fix CAM leaks occurring in L2 reset │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49539 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49540 │ │ │ │ │ kernel: rcu-tasks: Fix race in schedule and flush work │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49540 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49541 │ │ │ │ │ kernel: cifs: fix potential double free during failed mount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49541 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49542 │ │ │ │ │ kernel: scsi: lpfc: Move cfg_log_verbose check before │ +│ │ │ │ │ │ │ calling lpfc_dmp_dbg() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49542 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49543 │ │ │ │ │ kernel: ath11k: fix the warning of dev_wake in │ +│ │ │ │ │ │ │ mhi_pm_disable_transition() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49543 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49545 │ │ │ │ │ kernel: ALSA: usb-audio: Cancel pending work at closing a │ +│ │ │ │ │ │ │ MIDI substream │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49545 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49546 │ │ │ │ │ kernel: x86/kexec: fix memory leak of elf header buffer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49546 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49555 │ │ │ │ │ kernel: Bluetooth: hci_qca: Use del_timer_sync() before │ +│ │ │ │ │ │ │ freeing │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49555 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49562 │ │ │ │ │ kernel: KVM: x86: Use __try_cmpxchg_user() to update guest │ +│ │ │ │ │ │ │ PTE A/D bits │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49562 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49563 │ │ │ │ │ kernel: crypto: qat - add param check for RSA │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49563 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49564 │ │ │ │ │ kernel: crypto: qat - add param check for DH │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49564 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49566 │ │ │ │ │ kernel: crypto: qat - fix memory leak in RSA │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49566 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49578 │ │ │ │ │ kernel: ip: Fix data-races around sysctl_ip_prot_sock. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49578 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49579 │ │ │ │ │ kernel: ipv4: Fix data-races around │ +│ │ │ │ │ │ │ sysctl_fib_multipath_hash_policy. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49579 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49585 │ │ │ │ │ kernel: tcp: Fix data-races around │ +│ │ │ │ │ │ │ sysctl_tcp_fastopen_blackhole_timeout. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49585 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49599 │ │ │ │ │ kernel: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49599 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49603 │ │ │ │ │ kernel: ip: Fix data-races around │ +│ │ │ │ │ │ │ sysctl_ip_fwd_update_priority. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49603 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49610 │ │ │ │ │ kernel: KVM: VMX: Prevent RSB underflow before vmenter │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49610 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49615 │ │ │ │ │ kernel: ASoC: rt711-sdca: fix kernel NULL pointer │ +│ │ │ │ │ │ │ dereference when IO error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49615 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49616 │ │ │ │ │ kernel: ASoC: rt7*-sdw: harden jack_detect_handler │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49616 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49617 │ │ │ │ │ kernel: ASoC: Intel: sof_sdw: handle errors on card │ +│ │ │ │ │ │ │ registration │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49617 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49618 │ │ │ │ │ kernel: pinctrl: aspeed: Fix potential NULL dereference in │ +│ │ │ │ │ │ │ aspeed_pinmux_set_mux() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49618 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49622 │ │ │ │ │ kernel: netfilter: nf_tables: avoid skb access on nf_stolen │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49622 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49623 │ │ │ │ │ kernel: powerpc/xive/spapr: correct bitmap allocation size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49623 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49630 │ │ │ │ │ kernel: tcp: Fix a data-race around sysctl_tcp_ecn_fallback. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49630 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49632 │ │ │ │ │ kernel: icmp: Fix a data-race around │ +│ │ │ │ │ │ │ sysctl_icmp_errors_use_inbound_ifaddr. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49632 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49635 │ │ │ │ │ kernel: drm/i915/selftests: fix subtraction overflow bug │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49635 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49640 │ │ │ │ │ kernel: sysctl: Fix data races in proc_douintvec_minmax(). │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49640 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49641 │ │ │ │ │ kernel: sysctl: Fix data races in proc_douintvec(). │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49641 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49650 │ │ │ │ │ kernel: dmaengine: qcom: bam_dma: fix runtime PM underflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49650 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49651 │ │ │ │ │ kernel: srcu: Tighten cleanup_srcu_struct() GP checks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49651 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49658 │ │ │ │ │ kernel: bpf: Fix insufficient bounds propagation from │ +│ │ │ │ │ │ │ adjust_scalar_min_max_vals │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49658 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49664 │ │ │ │ │ kernel: tipc: move bc link creation back to tipc_node_create │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49664 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49666 │ │ │ │ │ kernel: powerpc/memhotplug: Add add_pages override for PPC │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49666 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49696 │ │ │ │ │ kernel: tipc: fix use-after-free Read in tipc_named_reinit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49696 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49698 │ │ │ │ │ kernel: netfilter: use get_random_u32 instead of prandom │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49698 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49701 │ │ │ │ │ kernel: scsi: ibmvfc: Allocate/free queue resource only │ +│ │ │ │ │ │ │ during probe/remove │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49701 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49711 │ │ │ │ │ kernel: bus: fsl-mc-bus: fix KASAN use-after-free in │ +│ │ │ │ │ │ │ fsl_mc_bus_remove() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49711 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49720 │ │ │ │ │ kernel: block: Fix handling of offline queues in │ +│ │ │ │ │ │ │ blk_mq_alloc_request_hctx() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49720 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49723 │ │ │ │ │ kernel: drm/i915/reset: Fix error_state_read ptr + offset │ +│ │ │ │ │ │ │ use │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49723 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49728 │ │ │ │ │ kernel: ipv6: Fix signed integer overflow in │ +│ │ │ │ │ │ │ __ip6_append_data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49728 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49730 │ │ │ │ │ kernel: scsi: lpfc: Resolve NULL ptr dereference after an │ +│ │ │ │ │ │ │ ELS LOGO is... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49730 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49742 │ │ │ │ │ kernel: f2fs: initialize locks earlier in f2fs_fill_super() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49742 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49743 │ │ │ │ │ kernel: ovl: Use "buf" flexible array for memcpy() │ +│ │ │ │ │ │ │ destination │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49743 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49747 │ │ │ │ │ kernel: erofs/zmap.c: Fix incorrect offset calculation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49747 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49749 │ │ │ │ │ kernel: i2c: designware: use casting of u64 in clock │ +│ │ │ │ │ │ │ multiplication to avoid... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49749 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49750 │ │ │ │ │ kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49750 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49758 │ │ │ │ │ kernel: reset: uniphier-glue: Fix possible null-ptr-deref │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49758 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-49761 │ │ │ │ │ kernel: btrfs: always report error in run_one_delayed_ref() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-49761 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0030 │ │ │ │ │ kernel: Use after Free in nvkm_vmm_pfn_map │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0030 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-0160 │ │ │ │ │ kernel: possibility of deadlock in libbpf function │ +│ │ │ │ │ │ │ sock_hash_delete_elem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-0160 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-1582 │ │ │ │ │ kernel: Soft lockup occurred during __page_mapcount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-1582 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-2007 │ │ │ │ │ kernel: DPT I2O controller TOCTOU information disclosure │ +│ │ │ │ │ │ │ vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2007 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-26242 │ │ │ │ │ afu_mmio_region_get_by_offset in │ +│ │ │ │ │ │ │ drivers/fpga/dfl-afu-region.c in the ... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-26242 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-31082 │ │ │ │ │ kernel: sleeping function called from an invalid context in │ +│ │ │ │ │ │ │ gsmld_write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-31082 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39176 │ │ │ │ │ kernel: ksmbd: Transform Header Out-Of-Bounds Read │ +│ │ │ │ │ │ │ Information Disclosure Vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39176 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39179 │ │ │ │ │ kernel: ksmbd: Read Request Out-Of-Bounds Read Information │ +│ │ │ │ │ │ │ Disclosure Vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39179 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39180 │ │ │ │ │ kernel: ksmbd: Read Request Memory Leak Denial-of-Service │ +│ │ │ │ │ │ │ Vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39180 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-39198 │ │ │ │ │ kernel: QXL: race condition leading to use-after-free in │ +│ │ │ │ │ │ │ qxl_mode_dumb_create() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39198 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4458 │ │ │ │ │ kernel: ksmbd: smb2_open out-of-bounds read information │ +│ │ │ │ │ │ │ disclosure vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4458 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-45896 │ │ │ │ │ kernel: ntfs3: kernel memory read by mounting a filesystem │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45896 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52442 │ │ │ │ │ In the Linux kernel, the following vulnerability has been │ +│ │ │ │ │ │ │ resolved: k... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52442 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52474 │ │ │ │ │ kernel: non-PAGE_SIZE-end multi-iovec user SDMA requests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52474 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52476 │ │ │ │ │ kernel: perf/x86/lbr: Filter vsyscall addresses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52476 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52479 │ │ │ │ │ kernel: ksmbd: fix uaf in smb20_oplock_break_ack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52479 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52481 │ │ │ │ │ kernel: arm64: errata: Add Cortex-A520 speculative │ +│ │ │ │ │ │ │ unprivileged load workaround │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52481 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52485 │ │ │ │ │ kernel: drm/amd/display: Wake DMCUB before sending a command │ +│ │ │ │ │ │ │ cause deadlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52485 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52489 │ │ │ │ │ kernel: mm/sparsemem: fix race in accessing │ +│ │ │ │ │ │ │ memory_section->usage │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52489 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52500 │ │ │ │ │ kernel: scsi: pm80xx: Avoid leaking tags when processing │ +│ │ │ │ │ │ │ OPC_INB_SET_CONTROLLER_CONFIG command │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52500 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52508 │ │ │ │ │ kernel: nvme-fc: Prevent null pointer dereference in │ +│ │ │ │ │ │ │ nvme_fc_io_getuuid() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52508 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52511 │ │ │ │ │ kernel: spi: sun6i: reduce DMA RX transfer width to single │ +│ │ │ │ │ │ │ byte │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52511 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52515 │ │ │ │ │ kernel: RDMA/srp: Do not call scsi_done() from srp_abort() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52515 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52516 │ │ │ │ │ kernel: dma-debug: don't call __dma_entry_alloc_check_leak() │ +│ │ │ │ │ │ │ under free_entries_lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52516 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52561 │ │ │ │ │ kernel: arm64: dts: qcom: sdm845-db845c: unreserved cont │ +│ │ │ │ │ │ │ splash memory region leads to... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52561 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52569 │ │ │ │ │ kernel: btrfs: improper BUG() call after failure to insert │ +│ │ │ │ │ │ │ delayed dir index... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52569 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52572 │ │ │ │ │ kernel: cifs: use-after-free in cifs_demultiplex_thread() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52572 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52586 │ │ │ │ │ kernel: drm/msm/dpu: Add mutex lock in control vblank irq │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52586 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52588 │ │ │ │ │ kernel: f2fs: fix to tag gcing flag on page during block │ +│ │ │ │ │ │ │ migration... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52588 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52589 │ │ │ │ │ kernel: media: rkisp1: Fix IRQ disable race issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52589 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52590 │ │ │ │ │ kernel: ocfs2: Avoid touching renamed directory if parent │ +│ │ │ │ │ │ │ does not change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52590 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52591 │ │ │ │ │ kernel: reiserfs: Avoid touching renamed directory if parent │ +│ │ │ │ │ │ │ does not change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52591 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52593 │ │ │ │ │ kernel: wifi: wfx: fix possible NULL pointer dereference in │ +│ │ │ │ │ │ │ wfx_set_mfp_ap() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52593 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52610 │ │ │ │ │ kernel: net/sched: act_ct: fix skb leak and crash on ooo │ +│ │ │ │ │ │ │ frags │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52610 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52618 │ │ │ │ │ kernel: block/rnbd-srv: Check for unlikely string overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52618 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52624 │ │ │ │ │ kernel: drm/amd/display: Wake DMCUB before executing GPINT │ +│ │ │ │ │ │ │ commands │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52624 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52632 │ │ │ │ │ kernel: drm/amdkfd: lock dependency warning with srcu │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52632 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52634 │ │ │ │ │ kernel: drm/amd/display: Fix disable_otg_wa logic │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52634 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52635 │ │ │ │ │ kernel: PM / devfreq: Synchronize │ +│ │ │ │ │ │ │ devfreq_monitor_[start/stop] │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52635 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52638 │ │ │ │ │ kernel: can: j1939: prevent deadlock by changing │ +│ │ │ │ │ │ │ j1939_socks_lock to rwlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52638 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52640 │ │ │ │ │ kernel: fs/ntfs3: Fix oob in ntfs_listxattr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52640 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52641 │ │ │ │ │ kernel: fs/ntfs3: Add NULL ptr dereference checking at the │ +│ │ │ │ │ │ │ end of attr_allocate_frame()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52641 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52648 │ │ │ │ │ kernel: drm/vmwgfx: Unmap the surface before resetting it on │ +│ │ │ │ │ │ │ a plane state... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52648 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52652 │ │ │ │ │ kernel: NTB: fix possible name leak in ntb_register_device() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52652 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52653 │ │ │ │ │ kernel: SUNRPC: fix a memleak in gss_import_v2_context │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52653 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52657 │ │ │ │ │ kernel: Revert "drm/amd/pm: resolve reboot exception for │ +│ │ │ │ │ │ │ si oland" │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52657 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52660 │ │ │ │ │ kernel: media: rkisp1: Fix IRQ handling due to shared │ +│ │ │ │ │ │ │ interrupts │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52660 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52669 │ │ │ │ │ kernel: crypto: s390/aes - Fix buffer overread in CTR mode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52669 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52671 │ │ │ │ │ kernel: drm/amd/display: Fix hang/underflow when │ +│ │ │ │ │ │ │ transitioning to ODM4:1 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52671 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52673 │ │ │ │ │ kernel: drm/amd/display: Fix a debugfs null pointer error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52673 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52674 │ │ │ │ │ kernel: ALSA: scarlett2: Add clamp() in │ +│ │ │ │ │ │ │ scarlett2_mixer_ctl_put() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52674 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52676 │ │ │ │ │ kernel: bpf: Guard stack limits against 32bit overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52676 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52680 │ │ │ │ │ kernel: ALSA: scarlett2: Add missing error checks to │ +│ │ │ │ │ │ │ *_ctl_get() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52680 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52700 │ │ │ │ │ kernel: tipc: fix kernel warning when sending SYN message │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52700 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52701 │ │ │ │ │ kernel: net: use a bounce buffer for copying skb->mark │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52701 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52732 │ │ │ │ │ kernel: ceph: blocklist the kclient when receiving corrupted │ +│ │ │ │ │ │ │ snap trace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52732 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52735 │ │ │ │ │ kernel: bpf, sockmap: Don't let │ +│ │ │ │ │ │ │ sock_map_{close,destroy,unhash} call itself │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52735 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52736 │ │ │ │ │ kernel: ALSA: hda: Do not unset preset when cleaning up │ +│ │ │ │ │ │ │ codec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52736 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52737 │ │ │ │ │ kernel: btrfs: lock the inode in shared mode before starting │ +│ │ │ │ │ │ │ fiemap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52737 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52748 │ │ │ │ │ kernel: f2fs: avoid format-overflow warning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52748 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52750 │ │ │ │ │ kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS │ +│ │ │ │ │ │ │ 15.x or... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52750 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52751 │ │ │ │ │ kernel: smb: client: fix use-after-free in │ +│ │ │ │ │ │ │ smb2_query_info_compound() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52751 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52754 │ │ │ │ │ kernel: media: imon: fix access to invalid resource for the │ +│ │ │ │ │ │ │ second interface... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52754 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52755 │ │ │ │ │ kernel: ksmbd: fix slab out of bounds write in │ +│ │ │ │ │ │ │ smb_inherit_dacl() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52755 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52757 │ │ │ │ │ kernel: smb: client: fix potential deadlock when releasing │ +│ │ │ │ │ │ │ mids │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52757 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52761 │ │ │ │ │ kernel: riscv: VMAP_STACK overflow detection thread-safe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52761 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52762 │ │ │ │ │ kernel: virtio-blk: fix implicit overflow on │ +│ │ │ │ │ │ │ virtio_max_dma_size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52762 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52763 │ │ │ │ │ kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for │ +│ │ │ │ │ │ │ accessing DAT_data. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52763 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52766 │ │ │ │ │ kernel: i3c: mipi-i3c-hci: Fix out of bounds access in │ +│ │ │ │ │ │ │ hci_dma_irq_handler │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52766 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52781 │ │ │ │ │ kernel: usb: config: fix iteration issue in │ +│ │ │ │ │ │ │ 'usb_get_bos_descriptor()' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52781 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52808 │ │ │ │ │ kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL │ +│ │ │ │ │ │ │ after removing debugfs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52808 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52811 │ │ │ │ │ kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty │ +│ │ │ │ │ │ │ event... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52811 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52816 │ │ │ │ │ kernel: drm/amdkfd: Fix shift out-of-bounds issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52816 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52825 │ │ │ │ │ kernel: drm/amdkfd: Fix a race condition of vram buffer │ +│ │ │ │ │ │ │ unref in svm... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52825 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52826 │ │ │ │ │ kernel: drm/panel/panel-tpo-tpg110: fix a possible null │ +│ │ │ │ │ │ │ pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52826 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52828 │ │ │ │ │ kernel: bpf: Detect IP == ksym.end as part of BPF program │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52828 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52829 │ │ │ │ │ kernel: wifi: ath12k: fix possible out-of-bound write in │ +│ │ │ │ │ │ │ ath12k_wmi_ext_hal_reg_caps() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52829 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52831 │ │ │ │ │ kernel: cpu/hotplug: Don't offline the last non-isolated CPU │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52831 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52833 │ │ │ │ │ kernel: Bluetooth: btusb: Add date->evt_skb is NULL check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52833 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52834 │ │ │ │ │ kernel: atl1c: Work around the DMA RX overflow issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52834 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52854 │ │ │ │ │ kernel: padata: Fix refcnt handling in padata_free_shell() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52854 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52878 │ │ │ │ │ kernel: can: dev: can_put_echo_skb(): don't crash kernel │ +│ │ │ │ │ │ │ if can_priv::echo_skb is accessed out... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52878 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52879 │ │ │ │ │ kernel: tracing: Have trace_event_file have ref counters │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52879 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52884 │ │ │ │ │ kernel: Input: cyapa - add missing input core locking to │ +│ │ │ │ │ │ │ suspend/resume functions... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52884 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52888 │ │ │ │ │ kernel: media: mediatek: vcodec: Only free buffer VA that is │ +│ │ │ │ │ │ │ not NULL... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52888 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52903 │ │ │ │ │ kernel: io_uring: lock overflowing for IOPOLL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52903 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52916 │ │ │ │ │ kernel: media: aspeed: Fix memory overwrite if timing is │ +│ │ │ │ │ │ │ 1600x900 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52916 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52920 │ │ │ │ │ kernel: bpf: support non-r10 register spill/fill to/from │ +│ │ │ │ │ │ │ stack in precision tracking │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52920 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52921 │ │ │ │ │ kernel: drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52921 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52925 │ │ │ │ │ kernel: netfilter: nf_tables: don't fail inserts if │ +│ │ │ │ │ │ │ duplicate has expired │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52925 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52926 │ │ │ │ │ kernel: io_uring/rw: split io_read() into a helper │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52926 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52928 │ │ │ │ │ kernel: bpf: Skip invalid kfunc call in backtrack_insn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52928 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52935 │ │ │ │ │ kernel: mm/khugepaged: fix ->anon_vma race │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52935 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52936 │ │ │ │ │ kernel: kernel/irq/irqdomain.c: fix memory leak with using │ +│ │ │ │ │ │ │ debugfs_lookup() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52936 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52939 │ │ │ │ │ kernel: mm: memcg: fix NULL pointer in │ +│ │ │ │ │ │ │ mem_cgroup_track_foreign_dirty_slowpath() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52939 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52975 │ │ │ │ │ kernel: scsi: iscsi_tcp: Fix UAF during logout when │ +│ │ │ │ │ │ │ accessing the shost ipaddress... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52975 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52978 │ │ │ │ │ kernel: riscv: kprobe: Fixup kernel panic when probing an │ +│ │ │ │ │ │ │ illegal position │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52978 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53001 │ │ │ │ │ kernel: drm/drm_vma_manager: Add drm_vma_node_allow_once() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53001 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53008 │ │ │ │ │ kernel: cifs: fix potential memory leaks in session setup │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53008 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53009 │ │ │ │ │ kernel: drm/amdkfd: Add sync after creating vram bo │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53009 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53010 │ │ │ │ │ kernel: bnxt: Do not read past the end of test names │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53010 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53020 │ │ │ │ │ kernel: l2tp: close all race conditions in │ +│ │ │ │ │ │ │ l2tp_tunnel_register() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53020 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53022 │ │ │ │ │ kernel: net: enetc: avoid deadlock in │ +│ │ │ │ │ │ │ enetc_tx_onestep_tstamp() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53022 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-53034 │ │ │ │ │ kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in │ +│ │ │ │ │ │ │ switchtec_ntb_mw_set_trans │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-53034 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-6610 │ │ │ │ │ kernel: OOB Access in smb2_dump_detail │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-6610 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-1151 │ │ │ │ │ kernel: stack overflow problem in Open vSwitch kernel module │ +│ │ │ │ │ │ │ leading to DoS... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-1151 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-21823 │ │ │ │ │ kernel: dmaengine/idxd: hardware erratum allows potential │ +│ │ │ │ │ │ │ security problem with direct access by... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-21823 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-25744 │ │ │ │ │ kernel: untrusted VMM can trigger int80 syscall handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-25744 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26595 │ │ │ │ │ kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer │ +│ │ │ │ │ │ │ dereference in error path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26595 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26629 │ │ │ │ │ kernel: nfsd: fix RELEASE_LOCKOWNER │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26629 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26644 │ │ │ │ │ kernel: btrfs: don't abort filesystem when attempting to │ +│ │ │ │ │ │ │ snapshot deleted subvolume │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26644 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26647 │ │ │ │ │ kernel: drm/amd/display: Fix late dereference 'dsc' check in │ +│ │ │ │ │ │ │ 'link_set_dsc_pps_packet()' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26647 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26648 │ │ │ │ │ kernel: NULL check in edp_setup_replay() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26648 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26656 │ │ │ │ │ kernel: drm/amdgpu: use-after-free vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26656 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26658 │ │ │ │ │ kernel: bcachefs: grab s_umount only if snapshotting │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26658 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26659 │ │ │ │ │ kernel: xhci: handle isoc Babble and Buffer Overrun events │ +│ │ │ │ │ │ │ properly │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26659 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26672 │ │ │ │ │ kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before │ +│ │ │ │ │ │ │ NULL check in 'amdgpu_mca_smu_get_mca_entry()' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26672 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26686 │ │ │ │ │ kernel: fs/proc: do_task_stat: use sig->stats_lock to gather │ +│ │ │ │ │ │ │ the threads/children stats │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26686 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26691 │ │ │ │ │ kernel: KVM: arm64: Fix circular locking dependency │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26691 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26699 │ │ │ │ │ kernel: drm/amd/display: Fix array-index-out-of-bounds in │ +│ │ │ │ │ │ │ dcn35_clkmgr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26699 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26700 │ │ │ │ │ kernel: drm/amd/display: Fix MST Null Ptr for RV │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26700 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26715 │ │ │ │ │ kernel: usb: dwc3: gadget: Fix NULL pointer dereference in │ +│ │ │ │ │ │ │ dwc3_gadget_suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26715 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26719 │ │ │ │ │ kernel: nouveau: offload fence uevents work to workqueue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26719 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26720 │ │ │ │ │ kernel: mm/writeback: fix possible divide-by-zero in │ +│ │ │ │ │ │ │ wb_dirty_limits(), again │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26720 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26726 │ │ │ │ │ kernel: btrfs: don't drop extent_map for free space inode on │ +│ │ │ │ │ │ │ write error... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26726 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26739 │ │ │ │ │ kernel: net/sched: act_mirred: don't override retval if we │ +│ │ │ │ │ │ │ already lost the skb... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26739 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26740 │ │ │ │ │ kernel: net/sched: act_mirred: use the backlog for mirred │ +│ │ │ │ │ │ │ ingress │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26740 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26743 │ │ │ │ │ kernel: RDMA/qedr: Fix qedr_create_user_qp error flow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26743 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26744 │ │ │ │ │ kernel: RDMA/srpt: Support specifying the srpt_service_guid │ +│ │ │ │ │ │ │ parameter │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26744 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26747 │ │ │ │ │ kernel: usb: roles: fix NULL pointer issue when put module's │ +│ │ │ │ │ │ │ reference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26747 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26756 │ │ │ │ │ kernel: md: Don't register sync_thread for reshape directly │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26756 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26757 │ │ │ │ │ kernel: md: Don't ignore read-only array in │ +│ │ │ │ │ │ │ md_check_recovery() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26757 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26758 │ │ │ │ │ kernel: md: Don't ignore suspended array in │ +│ │ │ │ │ │ │ md_check_recovery() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26758 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26759 │ │ │ │ │ kernel: mm/swap: fix race when skipping swapcache │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26759 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26767 │ │ │ │ │ kernel: drm/amd/display: fixed integer types and null check │ +│ │ │ │ │ │ │ locations │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26767 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26769 │ │ │ │ │ kernel: nvmet-fc: avoid deadlock on delete association path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26769 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26770 │ │ │ │ │ kernel: HID: nvidia-shield: Add missing null pointer checks │ +│ │ │ │ │ │ │ to LED initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26770 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26771 │ │ │ │ │ kernel: dmaengine: ti: edma: Add some null pointer checks to │ +│ │ │ │ │ │ │ the edma_probe... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26771 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26774 │ │ │ │ │ kernel: ext4: avoid dividing by 0 in │ +│ │ │ │ │ │ │ mb_update_avg_fragment_size() when block bitmap corrupt... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26774 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26775 │ │ │ │ │ kernel: aoe: avoid potential deadlock at set_capacity │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26775 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26776 │ │ │ │ │ kernel: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts │ +│ │ │ │ │ │ │ were detected │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26776 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26795 │ │ │ │ │ kernel: riscv: Sparse-Memory/vmemmap out-of-bounds fix │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26795 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26807 │ │ │ │ │ kernel: spi: cadence-qspi: fix pointer reference in runtime │ +│ │ │ │ │ │ │ PM hooks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26807 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26842 │ │ │ │ │ kernel: scsi: ufs: core: Fix shift issue in │ +│ │ │ │ │ │ │ ufshcd_clear_cmd() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26842 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26843 │ │ │ │ │ kernel: efi: runtime: Fix potential overflow of │ +│ │ │ │ │ │ │ soft-reserved region size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26843 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26844 │ │ │ │ │ kernel: block: Fix WARNING in _copy_from_iter │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26844 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26866 │ │ │ │ │ kernel: spi: lpspi: Avoid potential use-after-free in │ +│ │ │ │ │ │ │ probe() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26866 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26869 │ │ │ │ │ kernel: f2fs: fix to truncate meta inode pages forcely │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26869 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26876 │ │ │ │ │ kernel: drm/bridge: adv7511: fix crash on irq during probe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26876 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26900 │ │ │ │ │ kernel: md: fix kmemleak of rdev->serial │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26900 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26936 │ │ │ │ │ kernel: ksmbd: validate request buffer size in │ +│ │ │ │ │ │ │ smb2_allocate_rsp_buf() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26936 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26938 │ │ │ │ │ kernel: drm/i915/bios: Tolerate devdata==NULL in │ +│ │ │ │ │ │ │ intel_bios_encoder_supports_dp_dual_mode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26938 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26945 │ │ │ │ │ kernel: crypto: iaa - Fix nr_cpus < nr_iaa case │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26945 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26948 │ │ │ │ │ kernel: drm/amd/display: Add a dc_state NULL check in │ +│ │ │ │ │ │ │ dc_state_release │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26948 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26954 │ │ │ │ │ kernel: ksmbd: fix slab-out-of-bounds in │ +│ │ │ │ │ │ │ smb_strndup_from_utf16() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26954 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26958 │ │ │ │ │ kernel: nfs: fix UAF in direct writes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26958 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26961 │ │ │ │ │ kernel: mac802154: fix llsec key resources release in │ +│ │ │ │ │ │ │ mac802154_llsec_key_del │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26961 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26962 │ │ │ │ │ kernel: dm-raid456, md/raid456: fix a deadlock for │ +│ │ │ │ │ │ │ dm-raid456 while io concurrent with... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26962 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26980 │ │ │ │ │ kernel: ksmbd: fix slab-out-of-bounds in │ +│ │ │ │ │ │ │ smb2_allocate_rsp_buf │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26980 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26988 │ │ │ │ │ kernel: init/main.c: Fix potential static_command_line │ +│ │ │ │ │ │ │ memory overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26988 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27002 │ │ │ │ │ kernel: clk: mediatek: Do a runtime PM get on controllers │ +│ │ │ │ │ │ │ during probe... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27002 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27014 │ │ │ │ │ kernel: net/mlx5e: Prevent deadlock while disabling aRFS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27014 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27025 │ │ │ │ │ kernel: nbd: null check for nla_nest_start │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27025 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27032 │ │ │ │ │ kernel: f2fs: fix to avoid potential panic during recovery │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27032 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27037 │ │ │ │ │ kernel: clk: zynq: Prevent null pointer dereference caused │ +│ │ │ │ │ │ │ by kmalloc failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27037 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27052 │ │ │ │ │ kernel: wifi: rtl8xxxu: add cancel_work_sync() for │ +│ │ │ │ │ │ │ c2hcmd_work │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27052 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27054 │ │ │ │ │ kernel: s390/dasd: fix double module refcount decrement │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27054 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27056 │ │ │ │ │ kernel: wifi: iwlwifi: mvm: ensure offloading TID queue │ +│ │ │ │ │ │ │ exists │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27056 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27057 │ │ │ │ │ kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware │ +│ │ │ │ │ │ │ on system suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27057 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27062 │ │ │ │ │ kernel: nouveau: lock the client object tree. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27062 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27072 │ │ │ │ │ kernel: media: usbtv: Remove useless locks in │ +│ │ │ │ │ │ │ usbtv_video_free() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27072 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27402 │ │ │ │ │ kernel: phonet/pep: fix racy skb_queue_empty() use │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27402 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27403 │ │ │ │ │ kernel: netfilter: nft_flow_offload: reset dst in route │ +│ │ │ │ │ │ │ object after setting up flow... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27403 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27407 │ │ │ │ │ kernel: fs/ntfs3: Fixed overflow check in mi_enum_attr() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27407 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27408 │ │ │ │ │ kernel: dmaengine: dw-edma: eDMA: Add sync read before │ +│ │ │ │ │ │ │ starting the DMA transfer... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27408 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27415 │ │ │ │ │ kernel: netfilter: bridge: confirm multicast packets before │ +│ │ │ │ │ │ │ passing them up the stack... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27415 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35247 │ │ │ │ │ kernel: fpga: region: add owner module and take its refcount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35247 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35784 │ │ │ │ │ kernel: btrfs: fix deadlock with fiemap and extent locking │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35784 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35790 │ │ │ │ │ kernel: usb: typec: altmodes/displayport: create sysfs nodes │ +│ │ │ │ │ │ │ as driver's default device attribute... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35790 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35791 │ │ │ │ │ kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF │ +│ │ │ │ │ │ │ in svm_register_enc_region()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35791 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35794 │ │ │ │ │ kernel: dm-raid: really frozen sync_thread during suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35794 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35799 │ │ │ │ │ kernel: drm/amd/display: Prevent crash when disable stream │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35799 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35803 │ │ │ │ │ kernel: x86/efistub: Call mixed mode boot services on the │ +│ │ │ │ │ │ │ firmware's stack │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35803 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35808 │ │ │ │ │ kernel: md/dm-raid: don't call md_reap_sync_thread() │ +│ │ │ │ │ │ │ directly │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35808 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35817 │ │ │ │ │ kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35817 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35826 │ │ │ │ │ kernel: block: Fix page refcounts for unaligned buffers in │ +│ │ │ │ │ │ │ __bio_release_pages() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35826 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35832 │ │ │ │ │ kernel: bcachefs: kvfree bch_fs::snapshots in │ +│ │ │ │ │ │ │ bch2_fs_snapshots_exit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35832 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35837 │ │ │ │ │ kernel: net: mvpp2: clear BM pool before initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35837 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35839 │ │ │ │ │ kernel: netfilter: bridge: replace physindev with physinif │ +│ │ │ │ │ │ │ in nf_bridge_info │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35839 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35843 │ │ │ │ │ kernel: iommu/vt-d: Use device rbtree in iopf reporting path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35843 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35861 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ cifs_signal_cifsd_for_reconnect() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35861 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35862 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ smb2_is_network_name_deleted() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35862 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35863 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ is_valid_oplock_break() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35863 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35865 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ smb2_is_valid_oplock_break() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35865 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35866 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ cifs_dump_full_key() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35866 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35867 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ cifs_stats_proc_show() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35867 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35868 │ │ │ │ │ kernel: smb: client: fix potential UAF in │ +│ │ │ │ │ │ │ cifs_stats_proc_write() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35868 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35869 │ │ │ │ │ kernel: smb: client: guarantee refcounted children from │ +│ │ │ │ │ │ │ parent session │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35869 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35870 │ │ │ │ │ kernel: smb: client: fix UAF in smb2_reconnect_server() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35870 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35871 │ │ │ │ │ kernel: riscv: process: Fix kernel gp leakage │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35871 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35875 │ │ │ │ │ kernel: x86/coco: Require seeding RNG with RDRAND on CoCo │ +│ │ │ │ │ │ │ systems │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35875 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35878 │ │ │ │ │ kernel: of: module: prevent NULL pointer dereference in │ +│ │ │ │ │ │ │ vsnprintf() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35878 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35924 │ │ │ │ │ kernel: usb: typec: ucsi: Limit read size on v1.2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35924 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35926 │ │ │ │ │ kernel: crypto: iaa - Fix async_disable descriptor leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35926 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35927 │ │ │ │ │ kernel: drm: Check output polling initialized before │ +│ │ │ │ │ │ │ disabling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35927 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35928 │ │ │ │ │ kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks │ +│ │ │ │ │ │ │ in amdgpu_device_init() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35928 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35929 │ │ │ │ │ kernel: rcu/nocb: Fix WARN_ON_ONCE() in the │ +│ │ │ │ │ │ │ rcu_nocb_bypass_lock() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35929 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35931 │ │ │ │ │ kernel: drm/amdgpu: Skip do PCI error slot reset during RAS │ +│ │ │ │ │ │ │ recovery │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35931 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35932 │ │ │ │ │ kernel: drm/vc4: don't check if plane->state->fb == │ +│ │ │ │ │ │ │ state->fb │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35932 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35934 │ │ │ │ │ kernel: net/smc: reduce rtnl pressure in │ +│ │ │ │ │ │ │ smc_pnet_create_pnetids_list() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35934 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35937 │ │ │ │ │ kernel: wifi: cfg80211: check A-MSDU format more carefully │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35937 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35938 │ │ │ │ │ kernel: wifi: ath11k: decrease MHI channel buffer length to │ +│ │ │ │ │ │ │ 8KB │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35938 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35939 │ │ │ │ │ kernel: dma-direct: Leak pages on dma_set_decrypted() │ +│ │ │ │ │ │ │ failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35939 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35940 │ │ │ │ │ kernel: pstore/zone: Add a null pointer check to the │ +│ │ │ │ │ │ │ psz_kmsg_read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35940 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35942 │ │ │ │ │ kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc │ +│ │ │ │ │ │ │ clock to hdmimix domain │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35942 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35943 │ │ │ │ │ kernel: pmdomain: ti: Add a null pointer check to the │ +│ │ │ │ │ │ │ omap_prm_domain_init │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35943 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35945 │ │ │ │ │ kernel: net: phy: phy_device: Prevent nullptr exceptions on │ +│ │ │ │ │ │ │ ISR │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35945 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35946 │ │ │ │ │ kernel: wifi: rtw89: fix null pointer access when abort scan │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35946 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35948 │ │ │ │ │ kernel: bcachefs: Check for journal entries overruning end │ +│ │ │ │ │ │ │ of sb clean section... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35948 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35949 │ │ │ │ │ kernel: btrfs: make sure that WRITTEN is set on all metadata │ +│ │ │ │ │ │ │ blocks... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35949 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35959 │ │ │ │ │ kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35959 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35995 │ │ │ │ │ kernel: ACPI: CPPC: Use access_width over bit_width for │ +│ │ │ │ │ │ │ system memory accesses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35995 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35998 │ │ │ │ │ kernel: smb3: fix lock ordering potential deadlock in │ +│ │ │ │ │ │ │ cifs_sync_mid_result │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35998 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35999 │ │ │ │ │ kernel: smb3: missing lock when picking channel │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35999 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36003 │ │ │ │ │ kernel: ice: fix LAG and VF lock dependency in │ +│ │ │ │ │ │ │ ice_reset_vf() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36003 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36009 │ │ │ │ │ kernel: ax25: Fix netdev refcount issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36009 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36013 │ │ │ │ │ kernel: Bluetooth: L2CAP: Fix slab-use-after-free in │ +│ │ │ │ │ │ │ l2cap_connect() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36013 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36022 │ │ │ │ │ kernel: drm/amdgpu: Init zone device and drm client after │ +│ │ │ │ │ │ │ mode-1 reset on... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36022 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36024 │ │ │ │ │ kernel: drm/amd/display: Disable idle reallow as part of │ +│ │ │ │ │ │ │ command/gpint execution │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36024 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36026 │ │ │ │ │ kernel: drm/amd/pm: fixes a random hang in S4 for SMU │ +│ │ │ │ │ │ │ v13.0.4/11 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36026 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36029 │ │ │ │ │ kernel: mmc: sdhci-msm: pervent access to suspended │ +│ │ │ │ │ │ │ controller │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36029 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36244 │ │ │ │ │ kernel: net/sched: taprio: extend minimum interval │ +│ │ │ │ │ │ │ restriction to entire cycle too │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36244 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36347 │ │ │ │ │ kernel: hw:amd: Improper signature verification in AMD CPU │ +│ │ │ │ │ │ │ ROM microcode patch loader... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36347 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36479 │ │ │ │ │ kernel: fpga: bridge: add owner module and take its refcount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36479 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36880 │ │ │ │ │ kernel: Bluetooth: qca: add missing firmware sanity checks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36880 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36885 │ │ │ │ │ kernel: drm/nouveau/firmware: Fix SG_DEBUG error with │ +│ │ │ │ │ │ │ nvkm_firmware_ctor() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36885 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36903 │ │ │ │ │ kernel: ipv6: Fix potential uninit-value access in │ +│ │ │ │ │ │ │ __ip6_make_skb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36903 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36907 │ │ │ │ │ kernel: SUNRPC: add a missing rpc_stat for TCP TLS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36907 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36908 │ │ │ │ │ kernel: blk-iocost: do not WARN if iocg was already offlined │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36908 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36909 │ │ │ │ │ kernel: Drivers: hv: vmbus: Don't free ring buffers that │ +│ │ │ │ │ │ │ couldn't be re-encrypted... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36909 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36910 │ │ │ │ │ kernel: uio_hv_generic: Don't free decrypted memory │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36910 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36911 │ │ │ │ │ kernel: hv_netvsc: Don't free decrypted memory │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36911 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36912 │ │ │ │ │ kernel: Drivers: hv: vmbus: Track decrypted status in │ +│ │ │ │ │ │ │ vmbus_gpadl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36912 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36913 │ │ │ │ │ kernel: Drivers: hv: vmbus: Leak pages if │ +│ │ │ │ │ │ │ set_memory_encrypted() fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36913 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36914 │ │ │ │ │ kernel: drm/amd/display: Skip on writeback when it's not │ +│ │ │ │ │ │ │ applicable │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36914 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36915 │ │ │ │ │ kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36915 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36916 │ │ │ │ │ kernel: blk-iocost: avoid out of bounds shift │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36916 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36917 │ │ │ │ │ kernel: block: fix overflow in blk_ioctl_discard() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36917 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36918 │ │ │ │ │ kernel: bpf: Check bloom filter map value size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36920 │ │ │ │ │ kernel: scsi: mpi3mr: Avoid memcpy field-spanning write │ +│ │ │ │ │ │ │ WARNING │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36920 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36921 │ │ │ │ │ kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on │ +│ │ │ │ │ │ │ removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36921 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36922 │ │ │ │ │ kernel: wifi: iwlwifi: read txq->read_ptr under lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36922 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36923 │ │ │ │ │ kernel: fs/9p: fix uninitialized values during inode evict │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36923 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36924 │ │ │ │ │ kernel: scsi: lpfc: Release hbalock before calling │ +│ │ │ │ │ │ │ lpfc_worker_wake_up() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36924 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36927 │ │ │ │ │ kernel: ipv4: Fix uninit-value access in __ip_make_skb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36927 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36928 │ │ │ │ │ kernel: s390/qeth: Fix kernel panic after setting hsuid │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36928 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36948 │ │ │ │ │ kernel: drm/xe/xe_migrate: Cast to output precision before │ +│ │ │ │ │ │ │ multiplying operands │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36948 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36949 │ │ │ │ │ kernel: amd/amdkfd: sync all devices to wait all processes │ +│ │ │ │ │ │ │ being evicted │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36949 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36951 │ │ │ │ │ kernel: drm/amdkfd: range check cp bad op exception │ +│ │ │ │ │ │ │ interrupts │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36951 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36966 │ │ │ │ │ kernel: erofs: reliably distinguish block based and fscache │ +│ │ │ │ │ │ │ mode │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36966 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36969 │ │ │ │ │ kernel: drm/amd/display: Fix division by zero in │ +│ │ │ │ │ │ │ setup_dsc_config │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36969 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-36970 │ │ │ │ │ kernel: wifi: iwlwifi: Use request_module_nowait │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-36970 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37021 │ │ │ │ │ kernel: fpga: manager: add owner module and take its │ +│ │ │ │ │ │ │ refcount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37021 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37354 │ │ │ │ │ kernel: btrfs: fix crash on racing fsync and size-extending │ +│ │ │ │ │ │ │ write into prealloc... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37354 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38306 │ │ │ │ │ kernel: btrfs: protect folio::private when attaching extent │ +│ │ │ │ │ │ │ buffer folios │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38306 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38541 │ │ │ │ │ kernel: of: module: add buffer overflow check in │ +│ │ │ │ │ │ │ of_modalias() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38541 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38545 │ │ │ │ │ kernel: RDMA/hns: Fix UAF for cq async event │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38545 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38546 │ │ │ │ │ kernel: drm: vc4: Fix possible null pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38546 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38547 │ │ │ │ │ kernel: media: atomisp: ssh_css: Fix a null-pointer │ +│ │ │ │ │ │ │ dereference in load_video_binaries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38547 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38554 │ │ │ │ │ kernel: ax25: Fix reference count leak issue of net_device │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38554 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38556 │ │ │ │ │ kernel: net/mlx5: Add a timeout to acquire the command queue │ +│ │ │ │ │ │ │ semaphore │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38556 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38580 │ │ │ │ │ kernel: epoll: be better about file lifetimes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38580 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38591 │ │ │ │ │ kernel: RDMA/hns: Fix deadlock on SRQ async events. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38591 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38608 │ │ │ │ │ kernel: net/mlx5e: Fix netif state handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38608 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-38632 │ │ │ │ │ kernel: vfio/pci: fix potential memory leak in │ +│ │ │ │ │ │ │ vfio_intx_enable() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-38632 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39282 │ │ │ │ │ kernel: net: wwan: t7xx: Fix FSM command timeout issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39282 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39293 │ │ │ │ │ kernel: Revert "xsk: Support redirect to any socket │ +│ │ │ │ │ │ │ bound to the same... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39293 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39298 │ │ │ │ │ kernel: mm/memory-failure: fix handling of dissolved but not │ +│ │ │ │ │ │ │ taken off from buddy... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39298 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39490 │ │ │ │ │ kernel: ipv6: sr: fix missing sk_buff release in │ +│ │ │ │ │ │ │ seg6_input_core │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39490 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39497 │ │ │ │ │ kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, │ +│ │ │ │ │ │ │ MAP_PRIVATE) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39497 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39500 │ │ │ │ │ kernel: sock_map: avoid race between sock_map_close and │ +│ │ │ │ │ │ │ sk_psock_put │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39500 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39507 │ │ │ │ │ kernel: net: hns3: fix kernel crash problem in concurrent │ +│ │ │ │ │ │ │ scenario │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39507 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-39508 │ │ │ │ │ kernel: io_uring/io-wq: Use set_bit() and test_bit() at │ +│ │ │ │ │ │ │ worker->flags │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-39508 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40900 │ │ │ │ │ kernel: cachefiles: remove requests from xarray during │ +│ │ │ │ │ │ │ flushing requests │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40900 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40918 │ │ │ │ │ kernel: parisc: Try to fix random segmentation faults in │ +│ │ │ │ │ │ │ package builds │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40927 │ │ │ │ │ kernel: xhci: Handle TD clearing for multiple streams case │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40927 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40947 │ │ │ │ │ kernel: ima: Avoid blocking in RCU read-side critical │ +│ │ │ │ │ │ │ section │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40947 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40966 │ │ │ │ │ kernel: tty: add the option to have a tty reject a new... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40966 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40971 │ │ │ │ │ kernel: f2fs: remove clear SB_INLINECRYPT flag in │ +│ │ │ │ │ │ │ default_options │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40971 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40972 │ │ │ │ │ kernel: ext4: do not create EA inode under buffer lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40972 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40975 │ │ │ │ │ kernel: platform/x86: x86-android-tablets: Unregister │ +│ │ │ │ │ │ │ devices in reverse order │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40975 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40976 │ │ │ │ │ kernel: drm/lima: mask irqs in timeout path before hard │ +│ │ │ │ │ │ │ reset │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40976 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40977 │ │ │ │ │ kernel: wifi: mt76: mt7921s: fix potential hung tasks during │ +│ │ │ │ │ │ │ chip recovery │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40977 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40979 │ │ │ │ │ kernel: wifi: ath12k: fix kernel crash during resume │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40979 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40990 │ │ │ │ │ kernel: RDMA/mlx5: Add check for srq max_sge attribute │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40990 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40998 │ │ │ │ │ kernel: ext4: fix uninitialized ratelimit_state->lock │ +│ │ │ │ │ │ │ access in __ext4_fill_super() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40998 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-40999 │ │ │ │ │ kernel: net: ena: Add validation for completion descriptors │ +│ │ │ │ │ │ │ consistency │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-40999 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41001 │ │ │ │ │ kernel: io_uring/sqpoll: work around a potential audit │ +│ │ │ │ │ │ │ memory leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41001 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41005 │ │ │ │ │ kernel: netpoll: Fix race condition in netpoll_owner_active │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41005 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41008 │ │ │ │ │ kernel: drm/amdgpu: change vm->task_info handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41008 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41013 │ │ │ │ │ kernel: xfs: don't walk off the end of a directory data │ +│ │ │ │ │ │ │ block... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41013 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41014 │ │ │ │ │ kernel: xfs: add bounds checking to │ +│ │ │ │ │ │ │ xlog_recover_process_data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41014 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41019 │ │ │ │ │ kernel: fs/ntfs3: Validate ff offset │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41019 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41023 │ │ │ │ │ kernel: sched/deadline: Fix task_struct reference leak │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41023 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41030 │ │ │ │ │ kernel: ksmbd: discard write access to the directory open │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41030 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41031 │ │ │ │ │ kernel: mm/filemap: skip to create PMD-sized page cache if │ +│ │ │ │ │ │ │ needed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41031 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41048 │ │ │ │ │ kernel: skmsg: Skip zero length skb in sk_msg_recvmsg │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41048 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41050 │ │ │ │ │ kernel: cachefiles: cyclic allocation of msg_id to avoid │ +│ │ │ │ │ │ │ reuse │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41050 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41060 │ │ │ │ │ kernel: drm/radeon: check bo_va->bo is non-NULL before │ +│ │ │ │ │ │ │ using it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41060 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41062 │ │ │ │ │ kernel: bluetooth/l2cap: sync sock recv cb and release │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41062 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41067 │ │ │ │ │ kernel: btrfs: scrub: handle RST lookup error correctly │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41067 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41069 │ │ │ │ │ kernel: ASoC: topology: Fix references to freed memory │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41069 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41074 │ │ │ │ │ kernel: cachefiles: Set object to close if ondemand_id < │ +│ │ │ │ │ │ │ 0 in copen... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41074 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41075 │ │ │ │ │ kernel: cachefiles: add consistency check for copen/cread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41075 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41077 │ │ │ │ │ kernel: null_blk: fix validation of block size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41077 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41078 │ │ │ │ │ kernel: btrfs: qgroup: fix quota root leak after quota │ +│ │ │ │ │ │ │ disable failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41078 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41079 │ │ │ │ │ kernel: nvmet: always initialize cqe.result │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41079 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41082 │ │ │ │ │ kernel: nvme-fabrics: use reserved tag for reg read/write │ +│ │ │ │ │ │ │ command │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41082 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41935 │ │ │ │ │ kernel: f2fs: fix to shrink read extent node in batches │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41935 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42067 │ │ │ │ │ kernel: bpf: Take return from set_memory_rox() into account │ +│ │ │ │ │ │ │ with bpf_jit_binary_lock_ro() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42067 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42080 │ │ │ │ │ kernel: RDMA/restrack: Fix potential invalid address access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42080 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42082 │ │ │ │ │ kernel: xdp: Remove WARN() from __xdp_reg_mem_model() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42082 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42091 │ │ │ │ │ kernel: drm/xe: Check pat.ops before dumping PAT settings │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42091 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42098 │ │ │ │ │ kernel: crypto: ecdh - explicitly zeroize private_key │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42098 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42110 │ │ │ │ │ kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to │ +│ │ │ │ │ │ │ call netif_rx() from __netif_rx() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42110 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42114 │ │ │ │ │ kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM │ +│ │ │ │ │ │ │ values │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42114 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42117 │ │ │ │ │ kernel: drm/amd/display: ASSERT when failing to find index │ +│ │ │ │ │ │ │ by plane/stream id │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42117 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42118 │ │ │ │ │ kernel: drm/amd/display: Do not return negative stream id │ +│ │ │ │ │ │ │ for array │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42118 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42120 │ │ │ │ │ kernel: drm/amd/display: Check pipe offset before setting │ +│ │ │ │ │ │ │ vblank │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42120 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42121 │ │ │ │ │ kernel: drm/amd/display: Check index msg_id before read or │ +│ │ │ │ │ │ │ write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42121 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42125 │ │ │ │ │ kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz │ +│ │ │ │ │ │ │ channel if... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42125 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42126 │ │ │ │ │ kernel: powerpc: Avoid nmi_enter/nmi_exit in real mode │ +│ │ │ │ │ │ │ interrupt. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42126 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42128 │ │ │ │ │ kernel: leds: an30259a: Use devm_mutex_init() for mutex │ +│ │ │ │ │ │ │ initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42128 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42129 │ │ │ │ │ kernel: leds: mlxreg: Use devm_mutex_init() for mutex │ +│ │ │ │ │ │ │ initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42129 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42130 │ │ │ │ │ kernel: nfc/nci: Add the inconsistency check between the │ +│ │ │ │ │ │ │ input data length and... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42130 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42134 │ │ │ │ │ kernel: virtio-pci: Check if is_avq is NULL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42134 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42135 │ │ │ │ │ kernel: vhost_task: Handle SIGKILL by flushing work and │ +│ │ │ │ │ │ │ exiting │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42135 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42147 │ │ │ │ │ kernel: crypto: hisilicon/debugfs - Fix debugfs uninit │ +│ │ │ │ │ │ │ process issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42147 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42151 │ │ │ │ │ kernel: bpf: mark bpf_dummy_struct_ops.test_1 parameter as │ +│ │ │ │ │ │ │ nullable │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42151 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42155 │ │ │ │ │ kernel: s390/pkey: Wipe copies of protected- and secure-keys │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42155 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42253 │ │ │ │ │ kernel: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42253 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42267 │ │ │ │ │ kernel: riscv/mm: Add handling for VM_FAULT_SIGSEGV in │ +│ │ │ │ │ │ │ mm_fault_error() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42267 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42296 │ │ │ │ │ kernel: f2fs: fix return value of │ +│ │ │ │ │ │ │ f2fs_convert_inline_inode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42296 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42312 │ │ │ │ │ kernel: sysctl: always initialize i_uid/i_gid │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42312 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42319 │ │ │ │ │ kernel: mailbox: mtk-cmdq: Move │ +│ │ │ │ │ │ │ devm_mbox_controller_register() after │ +│ │ │ │ │ │ │ devm_pm_runtime_enable() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42319 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42321 │ │ │ │ │ kernel: net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42321 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-42322 │ │ │ │ │ kernel: ipvs: properly dereference pe in ip_vs_add_service │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-42322 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43817 │ │ │ │ │ kernel: net: missing check virtio │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43817 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43831 │ │ │ │ │ kernel: media: mediatek: vcodec: Handle invalid decoder vsi │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43831 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43832 │ │ │ │ │ kernel: s390/uv: Don't call folio_wait_writeback() without a │ +│ │ │ │ │ │ │ folio reference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43832 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43834 │ │ │ │ │ kernel: xdp: fix invalid wait context of page_pool_destroy() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43834 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43844 │ │ │ │ │ kernel: wifi rtw89 wow: fix GTK offload H2C skbuff issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43844 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43866 │ │ │ │ │ kernel: net/mlx5: Always drain health in shutdown callback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43866 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43872 │ │ │ │ │ kernel: RDMA/hns: Fix soft lockup under heavy CEQE load │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43872 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43899 │ │ │ │ │ kernel: drm/amd/display: Fix null pointer deref in │ +│ │ │ │ │ │ │ dcn20_resource.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43899 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43902 │ │ │ │ │ kernel: drm/amd/display: Add null checker before passing │ +│ │ │ │ │ │ │ variables │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43902 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43905 │ │ │ │ │ kernel: drm/amd/pm: Fix the null pointer dereference for │ +│ │ │ │ │ │ │ vega10_hwmgr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43905 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43907 │ │ │ │ │ kernel: drm/amdgpu/pm: Fix the null pointer dereference in │ +│ │ │ │ │ │ │ apply_state_adjust_rules │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43907 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43911 │ │ │ │ │ kernel: wifi: mac80211: fix NULL dereference at band check │ +│ │ │ │ │ │ │ in starting tx... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43911 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-43912 │ │ │ │ │ kernel: wifi: nl80211: disallow setting special AP channel │ +│ │ │ │ │ │ │ widths │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-43912 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44939 │ │ │ │ │ kernel: jfs: fix null ptr deref in dtInsertEntry │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44939 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44950 │ │ │ │ │ kernel: serial: sc16is7xx: fix invalid FIFO access with │ +│ │ │ │ │ │ │ special register set │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44950 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44955 │ │ │ │ │ kernel: drm/amd/display: Don't refer to dc_sink in │ +│ │ │ │ │ │ │ is_dsc_need_re_compute │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44955 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44958 │ │ │ │ │ kernel: sched/smt: Fix unbalance sched_smt_present dec/inc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44958 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44961 │ │ │ │ │ kernel: drm/amdgpu: Forward soft recovery errors to │ +│ │ │ │ │ │ │ userspace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44961 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44962 │ │ │ │ │ kernel: Bluetooth: btnxpuart: Shutdown timer and prevent │ +│ │ │ │ │ │ │ rearming when driver unloading │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44962 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44963 │ │ │ │ │ kernel: btrfs: do not BUG_ON() when freeing tree block after │ +│ │ │ │ │ │ │ error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44963 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44970 │ │ │ │ │ kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44970 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44972 │ │ │ │ │ kernel: btrfs: do not clear page dirty inside │ +│ │ │ │ │ │ │ extent_write_locked_range() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44972 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44982 │ │ │ │ │ kernel: drm/msm/dpu: cleanup FB if │ +│ │ │ │ │ │ │ dpu_format_populate_layout fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44982 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-44986 │ │ │ │ │ kernel: ipv6: fix possible UAF in ip6_finish_output2() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-44986 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-45007 │ │ │ │ │ kernel: char: xillybus: Don't destroy workqueue from work │ +│ │ │ │ │ │ │ item running on it... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45007 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-45015 │ │ │ │ │ kernel: drm/msm/dpu: move dpu_encoder's connector │ +│ │ │ │ │ │ │ assignment to atomic_enable() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45015 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-45828 │ │ │ │ │ kernel: i3c: mipi-i3c-hci: Mask ring interrupts before ring │ +│ │ │ │ │ │ │ stop request │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45828 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46681 │ │ │ │ │ kernel: pktgen: use cpus_read_lock() in pg_net_init() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46681 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46695 │ │ │ │ │ kernel: selinux,smack: don't bypass permissions check in │ +│ │ │ │ │ │ │ inode_setsecctx hook │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46695 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46702 │ │ │ │ │ kernel: thunderbolt: Mark XDomain as unplugged when router │ +│ │ │ │ │ │ │ is removed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46702 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46705 │ │ │ │ │ kernel: drm/xe: reset mmio mappings with devm │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46705 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46707 │ │ │ │ │ kernel: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence │ +│ │ │ │ │ │ │ of a vGICv3... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46707 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46713 │ │ │ │ │ kernel: perf/aux: Fix AUX buffer serialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46713 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46715 │ │ │ │ │ kernel: driver: iio: add missing checks on iio_info's │ +│ │ │ │ │ │ │ callback access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46715 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46716 │ │ │ │ │ kernel: dmaengine: altera-msgdma: properly free descriptor │ +│ │ │ │ │ │ │ in msgdma_free_descriptor │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46716 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46717 │ │ │ │ │ kernel: net/mlx5e: SHAMPO, Fix incorrect page release │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46717 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46718 │ │ │ │ │ kernel: drm/xe: Don't overmap identity VRAM mapping │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46718 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46720 │ │ │ │ │ kernel: drm/amdgpu: fix dereference after null check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46720 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46726 │ │ │ │ │ kernel: drm/amd/display: Ensure index calculation will not │ +│ │ │ │ │ │ │ overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46726 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46727 │ │ │ │ │ kernel: drm/amd/display: Add otg_master NULL check within │ +│ │ │ │ │ │ │ resource_log_pipe_topology_update │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46727 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46728 │ │ │ │ │ kernel: drm/amd/display: Check index for aux_rd_interval │ +│ │ │ │ │ │ │ before using │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46728 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46729 │ │ │ │ │ kernel: drm/amd/display: Fix incorrect size calculation for │ +│ │ │ │ │ │ │ loop │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46729 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46730 │ │ │ │ │ kernel: drm/amd/display: Ensure array index tg_inst │ +│ │ │ │ │ │ │ won't be -1 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46730 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46732 │ │ │ │ │ kernel: drm/amd/display: Assign linear_pitch_alignment even │ +│ │ │ │ │ │ │ for VM │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46732 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46733 │ │ │ │ │ kernel: btrfs: fix qgroup reserve leaks in cow_file_range │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46733 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46742 │ │ │ │ │ kernel: smb/server: fix potential null-ptr-deref of │ +│ │ │ │ │ │ │ lease_ctx_info in smb2_open() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46742 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46748 │ │ │ │ │ kernel: cachefiles: Set the max subreq size for cache writes │ +│ │ │ │ │ │ │ to MAX_RW_COUNT... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46748 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46749 │ │ │ │ │ kernel: Bluetooth: btnxpuart: Fix Null pointer dereference │ +│ │ │ │ │ │ │ in btnxpuart_flush() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46749 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46751 │ │ │ │ │ kernel: btrfs: don't BUG_ON() when 0 reference count at │ +│ │ │ │ │ │ │ btrfs_lookup_extent_info() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46751 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46752 │ │ │ │ │ kernel: btrfs: replace BUG_ON() with error handling at │ +│ │ │ │ │ │ │ update_ref_for_cow() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46752 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46753 │ │ │ │ │ kernel: btrfs: handle errors from btrfs_dec_ref() properly │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46753 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46754 │ │ │ │ │ kernel: bpf: Remove tst_run from lwt_seg6local_prog_ops. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46754 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46762 │ │ │ │ │ kernel: xen: privcmd: Fix possible access to a freed kirqfd │ +│ │ │ │ │ │ │ instance │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46762 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46763 │ │ │ │ │ kernel: fou: Fix null-ptr-deref in GRO. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46763 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46770 │ │ │ │ │ kernel: ice: Add netif_device_attach/detach into PF reset │ +│ │ │ │ │ │ │ flow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46770 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46774 │ │ │ │ │ kernel: powerpc/rtas: Prevent Spectre v1 gadget construction │ +│ │ │ │ │ │ │ in sys_rtas() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46774 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46775 │ │ │ │ │ kernel: drm/amd/display: Validate function returns │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46775 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46778 │ │ │ │ │ kernel: drm/amd/display: Check UnboundedRequestEnabled's │ +│ │ │ │ │ │ │ value │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46778 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46787 │ │ │ │ │ kernel: userfaultfd: fix checks for huge PMDs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46787 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46791 │ │ │ │ │ kernel: can: mcp251x: fix deadlock if an interrupt occurs │ +│ │ │ │ │ │ │ during mcp251x_open │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46791 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46802 │ │ │ │ │ kernel: drm/amd/display: added NULL check at start of │ +│ │ │ │ │ │ │ dc_validate_stream │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46802 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46803 │ │ │ │ │ kernel: drm/amdkfd: Check debug trap enable before write │ +│ │ │ │ │ │ │ dbg_ev_file │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46803 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46804 │ │ │ │ │ kernel: drm/amd/display: Add array index check for hdcp ddc │ +│ │ │ │ │ │ │ access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46804 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46805 │ │ │ │ │ kernel: drm/amdgpu: fix the waring dereferencing hive │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46805 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46806 │ │ │ │ │ kernel: drm/amdgpu: Fix the warning division or modulo by │ +│ │ │ │ │ │ │ zero │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46806 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46807 │ │ │ │ │ kernel: drm/amd/amdgpu: Check tbo resource pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46807 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46808 │ │ │ │ │ kernel: drm/amd/display: Add missing NULL pointer check │ +│ │ │ │ │ │ │ within dpcd_extend_address_range │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46808 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46809 │ │ │ │ │ kernel: drm/amd/display: Check BIOS images before it is used │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46809 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46810 │ │ │ │ │ kernel: drm/bridge: tc358767: Check if fully initialized │ +│ │ │ │ │ │ │ before signalling HPD event via... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46810 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46811 │ │ │ │ │ kernel: drm/amd/display: Fix index may exceed array range │ +│ │ │ │ │ │ │ within fpu_update_bw_bounding_box │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46811 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46812 │ │ │ │ │ kernel: drm/amd/display: Skip inactive planes within │ +│ │ │ │ │ │ │ ModeSupportAndSystemConfiguration │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46812 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46813 │ │ │ │ │ kernel: drm/amd/display: Check link_index before accessing │ +│ │ │ │ │ │ │ dc->links[] │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46813 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46814 │ │ │ │ │ kernel: drm/amd/display: Check msg_id before processing │ +│ │ │ │ │ │ │ transcation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46814 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46816 │ │ │ │ │ kernel: drm/amd/display: Stop amdgpu_dm initialize when link │ +│ │ │ │ │ │ │ nums greater than max_links │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46816 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46819 │ │ │ │ │ kernel: drm/amdgpu: the warning dereferencing obj for │ +│ │ │ │ │ │ │ nbio_v7_4 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46819 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46820 │ │ │ │ │ kernel: drm/amdgpu/vcn: remove irq disabling in vcn 5 │ +│ │ │ │ │ │ │ suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46820 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46821 │ │ │ │ │ kernel: drm/amd/pm: Fix negative array index read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46821 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46823 │ │ │ │ │ kernel: kunit/overflow: Fix UB in overflow_allocation_test │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46823 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46827 │ │ │ │ │ kernel: wifi: ath12k: fix firmware crash due to invalid peer │ +│ │ │ │ │ │ │ nss │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46827 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46832 │ │ │ │ │ kernel: MIPS: cevt-r4k: Don't call get_c0_compare_int if │ +│ │ │ │ │ │ │ timer irq is installed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46832 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46833 │ │ │ │ │ kernel: net: hns3: void array out of bound when loop tnl_num │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46833 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46834 │ │ │ │ │ kernel: ethtool: fail closed if we can't get max channel │ +│ │ │ │ │ │ │ used in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46834 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46835 │ │ │ │ │ kernel: drm/amdgpu: Fix smatch static checker warning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46835 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46836 │ │ │ │ │ kernel: usb: gadget: aspeed_udc: validate endpoint index for │ +│ │ │ │ │ │ │ ast udc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46836 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46841 │ │ │ │ │ kernel: btrfs: don't BUG_ON on ENOMEM from │ +│ │ │ │ │ │ │ btrfs_lookup_extent_info() in walk_down_proc() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46841 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46842 │ │ │ │ │ kernel: scsi: lpfc: Handle mailbox timeouts in │ +│ │ │ │ │ │ │ lpfc_get_sfp_info │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46842 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46843 │ │ │ │ │ kernel: scsi: ufs: core: Remove SCSI host only if added │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46843 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46848 │ │ │ │ │ kernel: perf/x86/intel: Limit the period on Haswell │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46848 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46855 │ │ │ │ │ kernel: netfilter: nft_socket: fix sk refcount leaks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46855 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46857 │ │ │ │ │ kernel: net/mlx5: Fix bridge mode operations when there are │ +│ │ │ │ │ │ │ no VFs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46857 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46859 │ │ │ │ │ kernel: platform/x86: panasonic-laptop: Fix SINF array out │ +│ │ │ │ │ │ │ of bounds accesses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46859 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46860 │ │ │ │ │ kernel: wifi: mt76: mt7921: fix NULL pointer access in │ +│ │ │ │ │ │ │ mt7921_ipv6_addr_change │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46860 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46861 │ │ │ │ │ kernel: usbnet: ipheth: do not stop RX on failing RX │ +│ │ │ │ │ │ │ callback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46861 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46870 │ │ │ │ │ kernel: drm/amd/display: Disable DMCUB timeout for DCN35 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46870 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-46871 │ │ │ │ │ kernel: drm/amd/display: Correct the defined value for │ +│ │ │ │ │ │ │ AMDGPU_DMUB_NOTIFICATION_MAX │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-46871 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47141 │ │ │ │ │ kernel: pinmux: Use sequential access to access desc->pinmux │ +│ │ │ │ │ │ │ data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47141 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47143 │ │ │ │ │ kernel: dma-debug: fix a possible deadlock on radix_lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47143 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47658 │ │ │ │ │ kernel: crypto: stm32/cryp - call finalize with bh disabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47658 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47660 │ │ │ │ │ kernel: fsnotify: clear PARENT_WATCHED flags lazily │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47660 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47661 │ │ │ │ │ kernel: drm/amd/display: Avoid overflow from uint32_t to │ +│ │ │ │ │ │ │ uint8_t │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47661 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47662 │ │ │ │ │ kernel: drm/amd/display: Remove register from DCN35 DMCUB │ +│ │ │ │ │ │ │ diagnostic collection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47662 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47664 │ │ │ │ │ kernel: spi: hisi-kunpeng: Add verification for the │ +│ │ │ │ │ │ │ max_frequency provided by the firmware... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47664 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47665 │ │ │ │ │ kernel: i3c: mipi-i3c-hci: Error out instead on BUG_ON() in │ +│ │ │ │ │ │ │ IBI DMA setup... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47665 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47666 │ │ │ │ │ kernel: scsi: pm80xx: Set phy->enable_completion only │ +│ │ │ │ │ │ │ when we wait for it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47666 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47673 │ │ │ │ │ kernel: wifi: iwlwifi: mvm: pause TCM when the firmware is │ +│ │ │ │ │ │ │ stopped │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47673 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47678 │ │ │ │ │ kernel: icmp: change the order of rate limits │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47678 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47683 │ │ │ │ │ kernel: drm/amd/display: Skip Recompute DSC Params if no │ +│ │ │ │ │ │ │ Stream on Link │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47683 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47689 │ │ │ │ │ kernel: f2fs: fix to don't set SB_RDONLY in │ +│ │ │ │ │ │ │ f2fs_handle_critical_error() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47689 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47690 │ │ │ │ │ kernel: f2fs: get rid of online repaire on corrupted │ +│ │ │ │ │ │ │ directory │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47690 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47691 │ │ │ │ │ kernel: f2fs: fix to avoid use-after-free in │ +│ │ │ │ │ │ │ f2fs_stop_gc_thread() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47691 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47693 │ │ │ │ │ kernel: IB/core: Fix ib_cache_setup_one error flow cleanup │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47693 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47704 │ │ │ │ │ kernel: drm/amd/display: Check link_res->hpo_dp_link_enc │ +│ │ │ │ │ │ │ before using it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47704 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47718 │ │ │ │ │ kernel: wifi: rtw88: always wait for both firmware loading │ +│ │ │ │ │ │ │ attempts │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47718 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47726 │ │ │ │ │ kernel: f2fs: fix to wait dio completion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47726 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47728 │ │ │ │ │ kernel: bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case │ +│ │ │ │ │ │ │ of error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47728 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47735 │ │ │ │ │ kernel: RDMA/hns: Fix spin_unlock_irqrestore() called with │ +│ │ │ │ │ │ │ IRQs enabled │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47735 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47739 │ │ │ │ │ kernel: padata: use integer wrap around to prevent deadlock │ +│ │ │ │ │ │ │ on seq_nr overflow... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47739 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47745 │ │ │ │ │ kernel: mm: call the security_mmap_file() LSM hook in │ +│ │ │ │ │ │ │ remap_file_pages() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47745 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47794 │ │ │ │ │ kernel: bpf: Prevent tailcall infinite loop caused by │ +│ │ │ │ │ │ │ freplace │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47794 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-47809 │ │ │ │ │ kernel: dlm: fix possible lkb_resource null dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-47809 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-48873 │ │ │ │ │ kernel: wifi: rtw89: check return value of │ +│ │ │ │ │ │ │ ieee80211_probereq_get() for RNR │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-48873 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-48875 │ │ │ │ │ kernel: btrfs: don't take dev_replace rwsem on task already │ +│ │ │ │ │ │ │ holding it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-48875 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49569 │ │ │ │ │ kernel: nvme-rdma: unquiesce admin_q before destroy it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49569 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49571 │ │ │ │ │ kernel: net/smc: check iparea_offset and ipv6_prefixes_cnt │ +│ │ │ │ │ │ │ when receiving proposal msg │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49571 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49854 │ │ │ │ │ kernel: block, bfq: fix uaf for accessing waker_bfqq after │ +│ │ │ │ │ │ │ splitting │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49854 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49855 │ │ │ │ │ kernel: nbd: fix race between timeout and normal completion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49855 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49858 │ │ │ │ │ kernel: efistub/tpm: Use ACPI reclaim memory for event log │ +│ │ │ │ │ │ │ to avoid corruption... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49858 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49859 │ │ │ │ │ kernel: f2fs: fix to check atomic_file in f2fs ioctl │ +│ │ │ │ │ │ │ interfaces │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49859 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49861 │ │ │ │ │ kernel: bpf: Fix helper writes to read-only maps │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49861 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49863 │ │ │ │ │ kernel: vhost/scsi: null-ptr-dereference in │ +│ │ │ │ │ │ │ vhost_scsi_get_req() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49863 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49870 │ │ │ │ │ kernel: cachefiles: fix dentry leak in │ +│ │ │ │ │ │ │ cachefiles_open_file() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49870 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49875 │ │ │ │ │ kernel: nfsd: map the EBADMSG to nfserr_io to avoid warning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49875 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49880 │ │ │ │ │ kernel: ext4: fix off by one issue in alloc_flex_gd() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49880 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49881 │ │ │ │ │ kernel: ext4: update orig_path in ext4_find_extent() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49881 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49888 │ │ │ │ │ kernel: bpf: Fix a sdiv overflow issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49888 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49889 │ │ │ │ │ kernel: ext4: avoid use-after-free in ext4_ext_show_leaf() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49889 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49890 │ │ │ │ │ kernel: drm/amd/pm: ensure the fw_info is not null before │ +│ │ │ │ │ │ │ using it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49890 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49891 │ │ │ │ │ kernel: scsi: lpfc: Validate hdwq pointers before │ +│ │ │ │ │ │ │ dereferencing in reset/errata paths │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49891 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49893 │ │ │ │ │ kernel: drm/amd/display: Check stream_status before it is │ +│ │ │ │ │ │ │ used │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49893 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49895 │ │ │ │ │ kernel: drm/amd/display: Fix index out of bounds in DCN30 │ +│ │ │ │ │ │ │ degamma hardware format... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49895 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49898 │ │ │ │ │ kernel: drm/amd/display: Check null-initialized variables │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49898 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49899 │ │ │ │ │ kernel: drm/amd/display: Initialize denominators' default to │ +│ │ │ │ │ │ │ 1 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49899 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49901 │ │ │ │ │ kernel: drm/msm/adreno: Assign msm_gpu->pdev earlier to │ +│ │ │ │ │ │ │ avoid nullptrs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49901 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49904 │ │ │ │ │ kernel: drm/amdgpu: add list empty check to avoid null │ +│ │ │ │ │ │ │ pointer issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49904 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49905 │ │ │ │ │ kernel: drm/amd/display: Add null check for 'afb' in │ +│ │ │ │ │ │ │ amdgpu_dm_plane_handle_cursor_update (v2) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49905 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49906 │ │ │ │ │ kernel: drm/amd/display: Check null pointer before try to │ +│ │ │ │ │ │ │ access it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49906 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49907 │ │ │ │ │ kernel: drm/amd/display: Check null pointers before using │ +│ │ │ │ │ │ │ dc->clk_mgr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49907 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49908 │ │ │ │ │ kernel: drm/amd/display: Add null check for 'afb' in │ +│ │ │ │ │ │ │ amdgpu_dm_update_cursor (v2) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49908 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49909 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for function pointer │ +│ │ │ │ │ │ │ in dcn32_set_output_transfer_func │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49909 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49910 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for function pointer │ +│ │ │ │ │ │ │ in dcn401_set_output_transfer_func │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49910 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49911 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for function pointer │ +│ │ │ │ │ │ │ in dcn20_set_output_transfer_func │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49911 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49912 │ │ │ │ │ kernel: drm/amd/display: Handle null 'stream_status' in │ +│ │ │ │ │ │ │ 'planes_changed_for_existing_stream' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49912 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49913 │ │ │ │ │ kernel: drm/amd/display: Add null check for │ +│ │ │ │ │ │ │ top_pipe_to_program in commit_planes_for_stream │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49913 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49914 │ │ │ │ │ kernel: drm/amd/display: Add null check for │ +│ │ │ │ │ │ │ pipe_ctx->plane_state in dcn20_program_pipe │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49914 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49915 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for clk_mgr in │ +│ │ │ │ │ │ │ dcn32_init_hw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49915 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49916 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for clk_mgr and │ +│ │ │ │ │ │ │ clk_mgr->funcs in dcn401_init_hw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49916 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49917 │ │ │ │ │ kernel: drm/amd/display: Add NULL check for clk_mgr and │ +│ │ │ │ │ │ │ clk_mgr->funcs in dcn30_init_hw │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49917 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49918 │ │ │ │ │ kernel: drm/amd/display: Add null check for head_pipe in │ +│ │ │ │ │ │ │ dcn32_acquire_idle_pipe_for_head_pipe_in_layer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49919 │ │ │ │ │ kernel: drm/amd/display: Add null check for head_pipe in │ +│ │ │ │ │ │ │ dcn201_acquire_free_pipe_for_layer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49919 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49920 │ │ │ │ │ kernel: drm/amd/display: Check null pointers before multiple │ +│ │ │ │ │ │ │ uses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49920 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49921 │ │ │ │ │ kernel: drm/amd/display: Check null pointers before used │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49921 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49922 │ │ │ │ │ kernel: drm/amd/display: Check null pointers before using │ +│ │ │ │ │ │ │ them │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49922 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49923 │ │ │ │ │ kernel: drm/amd/display: Pass non-null to │ +│ │ │ │ │ │ │ dcn20_validate_apply_pipe_split_flags │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49923 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49926 │ │ │ │ │ kernel: rcu-tasks: Fix access non-existent percpu rtpcp │ +│ │ │ │ │ │ │ variable in rcu_tasks_need_gpcb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49926 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49927 │ │ │ │ │ kernel: x86/ioapic: Handle allocation failures gracefully │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49927 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49928 │ │ │ │ │ kernel: wifi: rtw89: avoid reading out of bounds when │ +│ │ │ │ │ │ │ loading TX power... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49928 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49929 │ │ │ │ │ kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49929 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49930 │ │ │ │ │ kernel: wifi: ath11k: fix array out-of-bound access in SoC │ +│ │ │ │ │ │ │ stats │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49930 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49931 │ │ │ │ │ kernel: wifi: ath12k: fix array out-of-bound access in SoC │ +│ │ │ │ │ │ │ stats │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49931 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49932 │ │ │ │ │ kernel: btrfs: don't readahead the relocation inode on │ +│ │ │ │ │ │ │ RST │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49932 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49934 │ │ │ │ │ kernel: fs/inode: Prevent dump_mapping() accessing invalid │ +│ │ │ │ │ │ │ dentry.d_name.name │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49934 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49935 │ │ │ │ │ kernel: ACPI: PAD: fix crash in exit_round_robin() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49935 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49937 │ │ │ │ │ kernel: wifi: cfg80211: Set correct chandef when starting │ +│ │ │ │ │ │ │ CAC │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49937 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49939 │ │ │ │ │ kernel: wifi: rtw89: avoid to add interface to list twice │ +│ │ │ │ │ │ │ when SER... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49939 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49940 │ │ │ │ │ kernel: l2tp: prevent possible tunnel refcount underflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49940 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49945 │ │ │ │ │ kernel: net/ncsi: Disable the ncsi work before freeing the │ +│ │ │ │ │ │ │ associated structure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49945 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49950 │ │ │ │ │ kernel: Bluetooth: L2CAP: Fix uaf in l2cap_connect │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49950 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49960 │ │ │ │ │ kernel: ext4: fix timer use-after-free on failed mount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49960 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49961 │ │ │ │ │ kernel: media: i2c: ar0521: Use cansleep version of │ +│ │ │ │ │ │ │ gpiod_set_value() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49961 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49969 │ │ │ │ │ kernel: drm/amd/display: Fix index out of bounds in DCN30 │ +│ │ │ │ │ │ │ color transformation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49969 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49970 │ │ │ │ │ kernel: drm/amd/display: Implement bounds check for stream │ +│ │ │ │ │ │ │ encoder creation in DCN401 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49970 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49971 │ │ │ │ │ kernel: drm/amd/display: Increase array size of │ +│ │ │ │ │ │ │ dummy_boolean │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49971 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49987 │ │ │ │ │ kernel: bpftool: Fix undefined behavior in qsort(NULL, 0, │ +│ │ │ │ │ │ │ ...) │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49987 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49988 │ │ │ │ │ kernel: ksmbd: add refcnt to ksmbd_conn struct │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49988 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49989 │ │ │ │ │ kernel: drm/amd/display: fix double free issue during amdgpu │ +│ │ │ │ │ │ │ module unload │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49989 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49990 │ │ │ │ │ kernel: drm/xe/hdcp: Check GSC structure validity │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49990 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49991 │ │ │ │ │ kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct │ +│ │ │ │ │ │ │ pointer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49991 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49992 │ │ │ │ │ kernel: drm/stm: Avoid use-after-free issues with crtc and │ +│ │ │ │ │ │ │ plane │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49992 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-49994 │ │ │ │ │ kernel: block: fix integer overflow in BLKSECDISCARD │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-49994 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50003 │ │ │ │ │ kernel: drm/amd/display: Fix system hang while resume with │ +│ │ │ │ │ │ │ TBT monitor │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50003 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50004 │ │ │ │ │ kernel: drm/amd/display: update DML2 policy │ +│ │ │ │ │ │ │ EnhancedPrefetchScheduleAccelerationFinal DCN35 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50004 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50009 │ │ │ │ │ kernel: cpufreq: amd-pstate: add check for │ +│ │ │ │ │ │ │ cpufreq_cpu_get's return value │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50009 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50010 │ │ │ │ │ kernel: exec: don't WARN for racy path_noexec check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50010 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50012 │ │ │ │ │ kernel: cpufreq: Avoid a bad reference count on CPU node │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50012 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50014 │ │ │ │ │ kernel: ext4: fix access to uninitialised lock in fc replay │ +│ │ │ │ │ │ │ path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50014 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50015 │ │ │ │ │ kernel: ext4: dax: fix overflowing extents beyond inode size │ +│ │ │ │ │ │ │ when partially writing... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50015 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50016 │ │ │ │ │ kernel: drm/amd/display: Avoid overflow assignment in │ +│ │ │ │ │ │ │ link_dp_cts │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50016 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50017 │ │ │ │ │ kernel: x86/mm/ident_map: Use gbpages only where full GB │ +│ │ │ │ │ │ │ page should be mapped.... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50017 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50034 │ │ │ │ │ kernel: net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50034 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50036 │ │ │ │ │ kernel: net: do not delay dst_entries_add() in dst_release() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50036 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50038 │ │ │ │ │ kernel: netfilter: xtables: avoid NFPROTO_UNSPEC where │ +│ │ │ │ │ │ │ needed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50038 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50047 │ │ │ │ │ kernel: smb: client: fix UAF in async decryption │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50047 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50048 │ │ │ │ │ kernel: fbcon: Fix a NULL pointer dereference issue in │ +│ │ │ │ │ │ │ fbcon_putcs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50048 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50049 │ │ │ │ │ kernel: drm/amd/display: Check null pointer before │ +│ │ │ │ │ │ │ dereferencing se │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50049 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50056 │ │ │ │ │ kernel: usb: gadget: uvc: Fix ERR_PTR dereference in │ +│ │ │ │ │ │ │ uvc_v4l2.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50056 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50057 │ │ │ │ │ kernel: usb: typec: tipd: Free IRQ only if it was requested │ +│ │ │ │ │ │ │ before... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50057 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50058 │ │ │ │ │ kernel: serial: protect uart_port_dtr_rts() in │ +│ │ │ │ │ │ │ uart_shutdown() too │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50058 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50060 │ │ │ │ │ kernel: io_uring: check if we need to reschedule during │ +│ │ │ │ │ │ │ overflow flush │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50060 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50061 │ │ │ │ │ kernel: i3c: master: cdns: Fix use after free vulnerability │ +│ │ │ │ │ │ │ in cdns_i3c_master Driver... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50061 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50062 │ │ │ │ │ kernel: RDMA/rtrs-srv: Avoid null pointer deref during path │ +│ │ │ │ │ │ │ establishment │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50062 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50063 │ │ │ │ │ kernel: bpf: Prevent tail call between progs attached to │ +│ │ │ │ │ │ │ different hooks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50063 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50067 │ │ │ │ │ kernel: uprobe: avoid out-of-bounds memory access of │ +│ │ │ │ │ │ │ fetching args │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50067 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50073 │ │ │ │ │ kernel: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50073 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50086 │ │ │ │ │ kernel: ksmbd: fix user-after-free from session log off │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50086 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50090 │ │ │ │ │ kernel: drm/xe/oa: Fix overflow in oa batch buffer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50090 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50091 │ │ │ │ │ kernel: dm vdo: don't refer to dedupe_context after │ +│ │ │ │ │ │ │ releasing it │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50091 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50095 │ │ │ │ │ kernel: RDMA/mad: Improve handling of timed out WRs of mad │ +│ │ │ │ │ │ │ agent │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50095 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50106 │ │ │ │ │ kernel: nfsd: fix race between laundromat and free_stateid │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50106 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50108 │ │ │ │ │ kernel: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON │ +│ │ │ │ │ │ │ too │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50108 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50111 │ │ │ │ │ kernel: LoongArch: Enable IRQ if do_ale() triggered in │ +│ │ │ │ │ │ │ irq-enabled context │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50111 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50112 │ │ │ │ │ kernel: x86/lam: Disable ADDRESS_MASKING in most cases │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50112 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50115 │ │ │ │ │ kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from │ +│ │ │ │ │ │ │ memory │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50115 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50121 │ │ │ │ │ kernel: nfsd: cancel nfsd_shrinker_work using sync mode in │ +│ │ │ │ │ │ │ nfs4_state_shutdown_net │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50121 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50125 │ │ │ │ │ kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50125 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50135 │ │ │ │ │ kernel: nvme-pci: fix race condition between reset and │ +│ │ │ │ │ │ │ nvme_dev_disable() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50135 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50166 │ │ │ │ │ kernel: fsl/fman: Fix refcount handling of fman-related │ +│ │ │ │ │ │ │ devices │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50166 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50178 │ │ │ │ │ kernel: cpufreq: loongson3: Use raw_smp_processor_id() in │ +│ │ │ │ │ │ │ do_service_request() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50178 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50183 │ │ │ │ │ kernel: scsi: lpfc: Ensure DA_ID handling completion before │ +│ │ │ │ │ │ │ deleting an NPIV instance... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50183 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50187 │ │ │ │ │ kernel: drm/vc4: Stop the active perfmon before being │ +│ │ │ │ │ │ │ destroyed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50187 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50191 │ │ │ │ │ kernel: ext4: don't set SB_RDONLY after filesystem │ +│ │ │ │ │ │ │ errors │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50191 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50196 │ │ │ │ │ kernel: pinctrl: ocelot: fix system hang on level based │ +│ │ │ │ │ │ │ interrupts │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50196 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50211 │ │ │ │ │ kernel: udf: refactor inode_bmap() to handle error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50211 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50217 │ │ │ │ │ kernel: btrfs: fix use-after-free of block device file in │ +│ │ │ │ │ │ │ __btrfs_free_extra_devids() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50217 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50241 │ │ │ │ │ kernel: NFSD: Initialize struct nfsd4_copy earlier │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50241 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50242 │ │ │ │ │ kernel: fs/ntfs3: Additional check in ntfs_file_release │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50242 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50244 │ │ │ │ │ kernel: fs/ntfs3: Additional check in ni_clear() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50244 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50245 │ │ │ │ │ kernel: fs/ntfs3: Fix possible deadlock in mi_read │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50245 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50246 │ │ │ │ │ kernel: fs/ntfs3: Add rough attr alloc_size check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50246 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50247 │ │ │ │ │ kernel: fs/ntfs3: Check if more than chunk-size bytes are │ +│ │ │ │ │ │ │ written │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50247 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50258 │ │ │ │ │ kernel: net: fix crash when config small │ +│ │ │ │ │ │ │ gso_max_size/gso_ipv4_max_size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50258 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50272 │ │ │ │ │ kernel: filemap: Fix bounds checking in filemap_read() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50272 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50277 │ │ │ │ │ kernel: dm: fix a crash if blk_alloc_disk fails │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50277 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50280 │ │ │ │ │ kernel: dm cache: fix flushing uninitialized delayed_work on │ +│ │ │ │ │ │ │ cache_ctr error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50280 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50283 │ │ │ │ │ kernel: ksmbd: fix slab-use-after-free in │ +│ │ │ │ │ │ │ smb3_preauth_hash_rsp │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50283 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50285 │ │ │ │ │ kernel: ksmbd: check outstanding simultaneous SMB operations │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50285 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50286 │ │ │ │ │ kernel: ksmbd: fix slab-use-after-free in │ +│ │ │ │ │ │ │ ksmbd_smb2_session_create │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50286 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50289 │ │ │ │ │ kernel: media: av7110: fix a spectre vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50289 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50298 │ │ │ │ │ kernel: net: enetc: allocate vf_state during PF probes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50298 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50304 │ │ │ │ │ kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in │ +│ │ │ │ │ │ │ ip_tunnel_find() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50304 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-52559 │ │ │ │ │ kernel: drm/msm/gem: prevent integer overflow in │ +│ │ │ │ │ │ │ msm_ioctl_gem_submit() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-52559 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-52560 │ │ │ │ │ kernel: fs/ntfs3: Mark inode as bad as soon as error │ +│ │ │ │ │ │ │ detected in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-52560 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53042 │ │ │ │ │ kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in │ +│ │ │ │ │ │ │ ip_tunnel_init_flow() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53042 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53050 │ │ │ │ │ kernel: drm/i915/hdcp: Add encoder check in │ +│ │ │ │ │ │ │ hdcp2_get_capability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53050 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53051 │ │ │ │ │ kernel: drm/i915/hdcp: Add encoder check in │ +│ │ │ │ │ │ │ intel_hdcp_get_capability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53051 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53052 │ │ │ │ │ kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT │ +│ │ │ │ │ │ │ start write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53052 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53058 │ │ │ │ │ kernel: net: stmmac: TSO: Fix unbalanced DMA map/unmap for │ +│ │ │ │ │ │ │ non-paged SKB data... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53058 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53073 │ │ │ │ │ kernel: NFSD: Never decrement pending_async_copies on error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53073 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53079 │ │ │ │ │ kernel: mm/thp: fix deferred split unqueue naming and │ +│ │ │ │ │ │ │ locking │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53079 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53084 │ │ │ │ │ kernel: drm/imagination: Break an object reference loop │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53084 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53088 │ │ │ │ │ kernel: i40e: fix race condition by adding filter's │ +│ │ │ │ │ │ │ intermediate sync state │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53088 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53090 │ │ │ │ │ kernel: afs: Fix lock recursion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53090 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53093 │ │ │ │ │ kernel: nvme-multipath: defer partition scanning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53093 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53094 │ │ │ │ │ kernel: RDMA/siw: Add sendpage_ok() check to disable │ +│ │ │ │ │ │ │ MSG_SPLICE_PAGES │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53094 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53095 │ │ │ │ │ kernel: smb: client: Fix use-after-free of network │ +│ │ │ │ │ │ │ namespace. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53095 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53098 │ │ │ │ │ kernel: drm/xe/ufence: Prefetch ufence addr to catch bogus │ +│ │ │ │ │ │ │ address │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53098 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53099 │ │ │ │ │ kernel: bpf: Check validity of link->type in │ +│ │ │ │ │ │ │ bpf_link_show_fdinfo() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53099 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53100 │ │ │ │ │ kernel: nvme: tcp: avoid race between queue_lock lock and │ +│ │ │ │ │ │ │ destroy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53100 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53114 │ │ │ │ │ kernel: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 │ +│ │ │ │ │ │ │ client │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53114 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53133 │ │ │ │ │ kernel: drm/amd/display: Handle dml allocation failure to │ +│ │ │ │ │ │ │ avoid crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53133 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53144 │ │ │ │ │ kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring │ +│ │ │ │ │ │ │ with LE │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53144 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53147 │ │ │ │ │ kernel: exfat: fix out-of-bounds access of directory entries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53147 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53176 │ │ │ │ │ kernel: smb: During unmount, ensure all cached dir instances │ +│ │ │ │ │ │ │ drop their dentry... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53176 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53177 │ │ │ │ │ kernel: smb: prevent use-after-free due to open_cached_dir │ +│ │ │ │ │ │ │ error paths │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53177 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53178 │ │ │ │ │ kernel: smb: Don't leak cfid when reconnect races with │ +│ │ │ │ │ │ │ open_cached_dir │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53178 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53179 │ │ │ │ │ kernel: smb: client: fix use-after-free of signing key │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53179 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53180 │ │ │ │ │ kernel: ALSA: pcm: Add sanity NULL check for the default │ +│ │ │ │ │ │ │ mmap fault... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53180 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53187 │ │ │ │ │ kernel: io_uring: check for overflows in io_pin_pages │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53187 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53190 │ │ │ │ │ kernel: wifi: rtlwifi: Drastically reduce the attempts to │ +│ │ │ │ │ │ │ read efuse in case... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53190 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53195 │ │ │ │ │ kernel: KVM: arm64: Get rid of userspace_irqchip_in_use │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53195 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53210 │ │ │ │ │ kernel: s390/iucv: MSG_PEEK causes memory leak in │ +│ │ │ │ │ │ │ iucv_sock_destruct() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53210 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53216 │ │ │ │ │ kernel: nfsd: release svc_expkey/svc_export with rcu_work │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53216 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53218 │ │ │ │ │ kernel: f2fs: fix race in concurrent f2fs_stop_gc_thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53218 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53219 │ │ │ │ │ kernel: virtiofs: use pages instead of pointer for kernel │ +│ │ │ │ │ │ │ direct IO │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53219 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53220 │ │ │ │ │ kernel: f2fs: fix to account dirty data in │ +│ │ │ │ │ │ │ __get_secs_required() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53220 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53224 │ │ │ │ │ kernel: RDMA/mlx5: Move events notifier registration to be │ +│ │ │ │ │ │ │ after device registration │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53224 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53234 │ │ │ │ │ kernel: erofs: handle NONHEAD !delta[1] lclusters gracefully │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53234 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53685 │ │ │ │ │ kernel: ceph: give up on paths longer than PATH_MAX │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53685 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-54456 │ │ │ │ │ kernel: NFS: Fix potential buffer overflowin │ +│ │ │ │ │ │ │ nfs_sysfs_link_rpc_client() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-54456 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-54458 │ │ │ │ │ kernel: scsi: ufs: bsg: Set bsg_queue to NULL after removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-54458 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-54683 │ │ │ │ │ kernel: netfilter: IDLETIMER: Fix for possible ABBA deadlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-54683 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56368 │ │ │ │ │ kernel: ring-buffer: Fix overflow in __rb_map_vma │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56368 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56369 │ │ │ │ │ kernel: drm/modes: Avoid divide by zero harder in │ +│ │ │ │ │ │ │ drm_mode_vrefresh() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56369 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56533 │ │ │ │ │ kernel: ALSA: usx2y: Use snd_card_free_when_closed() at │ +│ │ │ │ │ │ │ disconnection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56533 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56544 │ │ │ │ │ kernel: udmabuf: change folios array from kmalloc to │ +│ │ │ │ │ │ │ kvmalloc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56544 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56565 │ │ │ │ │ kernel: f2fs: fix to drop all discards after creating │ +│ │ │ │ │ │ │ snapshot on lvm... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56565 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56566 │ │ │ │ │ kernel: mm/slub: Avoid list corruption when removing a slab │ +│ │ │ │ │ │ │ from the full... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56566 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56568 │ │ │ │ │ kernel: iommu/arm-smmu: Defer probe of clients after smmu │ +│ │ │ │ │ │ │ device bound │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56568 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56583 │ │ │ │ │ kernel: sched/deadline: Fix warning in migrate_enable for │ +│ │ │ │ │ │ │ boosted tasks │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56583 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56584 │ │ │ │ │ kernel: io_uring/tctx: work around xa_store() allocation │ +│ │ │ │ │ │ │ error issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56584 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56588 │ │ │ │ │ kernel: scsi: hisi_sas: Create all dump files during debugfs │ +│ │ │ │ │ │ │ initialization │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56588 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56589 │ │ │ │ │ kernel: scsi: hisi_sas: Add cond_resched() for no forced │ +│ │ │ │ │ │ │ preemption model │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56589 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56590 │ │ │ │ │ kernel: Bluetooth: hci_core: Fix not checking skb length on │ +│ │ │ │ │ │ │ hci_acldata_packet │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56590 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56591 │ │ │ │ │ kernel: Bluetooth: hci_conn: Use disable_delayed_work_sync │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56591 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56592 │ │ │ │ │ kernel: bpf: Call free_htab_elem() after │ +│ │ │ │ │ │ │ htab_unlock_bucket() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56592 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56604 │ │ │ │ │ kernel: Bluetooth: RFCOMM: avoid leaving dangling sk pointer │ +│ │ │ │ │ │ │ in rfcomm_sock_alloc() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56604 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56607 │ │ │ │ │ kernel: wifi: ath12k: fix atomic calls in │ +│ │ │ │ │ │ │ ath12k_mac_op_set_bitrate_mask() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56607 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56608 │ │ │ │ │ kernel: drm/amd/display: Fix out-of-bounds access in │ +│ │ │ │ │ │ │ 'dcn21_link_encoder_create' │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56608 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56609 │ │ │ │ │ kernel: wifi: rtw88: use ieee80211_purge_tx_queue() to purge │ +│ │ │ │ │ │ │ TX skb │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56609 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56610 │ │ │ │ │ kernel: kcsan: Turn report_filterlist_lock into a │ +│ │ │ │ │ │ │ raw_spinlock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56610 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56611 │ │ │ │ │ kernel: mm/mempolicy: fix migrate_to_node() assuming there │ +│ │ │ │ │ │ │ is at least one VMA in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56611 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56616 │ │ │ │ │ kernel: drm/dp_mst: Fix MST sideband message body length │ +│ │ │ │ │ │ │ check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56616 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56623 │ │ │ │ │ kernel: scsi: qla2xxx: Fix use after free on unload │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56623 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56626 │ │ │ │ │ kernel: ksmbd: fix Out-of-Bounds Write in │ +│ │ │ │ │ │ │ ksmbd_vfs_stream_write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56626 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56636 │ │ │ │ │ kernel: geneve: do not assume mac header is set in │ +│ │ │ │ │ │ │ geneve_xmit_skb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56636 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56639 │ │ │ │ │ kernel: net: hsr: must allocate more bytes for RedBox │ +│ │ │ │ │ │ │ support │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56639 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56640 │ │ │ │ │ kernel: net/smc: fix LGR and link use-after-free issue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56640 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56641 │ │ │ │ │ kernel: net/smc: initialize close_work early to avoid │ +│ │ │ │ │ │ │ warning │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56641 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56647 │ │ │ │ │ kernel: net: Fix icmp host relookup triggering ip_rt_bug │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56647 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56662 │ │ │ │ │ kernel: acpi: nfit: vmalloc-out-of-bounds Read in │ +│ │ │ │ │ │ │ acpi_nfit_ctl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56662 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56664 │ │ │ │ │ kernel: bpf, sockmap: Fix race between element replace and │ +│ │ │ │ │ │ │ close() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56664 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56671 │ │ │ │ │ kernel: gpio: graniterapids: Fix vGPIO driver crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56671 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56674 │ │ │ │ │ kernel: virtio_net: correct netdev_tx_reset_queue() │ +│ │ │ │ │ │ │ invocation point │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56674 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56677 │ │ │ │ │ kernel: powerpc/fadump: Move fadump_cma_init to setup_arch() │ +│ │ │ │ │ │ │ after initmem_init() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56677 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56692 │ │ │ │ │ kernel: f2fs: fix to do sanity check on node blkaddr in │ +│ │ │ │ │ │ │ truncate_node()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56692 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56698 │ │ │ │ │ kernel: usb: dwc3: gadget: Fix looping of queued SG entries │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56698 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56701 │ │ │ │ │ kernel: powerpc/pseries: Fix dtl_access_lock to be a │ +│ │ │ │ │ │ │ rw_semaphore │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56701 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56703 │ │ │ │ │ kernel: ipv6: Fix soft lockups in fib6_select_path under │ +│ │ │ │ │ │ │ high next hop churn... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56703 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56705 │ │ │ │ │ kernel: media: atomisp: Add check for rgby_data memory │ +│ │ │ │ │ │ │ allocation failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56705 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56712 │ │ │ │ │ kernel: udmabuf: fix memory leak on last export_udmabuf() │ +│ │ │ │ │ │ │ error path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56712 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56717 │ │ │ │ │ kernel: net: mscc: ocelot: fix incorrect IFH SRC_PORT field │ +│ │ │ │ │ │ │ in ocelot_ifh_set_basic() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56717 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56722 │ │ │ │ │ kernel: RDMA/hns: Fix cpu stuck caused by printings during │ +│ │ │ │ │ │ │ reset │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56722 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56744 │ │ │ │ │ kernel: f2fs: fix to avoid potential deadlock in │ +│ │ │ │ │ │ │ f2fs_record_stop_reason() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56744 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56751 │ │ │ │ │ kernel: ipv6: release nexthop on device removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56751 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56757 │ │ │ │ │ kernel: Bluetooth: btusb: mediatek: add intf release flow │ +│ │ │ │ │ │ │ when usb disconnect │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56757 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56759 │ │ │ │ │ kernel: btrfs: fix use-after-free when COWing tree bock and │ +│ │ │ │ │ │ │ tracing is enabled... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56759 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56763 │ │ │ │ │ kernel: tracing: Prevent bad count for tracing_cpumask_write │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56763 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56775 │ │ │ │ │ kernel: drm/amd/display: Fix handling of plane refcount │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56775 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56776 │ │ │ │ │ kernel: drm/sti: avoid potential dereference of error │ +│ │ │ │ │ │ │ pointers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56776 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56777 │ │ │ │ │ kernel: drm/sti: avoid potential dereference of error │ +│ │ │ │ │ │ │ pointers in sti_gdp_atomic_check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56777 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56778 │ │ │ │ │ kernel: drm/sti: avoid potential dereference of error │ +│ │ │ │ │ │ │ pointers in sti_hqvdp_atomic_check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56778 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56782 │ │ │ │ │ kernel: ACPI: x86: Add adev NULL check to │ +│ │ │ │ │ │ │ acpi_quirk_skip_serdev_enumeration() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56782 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56784 │ │ │ │ │ kernel: drm/amd/display: Adding array index check to prevent │ +│ │ │ │ │ │ │ memory corruption │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56784 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56785 │ │ │ │ │ kernel: MIPS: Loongson64: DTS: Really fix PCIe port nodes │ +│ │ │ │ │ │ │ for ls7a │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56785 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56786 │ │ │ │ │ kernel: bpf: put bpf_link's program when link is safe to be │ +│ │ │ │ │ │ │ deallocated... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56786 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56787 │ │ │ │ │ kernel: soc: imx8m: Probe the SoC driver as platform driver │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56787 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56788 │ │ │ │ │ kernel: net: ethernet: oa_tc6: fix tx skb race condition │ +│ │ │ │ │ │ │ between reference pointers... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56788 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57791 │ │ │ │ │ kernel: net/smc: check return value of sock_recvmsg when │ +│ │ │ │ │ │ │ draining clc data │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57791 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57795 │ │ │ │ │ kernel: RDMA/rxe: Remove the direct link to net_device │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57795 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57804 │ │ │ │ │ kernel: scsi: mpi3mr: Fix corrupt config pages PHY state is │ +│ │ │ │ │ │ │ switched in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57804 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57809 │ │ │ │ │ kernel: PCI: imx6: Fix suspend/resume support on i.MX6QDL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57809 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57834 │ │ │ │ │ kernel: media: vidtv: Fix a null-ptr-deref in │ +│ │ │ │ │ │ │ vidtv_mux_stop_thread │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57834 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57838 │ │ │ │ │ kernel: s390/entry: Mark IRQ entries to fix stack depot │ +│ │ │ │ │ │ │ warnings │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57838 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57843 │ │ │ │ │ kernel: virtio-net: fix overflow inside virtnet_rq_alloc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57843 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57852 │ │ │ │ │ kernel: firmware: qcom: scm: smc: Handle missing SCM device │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57852 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57857 │ │ │ │ │ kernel: RDMA/siw: Remove direct link to net_device │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57857 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57872 │ │ │ │ │ kernel: scsi: ufs: pltfrm: Dellocate HBA during │ +│ │ │ │ │ │ │ ufshcd_pltfrm_remove() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57872 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57875 │ │ │ │ │ kernel: block: RCU protect disk->conv_zones_bitmap │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57875 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57883 │ │ │ │ │ kernel: mm: hugetlb: independent PMD page table shared count │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57883 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57887 │ │ │ │ │ kernel: drm: adv7511: Fix use-after-free in │ +│ │ │ │ │ │ │ adv7533_attach_dsi() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57887 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57888 │ │ │ │ │ kernel: workqueue: Do not warn when cancelling │ +│ │ │ │ │ │ │ WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57888 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57893 │ │ │ │ │ kernel: ALSA: seq: oss: Fix races at processing SysEx │ +│ │ │ │ │ │ │ messages │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57893 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57895 │ │ │ │ │ kernel: ksmbd: set ATTR_CTIME flags when setting mtime │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57895 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57896 │ │ │ │ │ kernel: btrfs: flush delalloc workers queue before stopping │ +│ │ │ │ │ │ │ cleaner kthread during unmount... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57896 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57897 │ │ │ │ │ kernel: drm/amdkfd: Correct the migration DMA map direction │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57897 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57898 │ │ │ │ │ kernel: wifi: cfg80211: clear link ID from bitmap during │ +│ │ │ │ │ │ │ link delete after... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57898 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57899 │ │ │ │ │ kernel: wifi: mac80211: fix mbss changed flags corruption on │ +│ │ │ │ │ │ │ 32 bit systems... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57899 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57903 │ │ │ │ │ kernel: net: restrict SO_REUSEPORT to inet sockets │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57903 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57924 │ │ │ │ │ kernel: fs: relax assertions on failure to encode file │ +│ │ │ │ │ │ │ handles │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57924 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57939 │ │ │ │ │ kernel: riscv: Fix sleeping in invalid context in die() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57939 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57950 │ │ │ │ │ kernel: drm/amd/display: Initialize denominator defaults to │ +│ │ │ │ │ │ │ 1 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57950 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57952 │ │ │ │ │ kernel: Revert "libfs: fix infinite directory reads for │ +│ │ │ │ │ │ │ offset dir" │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57952 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57974 │ │ │ │ │ kernel: udp: Deal with race between UDP socket address │ +│ │ │ │ │ │ │ change and rehash... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57974 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57975 │ │ │ │ │ kernel: btrfs: do proper folio cleanup when │ +│ │ │ │ │ │ │ run_delalloc_nocow() failed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57975 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57976 │ │ │ │ │ kernel: btrfs: do proper folio cleanup when cow_file_range() │ +│ │ │ │ │ │ │ failed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57976 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57982 │ │ │ │ │ kernel: xfrm: state: fix out-of-bounds read during lookup │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57982 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57984 │ │ │ │ │ kernel: i3c: dw: Fix use-after-free in dw_i3c_master driver │ +│ │ │ │ │ │ │ due to race condition... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57984 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-57996 │ │ │ │ │ kernel: net_sched: sch_sfq: don't allow 1 packet limit │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-57996 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58005 │ │ │ │ │ kernel: tpm: Change to kvalloc() in eventlog/acpi.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58005 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58011 │ │ │ │ │ kernel: platform/x86: int3472: Check for adev == NULL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58011 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58012 │ │ │ │ │ kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is │ +│ │ │ │ │ │ │ valid during params... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58012 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58013 │ │ │ │ │ kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in │ +│ │ │ │ │ │ │ mgmt_remove_adv_monitor_sync │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58013 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58015 │ │ │ │ │ kernel: wifi: ath12k: Fix for out-of bound access error │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58015 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58016 │ │ │ │ │ kernel: safesetid: check size of policy writes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58016 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58018 │ │ │ │ │ kernel: nvkm: correctly calculate the available space of the │ +│ │ │ │ │ │ │ GSP cmdq buffer... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58018 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58019 │ │ │ │ │ kernel: nvkm/gsp: correctly advance the read pointer of GSP │ +│ │ │ │ │ │ │ message queue │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58019 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58034 │ │ │ │ │ kernel: memory: tegra20-emc: fix an OF node reference bug in │ +│ │ │ │ │ │ │ tegra_emc_find_node_by_ram_code() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58034 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58053 │ │ │ │ │ kernel: rxrpc: Fix handling of received connection abort │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58053 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58054 │ │ │ │ │ kernel: staging: media: max96712: fix kernel oops when │ +│ │ │ │ │ │ │ removing module │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58054 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58077 │ │ │ │ │ kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare │ +│ │ │ │ │ │ │ callback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58077 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58087 │ │ │ │ │ kernel: ksmbd: fix racy issue from session lookup and expire │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58087 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58089 │ │ │ │ │ kernel: btrfs: fix double accounting race when │ +│ │ │ │ │ │ │ btrfs_run_delalloc_range() failed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58089 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58093 │ │ │ │ │ kernel: PCI/ASPM: Fix link state exit during switch upstream │ +│ │ │ │ │ │ │ function removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58093 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58094 │ │ │ │ │ kernel: jfs: add check read-only before truncation in │ +│ │ │ │ │ │ │ jfs_truncate_nolock() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58094 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-58095 │ │ │ │ │ kernel: jfs: add check read-only before txBeginAnon() call │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-58095 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-8805 │ │ │ │ │ BlueZ HID over GATT Profile Improper Access Control Remote │ +│ │ │ │ │ │ │ Code Execut ...... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-8805 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21629 │ │ │ │ │ kernel: net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP │ +│ │ │ │ │ │ │ packets │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21629 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21634 │ │ │ │ │ kernel: cgroup/cpuset: remove kernfs active break │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21634 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21635 │ │ │ │ │ kernel: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using │ +│ │ │ │ │ │ │ current->nsproxy │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21635 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21648 │ │ │ │ │ kernel: netfilter: conntrack: clamp maximum hashtable size │ +│ │ │ │ │ │ │ to INT_MAX │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21648 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21651 │ │ │ │ │ kernel: net: hns3: don't auto enable misc vector │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21651 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21667 │ │ │ │ │ kernel: iomap: avoid avoid truncating 64-bit offset to 32 │ +│ │ │ │ │ │ │ bits │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21667 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21672 │ │ │ │ │ kernel: afs: Fix merge preference rule failure condition │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21672 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21682 │ │ │ │ │ kernel: eth: bnxt: always recalculate features after XDP │ +│ │ │ │ │ │ │ clearing, fix null-deref │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21682 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21690 │ │ │ │ │ kernel: scsi: storvsc: Ratelimit warning logs to prevent VM │ +│ │ │ │ │ │ │ denial of service... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21690 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21711 │ │ │ │ │ kernel: net/rose: prevent integer overflows in │ +│ │ │ │ │ │ │ rose_setsockopt() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21711 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21712 │ │ │ │ │ kernel: md/md-bitmap: Synchronize bitmap_get_stats() with │ +│ │ │ │ │ │ │ bitmap lifetime │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21712 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21726 │ │ │ │ │ kernel: padata: avoid UAF for reorder_work │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21726 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21727 │ │ │ │ │ kernel: padata: fix UAF in padata_reorder │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21727 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21730 │ │ │ │ │ kernel: wifi: rtw89: avoid to init mgnt_entry list twice │ +│ │ │ │ │ │ │ when WoWLAN failed... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21730 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21734 │ │ │ │ │ kernel: misc: fastrpc: Fix copy buffer page size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21734 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21738 │ │ │ │ │ kernel: ata: libata-sff: Ensure that we cannot write outside │ +│ │ │ │ │ │ │ the allocated buffer... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21738 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21750 │ │ │ │ │ kernel: wifi: brcmfmac: Check the return value of │ +│ │ │ │ │ │ │ of_property_read_string_index() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21750 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21751 │ │ │ │ │ kernel: net/mlx5: HWS, change error flow on matcher │ +│ │ │ │ │ │ │ disconnect │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21751 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21752 │ │ │ │ │ kernel: btrfs: don't use btrfs_set_item_key_safe on RAID │ +│ │ │ │ │ │ │ stripe-extents │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21752 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21758 │ │ │ │ │ kernel: ipv6: mcast: add RCU protection to mld_newpack() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21758 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21759 │ │ │ │ │ kernel: ipv6: mcast: extend RCU protection in igmp6_send() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21759 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21766 │ │ │ │ │ kernel: ipv4: use RCU protection in __ip_rt_update_pmtu() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21766 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21768 │ │ │ │ │ kernel: net: ipv6: fix dst ref loops in rpl, seg6 and │ +│ │ │ │ │ │ │ ioam6... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21768 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21779 │ │ │ │ │ kernel: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if │ +│ │ │ │ │ │ │ local APIC isn't in-kernel... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21779 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21780 │ │ │ │ │ kernel: drm/amdgpu: avoid buffer overflow attach in │ +│ │ │ │ │ │ │ smu_sys_set_pp_table() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21780 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21786 │ │ │ │ │ kernel: workqueue: Put the pwq after detaching the rescuer │ +│ │ │ │ │ │ │ from the pool... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21786 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21792 │ │ │ │ │ kernel: ax25: Fix refcount leak caused by setting │ +│ │ │ │ │ │ │ SO_BINDTODEVICE sockopt │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21792 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21796 │ │ │ │ │ kernel: nfsd: clear acl_access/acl_default after releasing │ +│ │ │ │ │ │ │ them │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21796 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21801 │ │ │ │ │ kernel: net: ravb: Fix missing rtnl lock in suspend/resume │ +│ │ │ │ │ │ │ path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21801 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21802 │ │ │ │ │ kernel: net: hns3: fix oops when unload drivers paralleling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21802 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21812 │ │ │ │ │ kernel: ax25: rcu protect dev->ax25_ptr │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21812 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21816 │ │ │ │ │ kernel: hrtimers: Force migrate away hrtimers queued after │ +│ │ │ │ │ │ │ CPUHP_AP_HRTIMERS_DYING │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21816 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21817 │ │ │ │ │ kernel: block: mark GFP_NOIO around sysfs ->store() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21817 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21819 │ │ │ │ │ kernel: Revert "drm/amd/display: Use HW lock mgr for PSR1" │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21819 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21820 │ │ │ │ │ kernel: tty: xilinx_uartps: split sysrq handling │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21820 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21821 │ │ │ │ │ kernel: fbdev: omap: use threaded IRQ for LCD DMA │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21821 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21831 │ │ │ │ │ kernel: PCI: Avoid putting some root ports into D3 on TUXEDO │ +│ │ │ │ │ │ │ Sirius... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21831 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21832 │ │ │ │ │ kernel: block: don't revert iter for -EIOCBQUEUED │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21832 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21833 │ │ │ │ │ kernel: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21833 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21838 │ │ │ │ │ kernel: usb: gadget: core: flush gadget workqueue after │ +│ │ │ │ │ │ │ device removal │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21838 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21844 │ │ │ │ │ kernel: smb: client: Add check for next_buffer in │ +│ │ │ │ │ │ │ receive_encrypted_standard() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21844 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21855 │ │ │ │ │ kernel: ibmvnic: Don't reference skb after sending to VIOS │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21855 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21861 │ │ │ │ │ kernel: mm/migrate_device: don't add folio to be freed to │ +│ │ │ │ │ │ │ LRU in migrate_device_finalize()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21861 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21872 │ │ │ │ │ kernel: efi: Don't map the entire mokvar table to determine │ +│ │ │ │ │ │ │ its size... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21872 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21881 │ │ │ │ │ kernel: uprobes: Reject the shared zeropage in │ +│ │ │ │ │ │ │ uprobe_write_opcode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21881 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21891 │ │ │ │ │ kernel: ipvlan: ensure network headers are in skb linear │ +│ │ │ │ │ │ │ part │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21891 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21894 │ │ │ │ │ kernel: net: enetc: VFs do not support │ +│ │ │ │ │ │ │ HWTSTAMP_TX_ONESTEP_SYNC │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21894 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21899 │ │ │ │ │ kernel: tracing: Fix bad hist from corrupting named_triggers │ +│ │ │ │ │ │ │ list │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21899 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21908 │ │ │ │ │ kernel: NFS: fix nfs_release_folio() to not deadlock via │ +│ │ │ │ │ │ │ kcompactd writeback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21908 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21912 │ │ │ │ │ kernel: gpio: rcar: Use raw_spinlock to protect register │ +│ │ │ │ │ │ │ access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21912 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21927 │ │ │ │ │ kernel: nvme-tcp: fix potential memory corruption in │ +│ │ │ │ │ │ │ nvme_tcp_recv_pdu() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21927 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21931 │ │ │ │ │ kernel: hwpoison, memory_hotplug: lock folio before unmap │ +│ │ │ │ │ │ │ hwpoisoned folio │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21931 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21941 │ │ │ │ │ kernel: drm/amd/display: Fix null check for │ +│ │ │ │ │ │ │ pipe_ctx->plane_state in resource_build_scaling_params │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21941 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21944 │ │ │ │ │ kernel: ksmbd: fix bug on trap in smb2_lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21944 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21945 │ │ │ │ │ kernel: ksmbd: fix use-after-free in smb2_lock │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21945 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21946 │ │ │ │ │ kernel: ksmbd: fix out-of-bounds in parse_sec_desc() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21946 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21947 │ │ │ │ │ kernel: ksmbd: fix type confusion via race condition when │ +│ │ │ │ │ │ │ using ipc_msg_send_request │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21947 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21949 │ │ │ │ │ kernel: LoongArch: Set hugetlb mmap base address aligned │ +│ │ │ │ │ │ │ with pmd size │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21949 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21955 │ │ │ │ │ kernel: ksmbd: prevent connection release during oplock │ +│ │ │ │ │ │ │ break notification │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21955 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21956 │ │ │ │ │ kernel: drm/amd/display: Assign normalized_pix_clk when │ +│ │ │ │ │ │ │ color depth = 14 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21956 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21957 │ │ │ │ │ kernel: scsi: qla1280: Fix kernel oops when debug level > 2 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21957 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21959 │ │ │ │ │ kernel: netfilter: nf_conncount: Fully initialize struct │ +│ │ │ │ │ │ │ nf_conncount_tuple in insert_tree() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21959 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21967 │ │ │ │ │ kernel: ksmbd: fix use-after-free in ksmbd_free_work_struct │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21967 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21969 │ │ │ │ │ kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in │ +│ │ │ │ │ │ │ l2cap_send_cmd │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21969 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21976 │ │ │ │ │ kernel: fbdev: hyperv_fb: Allow graceful removal of │ +│ │ │ │ │ │ │ framebuffer │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21976 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21985 │ │ │ │ │ kernel: drm/amd/display: Fix out-of-bound accesses │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21985 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21986 │ │ │ │ │ kernel: net: switchdev: Convert blocking notification chain │ +│ │ │ │ │ │ │ to a raw one │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21986 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21991 │ │ │ │ │ kernel: x86/microcode/AMD: Fix out-of-bounds on systems with │ +│ │ │ │ │ │ │ CPU-less NUMA nodes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21991 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21992 │ │ │ │ │ kernel: HID: ignore non-functional sensor in HP 5MP Camera │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21992 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21993 │ │ │ │ │ kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in │ +│ │ │ │ │ │ │ ibft_attr_show_nic() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21993 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21994 │ │ │ │ │ kernel: ksmbd: fix incorrect validation for num_aces field │ +│ │ │ │ │ │ │ of smb_acl │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21994 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21996 │ │ │ │ │ kernel: drm/radeon: fix uninitialized size issue in │ +│ │ │ │ │ │ │ radeon_vce_cs_parse() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21996 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-21999 │ │ │ │ │ kernel: proc: fix UAF in proc_get_inode() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-21999 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22004 │ │ │ │ │ kernel: net: atm: fix use after free in lec_send() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22004 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22005 │ │ │ │ │ kernel: ipv6: Fix memleak of nhc_pcpu_rth_output in │ +│ │ │ │ │ │ │ fib_check_nh_v6_gw(). │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22005 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22007 │ │ │ │ │ kernel: Bluetooth: Fix error code in chan_alloc_skb_cb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22007 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22008 │ │ │ │ │ kernel: regulator: check that dummy regulator has been │ +│ │ │ │ │ │ │ probed before using it... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22008 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22010 │ │ │ │ │ kernel: RDMA/hns: Fix soft lockup during bt pages loop │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22010 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22018 │ │ │ │ │ kernel: atm: Fix NULL pointer dereference │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22018 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22019 │ │ │ │ │ kernel: bcachefs: bch2_ioctl_subvolume_destroy() fixes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22019 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22020 │ │ │ │ │ kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in │ +│ │ │ │ │ │ │ rtsx_usb_ms_drv_remove │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22020 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22021 │ │ │ │ │ kernel: netfilter: socket: Lookup orig tuple for IPv6 SNAT │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22021 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22022 │ │ │ │ │ kernel: usb: xhci: Apply the link chain quirk on NEC isoc │ +│ │ │ │ │ │ │ endpoints... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22022 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22025 │ │ │ │ │ kernel: nfsd: put dl_stid if fail to queue dl_recall │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22025 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22026 │ │ │ │ │ kernel: nfsd: don't ignore the return code of │ +│ │ │ │ │ │ │ svc_proc_register() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22026 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22027 │ │ │ │ │ kernel: media: streamzap: fix race between device │ +│ │ │ │ │ │ │ disconnection and urb callback │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22027 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22028 │ │ │ │ │ kernel: media: vimc: skip .s_stream() for stopped entities │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22028 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22029 │ │ │ │ │ kernel: exec: fix the racy usage of fs_struct->in_exec │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22029 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22035 │ │ │ │ │ kernel: tracing: Fix use-after-free in │ +│ │ │ │ │ │ │ print_graph_function_flags during tracer switching │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22035 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22037 │ │ │ │ │ kernel: ksmbd: fix null pointer dereference in │ +│ │ │ │ │ │ │ alloc_preauth_hash() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22037 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22038 │ │ │ │ │ kernel: ksmbd: validate zero num_subauth before sub_auth is │ +│ │ │ │ │ │ │ accessed │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22038 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22039 │ │ │ │ │ kernel: ksmbd: fix overflow in dacloffset bounds check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22039 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22040 │ │ │ │ │ kernel: ksmbd: fix session use-after-free in multichannel │ +│ │ │ │ │ │ │ connection │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22040 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22041 │ │ │ │ │ kernel: ksmbd: fix use-after-free in │ +│ │ │ │ │ │ │ ksmbd_sessions_deregister() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22041 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22042 │ │ │ │ │ kernel: ksmbd: add bounds check for create lease context │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22042 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22043 │ │ │ │ │ kernel: ksmbd: add bounds check for durable handle context │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22043 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22045 │ │ │ │ │ kernel: x86/mm: Fix flush_tlb_range() when used for zapping │ +│ │ │ │ │ │ │ normal PMDs │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22045 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22049 │ │ │ │ │ kernel: LoongArch: Increase ARCH_DMA_MINALIGN up to 16 │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22049 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22053 │ │ │ │ │ kernel: net: ibmveth: make veth_pool_store stop hanging │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22053 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22054 │ │ │ │ │ kernel: arcnet: Add NULL check in com20020pci_probe() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22054 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22055 │ │ │ │ │ kernel: net: fix geneve_opt length integer overflow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22055 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22057 │ │ │ │ │ kernel: net: decrease cached dst counters in dst_release │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22057 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22058 │ │ │ │ │ kernel: udp: Fix memory accounting leak. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22058 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22060 │ │ │ │ │ kernel: net: mvpp2: Prevent parser TCAM memory corruption │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22060 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22063 │ │ │ │ │ kernel: netlabel: Fix NULL pointer exception caused by │ +│ │ │ │ │ │ │ CALIPSO on IPv4 sockets... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22063 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22071 │ │ │ │ │ kernel: spufs: fix a leak in spufs_create_context() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22071 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22072 │ │ │ │ │ kernel: spufs: fix gang directory lifetimes │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22072 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22073 │ │ │ │ │ kernel: spufs: fix a leak on spufs_new_file() failure │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22073 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22079 │ │ │ │ │ kernel: ocfs2: validate l_tree_depth to avoid out-of-bounds │ +│ │ │ │ │ │ │ access │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22079 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22083 │ │ │ │ │ kernel: vhost-scsi: Fix handling of multiple calls to │ +│ │ │ │ │ │ │ vhost_scsi_set_endpoint │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22083 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22086 │ │ │ │ │ kernel: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22086 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22090 │ │ │ │ │ kernel: x86/mm/pat: Fix VM_PAT handling when fork() fails in │ +│ │ │ │ │ │ │ copy_page_range() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22090 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22103 │ │ │ │ │ kernel: net: fix NULL pointer dereference in l3mdev_l3_rcv │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22103 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22104 │ │ │ │ │ kernel: ibmvnic: Use kernel helpers for hex dumps │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22104 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22107 │ │ │ │ │ kernel: net: dsa: sja1105: fix kasan out-of-bounds warning │ +│ │ │ │ │ │ │ in sja1105_table_delete_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22107 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22109 │ │ │ │ │ kernel: ax25: Remove broken autobind │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22109 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22121 │ │ │ │ │ kernel: ext4: fix out-of-bound read in │ +│ │ │ │ │ │ │ ext4_xattr_inode_dec_ref_all() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22121 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22124 │ │ │ │ │ kernel: md/md-bitmap: fix wrong bitmap_limit for clustermd │ +│ │ │ │ │ │ │ when write sb │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22124 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-22125 │ │ │ │ │ kernel: md/raid1,raid10: don't ignore IO flags │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22125 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-2312 │ │ │ │ │ cifs-utils: kernel: cifs-utils: cifs.upcall makes an upcall │ +│ │ │ │ │ │ │ to the wrong namespace... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-2312 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-23130 │ │ │ │ │ kernel: f2fs: fix to avoid panic once fallocation fails for │ +│ │ │ │ │ │ │ pinfile │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-23130 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-23131 │ │ │ │ │ kernel: dlm: prevent NPD when writing a positive value to │ +│ │ │ │ │ │ │ event_done │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-23131 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-23132 │ │ │ │ │ kernel: f2fs: quota: fix to avoid warning in │ +│ │ │ │ │ │ │ dquot_writeback_dquots() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-23132 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-23136 │ │ │ │ │ kernel: thermal: int340x: Add NULL check for adev │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-23136 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-37785 │ │ │ │ │ kernel: ext4: fix OOB read when checking dotdot dir │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-37785 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-37838 │ │ │ │ │ kernel: HSI: ssi_protocol: Fix use after free vulnerability │ +│ │ │ │ │ │ │ in ssi_protocol Driver Due... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-37838 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-37925 │ │ │ │ │ kernel: jfs: reject on-disk inodes of an unsupported type │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-37925 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-38637 │ │ │ │ │ kernel: net_sched: skbprio: Remove overly strict queue │ +│ │ │ │ │ │ │ assertions │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-38637 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-39735 │ │ │ │ │ kernel: jfs: fix slab-out-of-bounds read in ea_get() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-39735 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2025-40364 │ │ │ │ │ kernel: io_uring: fix io_req_prep_async with provided │ +│ │ │ │ │ │ │ buffers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-40364 │ +│ ├──────────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-0537 │ LOW │ │ │ │ An information disclosure vulnerability in the kernel USB │ +│ │ │ │ │ │ │ gadget driver could enable... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-0537 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-13165 │ │ │ │ │ An elevation of privilege vulnerability in the kernel file │ +│ │ │ │ │ │ │ system. Product: Android.... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13165 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2017-13693 │ │ │ │ │ kernel: ACPI operand cache leak in dsutils.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2017-13693 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-1121 │ │ │ │ │ procps: process hiding through race condition enumerating │ +│ │ │ │ │ │ │ /proc │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-1121 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-12928 │ │ │ │ │ kernel: NULL pointer dereference in hfs_ext_read_extent in │ +│ │ │ │ │ │ │ hfs.ko │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12928 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-12929 │ │ │ │ │ kernel: use-after-free in ntfs_read_locked_inode in the │ +│ │ │ │ │ │ │ ntfs.ko │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12929 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-12930 │ │ │ │ │ kernel: stack-based out-of-bounds write in │ +│ │ │ │ │ │ │ ntfs_end_buffer_async_read in the ntfs.ko │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12930 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2018-12931 │ │ │ │ │ kernel: stack-based out-of-bounds write in ntfs_attr_find in │ +│ │ │ │ │ │ │ the ntfs.ko │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-12931 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-14899 │ │ │ │ │ VPN: an attacker can inject data into the TCP stream which │ +│ │ │ │ │ │ │ allows... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-14899 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-15213 │ │ │ │ │ kernel: use-after-free caused by malicious USB device in │ +│ │ │ │ │ │ │ drivers/media/usb/dvb-usb/dvb-usb-init.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-15213 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-19378 │ │ │ │ │ kernel: out-of-bounds write in index_rbio_pages in │ +│ │ │ │ │ │ │ fs/btrfs/raid56.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-19378 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2019-19814 │ │ │ │ │ kernel: out-of-bounds write in __remove_dirty_segment in │ +│ │ │ │ │ │ │ fs/f2fs/segment.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2019-19814 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-12363 │ │ │ │ │ kernel: Improper input validation in some Intel(R) Graphics │ +│ │ │ │ │ │ │ Drivers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-12363 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-12364 │ │ │ │ │ kernel: Null pointer dereference in some Intel(R) Graphics │ +│ │ │ │ │ │ │ Drivers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-12364 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-14304 │ │ │ │ │ kernel: ethtool when reading eeprom of device could lead to │ +│ │ │ │ │ │ │ memory leak... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-14304 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2020-35501 │ │ │ │ │ kernel: audit not logging access to syscall │ +│ │ │ │ │ │ │ open_by_handle_at for users with CAP_DAC_READ_SEARCH... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-35501 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-26934 │ │ │ │ │ An issue was discovered in the Linux kernel 4.18 through │ +│ │ │ │ │ │ │ 5.10.16, as... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-26934 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-32078 │ │ │ │ │ kernel: out-of-bounds read in │ +│ │ │ │ │ │ │ arch/arm/mach-footbridge/personal-pci.c due to improper │ +│ │ │ │ │ │ │ input validation │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-32078 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-34981 │ │ │ │ │ kernel: Bluetooth CMTP Module Double Free Privilege │ +│ │ │ │ │ │ │ Escalation Vulnerability │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-34981 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-39801 │ │ │ │ │ In ion_ioctl of ion-ioctl.c, there is a possible use after │ +│ │ │ │ │ │ │ free due... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-39801 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-47455 │ │ │ │ │ kernel: ptp: Fix possible memory leak in │ +│ │ │ │ │ │ │ ptp_clock_register() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-47455 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-41848 │ │ │ │ │ kernel: Race condition between mgslpc_ioctl and │ +│ │ │ │ │ │ │ mgslpc_detach │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-41848 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-44032 │ │ │ │ │ Kernel: Race between cmm_open() and cm4000_detach() result │ +│ │ │ │ │ │ │ in UAF │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-44032 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-44033 │ │ │ │ │ Kernel: A race condition between cm4040_open() and │ +│ │ │ │ │ │ │ reader_detach() may result in UAF... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-44033 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-44034 │ │ │ │ │ Kernel: A use-after-free due to race between scr24x_open() │ +│ │ │ │ │ │ │ and scr24x_remove() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-44034 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-45885 │ │ │ │ │ kernel: use-after-free due to race condition occurring in │ +│ │ │ │ │ │ │ dvb_frontend.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-45885 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-47518 │ │ │ │ │ kernel: a heap-based buffer overflow in │ +│ │ │ │ │ │ │ drivers/net/wireless/microchip/wilc1000/cfg80211.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-47518 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2022-47519 │ │ │ │ │ kernel: an out-of-bounds write in │ +│ │ │ │ │ │ │ drivers/net/wireless/microchip/wilc1000/cfg80211.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-47519 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-33053 │ │ │ │ │ Memory corruption in Kernel while parsing metadata. │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-33053 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-33288 │ │ │ │ │ kernel: use-after-free in bq24190_remove in │ +│ │ │ │ │ │ │ drivers/power/supply/bq24190_charger.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-33288 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4010 │ │ │ │ │ kernel: usb: hcd: malformed USB descriptor leads to infinite │ +│ │ │ │ │ │ │ loop in usb_giveback_urb()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4010 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4133 │ │ │ │ │ kernel: cxgb4: use-after-free in ch_flower_stats_cb() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4133 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-4134 │ │ │ │ │ kernel: cyttsp4_core: use-after-free in │ +│ │ │ │ │ │ │ cyttsp4_watchdog_work() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-4134 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52642 │ │ │ │ │ kernel: media: rc: bpf attach/detach requires write │ +│ │ │ │ │ │ │ permission │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52642 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-52749 │ │ │ │ │ kernel: spi: Fix null dereference on suspend │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-52749 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-0564 │ │ │ │ │ kernel: max page sharing of Kernel Samepage Merging (KSM) │ +│ │ │ │ │ │ │ may cause memory... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-0564 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26846 │ │ │ │ │ kernel: nvme-fc: do not wait in vain when unloading module │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26846 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-26872 │ │ │ │ │ kernel: RDMA/srpt: Do not register event handler until srpt │ +│ │ │ │ │ │ │ device is fully... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-26872 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27010 │ │ │ │ │ kernel: net/sched: Fix mirred deadlock on device recursion │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27010 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-27011 │ │ │ │ │ kernel: netfilter: nf_tables: fix memleak in map from abort │ +│ │ │ │ │ │ │ path │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-27011 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-41000 │ │ │ │ │ kernel: block/ioctl: prefer different overflow check │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41000 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-50154 │ │ │ │ │ kernel: tcp/dccp: Don't use timer_pending() in │ +│ │ │ │ │ │ │ reqsk_queue_unlink(). │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-50154 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-53128 │ │ │ │ │ kernel: sched/task_stack: fix object_is_on_stack() for KASAN │ +│ │ │ │ │ │ │ tagged pointers │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53128 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ login │ CVE-2013-4235 │ │ │ 1:4.8.1-1ubuntu5.20.04.5 │ │ shadow-utils: TOCTOU race conditions by copying and removing │ +│ │ │ │ │ │ │ directory trees │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4235 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ │ │ │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-base │ CVE-2023-45918 │ │ │ 6.2-0ubuntu2.1 │ │ ncurses: NULL pointer dereference in tgetstr in │ +│ │ │ │ │ │ │ tinfo/lib_termcap.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ │ │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────────────┼──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ ncurses-bin │ CVE-2023-45918 │ │ │ │ │ ncurses: NULL pointer dereference in tgetstr in │ +│ │ │ │ │ │ │ tinfo/lib_termcap.c │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45918 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-50495 │ │ │ │ │ ncurses: segmentation fault via _nc_wrap_entry() │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-50495 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ passwd │ CVE-2013-4235 │ │ │ 1:4.8.1-1ubuntu5.20.04.5 │ │ shadow-utils: TOCTOU race conditions by copying and removing │ +│ │ │ │ │ │ │ directory trees │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2013-4235 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-29383 │ │ │ │ │ shadow: Improper input validation in shadow-utils package │ +│ │ │ │ │ │ │ utility chfn │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-29383 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-56433 │ │ │ │ │ shadow-utils: Default subordinate ID configuration in │ +│ │ │ │ │ │ │ /etc/login.defs could lead to compromise │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-56433 │ +├────────────────────────────┼──────────────────┤ │ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ patch │ CVE-2018-6952 │ │ │ 2.7.6-6 │ │ patch: Double free of memory in pch.c:another_hunk() causes │ +│ │ │ │ │ │ │ a crash │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2018-6952 │ +│ ├──────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ +│ │ CVE-2021-45261 │ │ │ │ │ patch: Invalid Pointer via another_hunk function │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-45261 │ +├────────────────────────────┼──────────────────┼──────────┤ ├──────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ +│ python-pip-whl │ CVE-2024-6345 │ MEDIUM │ │ 20.0.2-5ubuntu1.11 │ │ pypa/setuptools: Remote code execution via download │ +│ │ │ │ │ │ │ functions in the package_index module in... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-6345 │ +├────────────────────────────┤ │ │ │ ├───────────────┤ │ +│ python3-pip │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +│ │ │ │ │ │ │ │ +└────────────────────────────┴──────────────────┴──────────┴──────────┴──────────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘ + +Python (python-pkg) +=================== +Total: 8 (UNKNOWN: 0, LOW: 0, MEDIUM: 5, HIGH: 3, CRITICAL: 0) + +┌─────────────────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬─────────────────────────────────────────────────────────────┐ +│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ +├─────────────────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤ +│ Flask (METADATA) │ CVE-2023-30861 │ HIGH │ fixed │ 1.1.1 │ 2.3.2, 2.2.5 │ flask: Possible disclosure of permanent session cookie due │ +│ │ │ │ │ │ │ to missing Vary: Cookie... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-30861 │ +├─────────────────────┼────────────────┼──────────┤ ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤ +│ idna (METADATA) │ CVE-2024-3651 │ MEDIUM │ │ 2.8 │ 3.7 │ python-idna: potential DoS via resource consumption via │ +│ │ │ │ │ │ │ specially crafted inputs to idna.encode()... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-3651 │ +├─────────────────────┼────────────────┤ │ ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤ +│ requests (METADATA) │ CVE-2023-32681 │ │ │ 2.22.0 │ 2.31.0 │ python-requests: Unintended leak of Proxy-Authorization │ +│ │ │ │ │ │ │ header │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-32681 │ +│ ├────────────────┤ │ │ ├────────────────┼─────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-35195 │ │ │ │ 2.32.0 │ requests: subsequent requests to the same host ignore cert │ +│ │ │ │ │ │ │ verification │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-35195 │ +├─────────────────────┼────────────────┼──────────┤ ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤ +│ urllib3 (METADATA) │ CVE-2021-33503 │ HIGH │ │ 1.25.11 │ 1.26.5 │ python-urllib3: ReDoS in the parsing of authority part of │ +│ │ │ │ │ │ │ URL │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33503 │ +│ ├────────────────┤ │ │ ├────────────────┼─────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-43804 │ │ │ │ 2.0.6, 1.26.17 │ python-urllib3: Cookie request header isn't stripped during │ +│ │ │ │ │ │ │ cross-origin redirects │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-43804 │ +│ ├────────────────┼──────────┤ │ ├────────────────┼─────────────────────────────────────────────────────────────┤ +│ │ CVE-2023-45803 │ MEDIUM │ │ │ 2.0.7, 1.26.18 │ urllib3: Request body not stripped after redirect from 303 │ +│ │ │ │ │ │ │ status changes request... │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45803 │ +│ ├────────────────┤ │ │ ├────────────────┼─────────────────────────────────────────────────────────────┤ +│ │ CVE-2024-37891 │ │ │ │ 1.26.19, 2.2.2 │ urllib3: proxy-authorization request header is not stripped │ +│ │ │ │ │ │ │ during cross-origin redirects │ +│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-37891 │ +└─────────────────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴─────────────────────────────────────────────────────────────┘ diff --git a/TP5/Exercice-2.2/requirements.txt b/TP5/Exercice-2.2/requirements.txt new file mode 100644 index 0000000..34bbf9c --- /dev/null +++ b/TP5/Exercice-2.2/requirements.txt @@ -0,0 +1,2 @@ +flask==1.1.1 +requests==2.22.0 diff --git a/TP5/Exercice-4.2/Dockerfile b/TP5/Exercice-4.2/Dockerfile new file mode 100644 index 0000000..288e47b --- /dev/null +++ b/TP5/Exercice-4.2/Dockerfile @@ -0,0 +1,18 @@ +FROM ubuntu:22.04 + +RUN apt-get update && \ + apt-get upgrade -y && \ + apt-get install -y python3 python3-pip && \ + apt-get clean && \ + rm -rf /var/lib/apt/lists/* + +WORKDIR /app + +COPY requirements.txt . +RUN pip3 install --no-cache-dir -r requirements.txt + +COPY app.py . + +USER nobody +EXPOSE 5000 +CMD ["python3", "app.py"] \ No newline at end of file diff --git a/TP5/Exercice-4.2/app.py b/TP5/Exercice-4.2/app.py new file mode 100644 index 0000000..5f77b8c --- /dev/null +++ b/TP5/Exercice-4.2/app.py @@ -0,0 +1,10 @@ +from flask import Flask + +app = Flask(__name__) + +@app.route('/') +def hello(): + return "Hello, World!" + +if __name__ == '__main__': + app.run(host='0.0.0.0', port=5000) diff --git a/TP5/Exercice-4.2/requirements.txt b/TP5/Exercice-4.2/requirements.txt new file mode 100644 index 0000000..f855e65 --- /dev/null +++ b/TP5/Exercice-4.2/requirements.txt @@ -0,0 +1,2 @@ +flask==2.3.3 +requests==2.31.0 \ No newline at end of file diff --git a/TP5/Exercice-4.3/Dockerfile b/TP5/Exercice-4.3/Dockerfile new file mode 100644 index 0000000..51f1b13 --- /dev/null +++ b/TP5/Exercice-4.3/Dockerfile @@ -0,0 +1,18 @@ +FROM python:3.11-alpine + +WORKDIR /app + +# Installer les dépendances +COPY requirements.txt . +RUN pip install --no-cache-dir -r requirements.txt + + +COPY app.py . + +# Créer un utilisateur non privilégié +RUN adduser -D appuser +USER appuser + +# Exposer le port sur lequel l'application s'exécute +EXPOSE 5000 +CMD ["python3", "app.py"] \ No newline at end of file diff --git a/TP5/Exercice-4.3/app.py b/TP5/Exercice-4.3/app.py new file mode 100644 index 0000000..5f77b8c --- /dev/null +++ b/TP5/Exercice-4.3/app.py @@ -0,0 +1,10 @@ +from flask import Flask + +app = Flask(__name__) + +@app.route('/') +def hello(): + return "Hello, World!" + +if __name__ == '__main__': + app.run(host='0.0.0.0', port=5000) diff --git a/TP5/Exercice-4.3/requirements.txt b/TP5/Exercice-4.3/requirements.txt new file mode 100644 index 0000000..f855e65 --- /dev/null +++ b/TP5/Exercice-4.3/requirements.txt @@ -0,0 +1,2 @@ +flask==2.3.3 +requests==2.31.0 \ No newline at end of file diff --git a/TP5/Reponses.md b/TP5/Reponses.md new file mode 100644 index 0000000..3b8dc88 --- /dev/null +++ b/TP5/Reponses.md @@ -0,0 +1,268 @@ +# TP5 - Sécurité des conteneurs + +## Exercice 1 : Installation et premier scan avec Trivy + +### Analyse des résultats du scan de l'image `python:3.9-alpine` + +Lors de l'exécution de Trivy sur l'image `python:3.9-alpine`, l'outil a scanné différentes couches et composants de l'image pour y détecter d'éventuelles vulnérabilités. + +#### Résumé du rapport + +Le scan a identifié un total de 4 vulnérabilités : +- 1 vulnérabilité dans le système d'exploitation Alpine Linux (version 3.21.3) +- 3 vulnérabilités dans les packages Python installés + +#### Vulnérabilités du système d'exploitation (Alpine 3.21.3) + +| Bibliothèque | Vulnérabilité | Sévérité | Statut | Version installée | Version corrigée | Description | +|--------------|---------------|----------|--------|-------------------|------------------|-------------| +| sqlite-libs | CVE-2025-29087 | HAUTE | corrigée | 3.48.0-r0 | 3.48.0-r1 | Dépassement d'entier dans la fonction concat_ws de SQLite | + +#### Vulnérabilités des packages Python + +| Bibliothèque | Vulnérabilité | Sévérité | Statut | Version installée | Version corrigée | Description | +|--------------|---------------|----------|--------|-------------------|------------------|-------------| +| pip | CVE-2023-5752 | MOYENNE | corrigée | 23.0.1 | 23.3 | Configuration Mercurial injectable lors de l'installation via pip | +| setuptools | CVE-2022-40897 | HAUTE | corrigée | 58.1.0 | 65.5.1 | Déni de service par expression régulière (ReDoS) dans package_index.py | +| setuptools | CVE-2024-6345 | HAUTE | corrigée | 58.1.0 | 70.0.0 | Exécution de code à distance via les fonctions de téléchargement dans le module package_index | + +## Exercice 2 : Analyser différentes images + +### 2.1 Comparer des images avec différentes versions + +Suite à l'analyse des trois images nginx (1.14, 1.22 et latest), voici les résultats comparatifs : + +#### Résumé des vulnérabilités par image + +| Image | OS de base | Vulnérabilités totales | CRITICAL | HIGH | MEDIUM | LOW | UNKNOWN | +|-------|------------|------------------------|----------|------|--------|-----|---------| +| nginx:1.14 | debian 9.8 | 217 | 32 | 81 | 54 | 43 | 7 | +| nginx:1.22 | debian 11.6 | 344 | 12 | 74 | 124 | 130 | 4 | +| nginx:latest | debian 12.10 | 154 | 2 | 12 | 39 | 99 | 2 | + +#### Analyse des résultats + +1. **Évolution des versions**: + - L'image la plus ancienne (nginx:1.14) présente moins de vulnérabilités totales que la version intermédiaire (nginx:1.22), mais comporte significativement plus de vulnérabilités critiques et de haute sévérité. + - L'image la plus récente (nginx:latest) contient globalement le moins de vulnérabilités, surtout en termes de vulnérabilités critiques et de haute sévérité. + +2. **Distribution des vulnérabilités**: + - nginx:1.14 (Debian 9.8): Concentration de vulnérabilités de haute sévérité et critiques (113 sur 217, soit 52%) + - nginx:1.22 (Debian 11.6): Grande quantité de vulnérabilités de moyenne et faible sévérité (254 sur 344, soit 74%) + - nginx:latest (Debian 12.10): Majorité de vulnérabilités de faible sévérité (99 sur 154, soit 64%) + +3. **Observations importantes**: + - La version 1.22 montre un nombre total de vulnérabilités plus élevé que la version 1.14, ce qui peut sembler contre-intuitif. Cela s'explique par: + - Un système de détection plus avancé pour les versions plus récentes + - Une base de données de vulnérabilités enrichie au fil du temps + - Des bibliothèques plus récentes exposant davantage de vulnérabilités connues mais de moindre gravité + - La version latest (actuellement basée sur Debian 12.10) présente une nette amélioration en termes de vulnérabilités critiques et de haute sévérité. + +#### Risques liés à l'utilisation du tag "latest" + +Utiliser le tag "latest" est risqué pour plusieurs raisons : + +1. **Manque de traçabilité et de reproductibilité**: Le tag "latest" pointe vers la dernière version publiée, qui change au fil du temps. Cela signifie que deux déploiements à des moments différents peuvent utiliser des images différentes, rendant les déploiements non reproductibles. + +2. **Mises à jour automatiques non contrôlées**: L'utilisation de "latest" peut entraîner des mises à jour imprévues lors du redéploiement, pouvant causer des incompatibilités ou des régressions sans préavis. + +3. **Incertitude de sécurité**: Bien que dans cet exemple spécifique "latest" semble plus sécurisé, ce n'est pas toujours le cas. Les nouvelles versions peuvent introduire de nouvelles vulnérabilités non encore détectées. + +4. **Instabilité potentielle**: Les versions "latest" n'ont pas nécessairement la même stabilité que les versions balisées spécifiquement. + +5. **Difficultés pour auditer la sécurité**: Sans version fixe, il est difficile de maintenir un registre des vulnérabilités connues et de leur état de correction pour l'image utilisée. + +### 2.2 Analyse d'une image personnalisée +L'analyse de notre image personnalisée basée sur Ubuntu 20.04 avec Flask et Requests révèle un profil de sécurité préoccupant. L'image présente un total impressionnant de 1338 vulnérabilités au niveau du système d'exploitation, majoritairement de sévérité moyenne (1235), avec une vulnérabilité de haute sévérité et 102 de faible sévérité. +Au niveau des packages Python, 8 vulnérabilités ont été identifiées, dont 3 de haute sévérité. Flask 1.1.1 est affecté par une vulnérabilité permettant potentiellement la divulgation de cookies de session. La bibliothèque requests 2.22.0 présente deux vulnérabilités moyennes liées à la gestion des en-têtes HTTP et à la vérification des certificats. La dépendance urllib3 est particulièrement problématique avec 4 vulnérabilités, dont deux de haute sévérité concernant la gestion des en-têtes lors des redirections cross-origin. +Ce nombre élevé de vulnérabilités s'explique principalement par l'utilisation d'une image de base complète (Ubuntu) plutôt qu'une distribution minimaliste, et par l'emploi de versions obsolètes des bibliothèques Python. Pour améliorer la sécurité, il serait judicieux d'utiliser une image Alpine plus légère, de mettre à jour les dépendances Python vers des versions récentes, et d'implémenter des pratiques comme le nettoyage des caches et la construction en multi-étapes. + +## Exercice 3 : Personnalisation des scans + +### 3.1 Filtrer les résultats par sévérité + +Pour filtrer les résultats du scan Trivy et n'afficher que les vulnérabilités de sévérité HIGH pour l'image nginx:latest, il faut utiliser l'option `--severity`. La commande complète est : + +```bash +sudo docker run --rm -v /var/run/docker.sock:/var/run/docker.sock aquasec/trivy image --severity HIGH nginx:latest +``` + +Cette commande permet de cibler uniquement les vulnérabilités critiques, facilitant ainsi la priorisation des corrections à apporter. + +### 3.2 Exporter les résultats dans différents formats + +Trivy permet d'exporter les résultats de scan dans différents formats pour faciliter leur analyse et leur intégration dans d'autres outils. + +#### Export au format JSON + +Pour exporter les résultats du scan de nginx:latest au format JSON : + +```bash +docker run --rm \ + -v /var/run/docker.sock:/var/run/docker.sock \ + -v $(pwd)/reports:/reports \ + aquasec/trivy image nginx:latest \ + -f json -o /reports/nginx-scan.json +``` + +Cette commande crée un fichier JSON contenant tous les détails du scan dans le dossier `reports` de votre répertoire courant. + +#### Export au format HTML + +Pour générer un rapport au format HTML, plus lisible pour les utilisateurs non techniques : + +```bash +docker run --rm \ + -v /var/run/docker.sock:/var/run/docker.sock \ + -v $(pwd)/reports:/reports \ + aquasec/trivy image nginx:latest \ + -f template --template "@contrib/html.tpl" -o /reports/nginx-scan.html +``` + +Le rapport HTML généré offre une visualisation graphique des vulnérabilités, facilitant leur compréhension et leur communication aux équipes concernées. + +Note importante : Les rapports sont générés à l'intérieur du container dans le dossier `/reports` qui est monté depuis votre machine hôte. Assurez-vous que le dossier `reports` existe sur votre machine avant d'exécuter ces commandes. + +## Exercice 4 : Correction des vulnérabilités + +### 4.1 Identifier les corrections possibles + +Suite à l'analyse de notre image personnalisée basée sur Ubuntu 20.04 avec Flask et Requests, plusieurs vulnérabilités ont été identifiées. Voici les corrections possibles pour chacune d'entre elles : + +#### Vulnérabilités du système d'exploitation (Ubuntu 20.04) +L'image présente 1338 vulnérabilités au niveau du système d'exploitation, majoritairement de sévérité moyenne. Pour corriger ces problèmes : + +- **Mise à jour vers Ubuntu 22.04 LTS** : Cette version plus récente corrige de nombreuses vulnérabilités présentes dans la version 20.04. +- **Application des mises à jour de sécurité** : Utiliser `apt-get update && apt-get upgrade -y` dans le Dockerfile pour s'assurer que tous les packages sont à jour. +- **Nettoyage des caches apt** : Réduire la surface d'attaque en supprimant les fichiers temporaires avec `apt-get clean && rm -rf /var/lib/apt/lists/*`. +- **Alternative** : Utiliser une distribution plus légère comme Alpine Linux qui présente généralement moins de vulnérabilités en raison de sa surface d'attaque réduite. + +#### Vulnérabilités des packages Python + +1. **Flask 1.1.1** (vulnérabilité permettant la divulgation de cookies de session) + - Mise à jour vers Flask 2.3.3 ou supérieur qui corrige cette vulnérabilité + - La version 2.0.0+ a considérablement amélioré la sécurité des cookies de session + +2. **Requests 2.22.0** (deux vulnérabilités moyennes) + - Mise à jour vers Requests 2.31.0 qui corrige les problèmes liés à la gestion des en-têtes HTTP et la vérification des certificats + - Alternativement, utiliser httpx comme bibliothèque HTTP moderne avec de meilleures pratiques de sécurité par défaut + +3. **urllib3** (dépendance indirecte avec 4 vulnérabilités) + - S'assurer que la mise à jour de Requests entraîne l'utilisation d'une version récente de urllib3 (2.0.0+) + - Vérifier explicitement la version de urllib3 installée avec pip freeze après la mise à jour + +### 4.2 Mettre à jour le Dockerfile + +Le Dockerfile d'origine : +```dockerfile +FROM ubuntu:20.04 +RUN apt-get update && \ + apt-get install -y python3 python3-pip +COPY requirements.txt . +RUN pip3 install -r requirements.txt +COPY app.py . +CMD ["python3", "app.py"] +``` + +Le Dockerfile amélioré (version 4.2) : +```dockerfile +FROM ubuntu:22.04 +RUN apt-get update && \ + apt-get upgrade -y && \ + apt-get install -y python3 python3-pip && \ + apt-get clean && \ + rm -rf /var/lib/apt/lists/* +WORKDIR /app +COPY requirements.txt . +RUN pip3 install --no-cache-dir -r requirements.txt +COPY app.py . +USER nobody +EXPOSE 5000 +CMD ["python3", "app.py"] +``` + +#### Améliorations apportées dans la version 4.2 : + +1. **Mise à jour de l'image de base** : Passage d'Ubuntu 20.04 à Ubuntu 22.04, réduisant significativement le nombre de vulnérabilités du système d'exploitation. + +2. **Application des mises à jour de sécurité** : Ajout de `apt-get upgrade -y` pour installer toutes les mises à jour de sécurité disponibles. + +3. **Nettoyage des caches** : Utilisation de `apt-get clean && rm -rf /var/lib/apt/lists/*` pour réduire la taille de l'image et éliminer des vecteurs d'attaque potentiels. + +4. **Organisation du filesystem** : Ajout d'un `WORKDIR /app` pour isoler les fichiers de l'application dans un répertoire dédié. + +5. **Optimisation des installations pip** : Utilisation du flag `--no-cache-dir` pour réduire la taille de l'image. + +6. **Sécurité par principe du moindre privilège** : Utilisation de `USER nobody` pour exécuter l'application avec un utilisateur non privilégié plutôt qu'avec root. + +7. **Documentation des ports** : Ajout de `EXPOSE 5000` pour documenter le port utilisé par l'application. + +#### Mise à jour du fichier requirements.txt : + +Version originale : +``` +flask==1.1.1 +requests==2.22.0 +``` + +Version mise à jour : +``` +flask==2.3.3 +requests==2.31.0 +``` + +Ces mises à jour corrigent les vulnérabilités identifiées dans les deux packages principaux et leurs dépendances. + +### 4.3 Appliquer le principe des images minimales + +Le Dockerfile suivant (version 4.3) applique le principe des images minimales en utilisant Alpine Linux comme base : + +```dockerfile +FROM python:3.11-alpine +WORKDIR /app +# Installer les dépendances +COPY requirements.txt . +RUN pip install --no-cache-dir -r requirements.txt +COPY app.py . +# Créer un utilisateur non privilégié +RUN adduser -D appuser +USER appuser +# Exposer le port sur lequel l'application s'exécute +EXPOSE 5000 +CMD ["python3", "app.py"] +``` + +#### Améliorations apportées dans la version 4.3 : + +1. **Utilisation d'une image de base minimaliste** : L'image python:3.11-alpine est basée sur Alpine Linux, une distribution ultra-légère (5-10 MB contre 180+ MB pour Ubuntu). Cette image contient déjà Python préinstallé, éliminant le besoin d'installer Python via apt. + +2. **Réduction drastique de la surface d'attaque** : Alpine Linux utilise musl libc au lieu de glibc et contient significativement moins de packages par défaut, réduisant ainsi le nombre de vulnérabilités potentielles. + +3. **Création d'un utilisateur dédié** : Utilisation de la commande Alpine `adduser -D appuser` pour créer un utilisateur non privilégié spécifique à l'application plutôt que d'utiliser le compte générique "nobody". + +4. **Version plus récente de Python** : Utilisation de Python 3.11 qui offre des améliorations de sécurité par rapport aux versions antérieures. + +#### Analyse comparative des images : + +| Aspect | Dockerfile original | Version 4.2 (Ubuntu 22.04) | Version 4.3 (Alpine) | +|--------|---------------------|----------------------------|----------------------| +| Taille approximative | ~400 MB | ~350 MB | ~85 MB | +| Vulnérabilités OS | 1338 | ~500-600 (estimation) | ~10-30 (estimation) | +| Vulnérabilités Python | 8 | 0 (avec deps à jour) | 0 (avec deps à jour) | +| Exécution en non-root | Non | Oui (nobody) | Oui (appuser dédié) | +| Nettoyage des caches | Non | Oui | Oui | +| Organisation du filesystem | Non | Oui | Oui | + +#### Conclusion + +La version 4.3 utilisant Alpine Linux comme image de base représente une amélioration significative en termes de sécurité par rapport aux versions précédentes : + +1. **Réduction massive de la surface d'attaque** : Moins de packages installés signifie moins de code potentiellement vulnérable. + +2. **Image plus légère** : Environ 85% plus petite que l'image originale, ce qui améliore les temps de déploiement et réduit les coûts de stockage et de transfert. + +3. **Sécurité par défaut** : Utilisation d'un utilisateur dédié non privilégié, d'un répertoire de travail isolé, et des versions à jour des dépendances. + +4. **Meilleure maintenabilité** : Image plus petite et plus simple à comprendre, facilitant les mises à jour et les audits de sécurité. + +Cette approche minimaliste, combinée à des mises à jour régulières des dépendances et à l'application du principe du moindre privilège, constitue une stratégie efficace pour maintenir un niveau de sécurité élevé dans les environnements conteneurisés. \ No newline at end of file diff --git a/TP5/reports/nginx-scan.html b/TP5/reports/nginx-scan.html new file mode 100644 index 0000000..1304968 --- /dev/null +++ b/TP5/reports/nginx-scan.html @@ -0,0 +1,3287 @@ + + + + + + nginx:latest (debian 12.10) - Trivy Report + + + +

nginx:latest (debian 12.10) - Trivy Report

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
debian
PackageVulnerability IDSeverityInstalled VersionFixed VersionLinks
aptCVE-2011-3374LOW2.6.1
bashTEMP-0841856-B18BAFLOW5.2.15-2+b7
bsdutilsCVE-2022-0563LOW1:2.38.1-5+deb12u3
coreutilsCVE-2016-2781LOW9.1-1
coreutilsCVE-2017-18018LOW9.1-1
curlCVE-2024-2379LOW7.88.1-10+deb12u12
curlCVE-2025-0725LOW7.88.1-10+deb12u12
gcc-12-baseCVE-2022-27943LOW12.2.0-14
gcc-12-baseCVE-2023-4039LOW12.2.0-14
gpgvCVE-2022-3219LOW2.2.40-1.1
gpgvCVE-2025-30258LOW2.2.40-1.1
libabsl20220623CVE-2025-0838MEDIUM20220623.1-1
libaom3CVE-2023-6879CRITICAL3.6.0-1+deb12u1
libaom3CVE-2023-39616HIGH3.6.0-1+deb12u1
libapt-pkg6.0CVE-2011-3374LOW2.6.1
libblkid1CVE-2022-0563LOW2.38.1-5+deb12u3
libc-binCVE-2010-4756LOW2.36-9+deb12u10
libc-binCVE-2018-20796LOW2.36-9+deb12u10
libc-binCVE-2019-1010022LOW2.36-9+deb12u10
libc-binCVE-2019-1010023LOW2.36-9+deb12u10
libc-binCVE-2019-1010024LOW2.36-9+deb12u10
libc-binCVE-2019-1010025LOW2.36-9+deb12u10
libc-binCVE-2019-9192LOW2.36-9+deb12u10
libc6CVE-2010-4756LOW2.36-9+deb12u10
libc6CVE-2018-20796LOW2.36-9+deb12u10
libc6CVE-2019-1010022LOW2.36-9+deb12u10
libc6CVE-2019-1010023LOW2.36-9+deb12u10
libc6CVE-2019-1010024LOW2.36-9+deb12u10
libc6CVE-2019-1010025LOW2.36-9+deb12u10
libc6CVE-2019-9192LOW2.36-9+deb12u10
libcap2CVE-2025-1390MEDIUM1:2.66-4
libcurl4CVE-2024-2379LOW7.88.1-10+deb12u12
libcurl4CVE-2025-0725LOW7.88.1-10+deb12u12
libdav1d6CVE-2023-32570MEDIUM1.0.0-2+deb12u1
libde265-0CVE-2023-51792MEDIUM1.0.11-1+deb12u2
libde265-0CVE-2024-38949MEDIUM1.0.11-1+deb12u2
libde265-0CVE-2024-38950MEDIUM1.0.11-1+deb12u2
libexpat1CVE-2023-52425HIGH2.5.0-1+deb12u1
libexpat1CVE-2024-8176HIGH2.5.0-1+deb12u1
libexpat1CVE-2024-50602MEDIUM2.5.0-1+deb12u1
libexpat1CVE-2023-52426LOW2.5.0-1+deb12u1
libexpat1CVE-2024-28757LOW2.5.0-1+deb12u1
libgcc-s1CVE-2022-27943LOW12.2.0-14
libgcc-s1CVE-2023-4039LOW12.2.0-14
libgcrypt20CVE-2018-6829LOW1.10.1-3
libgcrypt20CVE-2024-2236LOW1.10.1-3
libgnutls30CVE-2011-3389LOW3.7.9-2+deb12u4
libgssapi-krb5-2CVE-2024-26462MEDIUM1.20.1-2+deb12u2
libgssapi-krb5-2CVE-2025-24528MEDIUM1.20.1-2+deb12u2
libgssapi-krb5-2CVE-2025-3576MEDIUM1.20.1-2+deb12u2
libgssapi-krb5-2CVE-2018-5709LOW1.20.1-2+deb12u2
libgssapi-krb5-2CVE-2024-26458LOW1.20.1-2+deb12u2
libgssapi-krb5-2CVE-2024-26461LOW1.20.1-2+deb12u2
libheif1CVE-2023-49463LOW1.15.1-1+deb12u1
libheif1CVE-2024-25269LOW1.15.1-1+deb12u1
libheif1CVE-2025-43966UNKNOWN1.15.1-1+deb12u1
libheif1CVE-2025-43967UNKNOWN1.15.1-1+deb12u1
libjbig0CVE-2017-9937LOW2.1-6.1
libk5crypto3CVE-2024-26462MEDIUM1.20.1-2+deb12u2
libk5crypto3CVE-2025-24528MEDIUM1.20.1-2+deb12u2
libk5crypto3CVE-2025-3576MEDIUM1.20.1-2+deb12u2
libk5crypto3CVE-2018-5709LOW1.20.1-2+deb12u2
libk5crypto3CVE-2024-26458LOW1.20.1-2+deb12u2
libk5crypto3CVE-2024-26461LOW1.20.1-2+deb12u2
libkrb5-3CVE-2024-26462MEDIUM1.20.1-2+deb12u2
libkrb5-3CVE-2025-24528MEDIUM1.20.1-2+deb12u2
libkrb5-3CVE-2025-3576MEDIUM1.20.1-2+deb12u2
libkrb5-3CVE-2018-5709LOW1.20.1-2+deb12u2
libkrb5-3CVE-2024-26458LOW1.20.1-2+deb12u2
libkrb5-3CVE-2024-26461LOW1.20.1-2+deb12u2
libkrb5support0CVE-2024-26462MEDIUM1.20.1-2+deb12u2
libkrb5support0CVE-2025-24528MEDIUM1.20.1-2+deb12u2
libkrb5support0CVE-2025-3576MEDIUM1.20.1-2+deb12u2
libkrb5support0CVE-2018-5709LOW1.20.1-2+deb12u2
libkrb5support0CVE-2024-26458LOW1.20.1-2+deb12u2
libkrb5support0CVE-2024-26461LOW1.20.1-2+deb12u2
libldap-2.5-0CVE-2023-2953HIGH2.5.13+dfsg-5
libldap-2.5-0CVE-2015-3276LOW2.5.13+dfsg-5
libldap-2.5-0CVE-2017-14159LOW2.5.13+dfsg-5
libldap-2.5-0CVE-2017-17740LOW2.5.13+dfsg-5
libldap-2.5-0CVE-2020-15719LOW2.5.13+dfsg-5
libmount1CVE-2022-0563LOW2.38.1-5+deb12u3
libpam-modulesCVE-2024-10041MEDIUM1.5.2-6+deb12u1
libpam-modulesCVE-2024-22365MEDIUM1.5.2-6+deb12u1
libpam-modules-binCVE-2024-10041MEDIUM1.5.2-6+deb12u1
libpam-modules-binCVE-2024-22365MEDIUM1.5.2-6+deb12u1
libpam-runtimeCVE-2024-10041MEDIUM1.5.2-6+deb12u1
libpam-runtimeCVE-2024-22365MEDIUM1.5.2-6+deb12u1
libpam0gCVE-2024-10041MEDIUM1.5.2-6+deb12u1
libpam0gCVE-2024-22365MEDIUM1.5.2-6+deb12u1
libpng16-16CVE-2021-4214LOW1.6.39-2
libsmartcols1CVE-2022-0563LOW2.38.1-5+deb12u3
libssl3CVE-2024-13176MEDIUM3.0.15-1~deb12u1
libstdc++6CVE-2022-27943LOW12.2.0-14
libstdc++6CVE-2023-4039LOW12.2.0-14
libsystemd0CVE-2013-4392LOW252.36-1~deb12u1
libsystemd0CVE-2023-31437LOW252.36-1~deb12u1
libsystemd0CVE-2023-31438LOW252.36-1~deb12u1
libsystemd0CVE-2023-31439LOW252.36-1~deb12u1
libtiff6CVE-2023-52355HIGH4.5.0-6+deb12u2
libtiff6CVE-2023-6277MEDIUM4.5.0-6+deb12u2
libtiff6CVE-2017-16232LOW4.5.0-6+deb12u2
libtiff6CVE-2017-17973LOW4.5.0-6+deb12u2
libtiff6CVE-2017-5563LOW4.5.0-6+deb12u2
libtiff6CVE-2017-9117LOW4.5.0-6+deb12u2
libtiff6CVE-2018-10126LOW4.5.0-6+deb12u2
libtiff6CVE-2022-1210LOW4.5.0-6+deb12u2
libtiff6CVE-2023-1916LOW4.5.0-6+deb12u2
libtiff6CVE-2023-3164LOW4.5.0-6+deb12u2
libtiff6CVE-2023-6228LOW4.5.0-6+deb12u2
libtinfo6CVE-2023-50495MEDIUM6.4-4
libudev1CVE-2013-4392LOW252.36-1~deb12u1
libudev1CVE-2023-31437LOW252.36-1~deb12u1
libudev1CVE-2023-31438LOW252.36-1~deb12u1
libudev1CVE-2023-31439LOW252.36-1~deb12u1
libuuid1CVE-2022-0563LOW2.38.1-5+deb12u3
libxml2CVE-2024-25062HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2024-56171HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2025-24928HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2025-27113HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2025-32414HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2025-32415HIGH2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2022-49043MEDIUM2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2023-39615MEDIUM2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2023-45322MEDIUM2.9.14+dfsg-1.3~deb12u1
libxml2CVE-2024-34459LOW2.9.14+dfsg-1.3~deb12u1
libxslt1.1CVE-2015-9019LOW1.1.35-1+deb12u1
loginCVE-2023-4641MEDIUM1:4.13+dfsg1-1+b1
loginCVE-2007-5686LOW1:4.13+dfsg1-1+b1
loginCVE-2023-29383LOW1:4.13+dfsg1-1+b1
loginCVE-2024-56433LOW1:4.13+dfsg1-1+b1
loginTEMP-0628843-DBAD28LOW1:4.13+dfsg1-1+b1
mountCVE-2022-0563LOW2.38.1-5+deb12u3
ncurses-baseCVE-2023-50495MEDIUM6.4-4
ncurses-binCVE-2023-50495MEDIUM6.4-4
nginxCVE-2024-7347MEDIUM1.27.5-1~bookworm
nginxCVE-2009-4487LOW1.27.5-1~bookworm
nginxCVE-2013-0337LOW1.27.5-1~bookworm
nginxCVE-2023-44487LOW1.27.5-1~bookworm
opensslCVE-2024-13176MEDIUM3.0.15-1~deb12u1
passwdCVE-2023-4641MEDIUM1:4.13+dfsg1-1+b1
passwdCVE-2007-5686LOW1:4.13+dfsg1-1+b1
passwdCVE-2023-29383LOW1:4.13+dfsg1-1+b1
passwdCVE-2024-56433LOW1:4.13+dfsg1-1+b1
passwdTEMP-0628843-DBAD28LOW1:4.13+dfsg1-1+b1
perl-baseCVE-2023-31484HIGH5.36.0-7+deb12u2
perl-baseCVE-2011-4116LOW5.36.0-7+deb12u2
perl-baseCVE-2023-31486LOW5.36.0-7+deb12u2
sysvinit-utilsTEMP-0517018-A83CE6LOW3.06-4
tarCVE-2005-2541LOW1.34+dfsg-1.2+deb12u1
tarTEMP-0290435-0B57B5LOW1.34+dfsg-1.2+deb12u1
util-linuxCVE-2022-0563LOW2.38.1-5+deb12u3
util-linux-extraCVE-2022-0563LOW2.38.1-5+deb12u3
zlib1gCVE-2023-45853CRITICAL1:1.2.13.dfsg-1
No Misconfigurations found
+ + diff --git a/TP5/reports/nginx-scan.json b/TP5/reports/nginx-scan.json new file mode 100644 index 0000000..b1f3508 --- /dev/null +++ b/TP5/reports/nginx-scan.json @@ -0,0 +1,9181 @@ +{ + "SchemaVersion": 2, + "CreatedAt": "2025-04-29T15:23:12.664002673Z", + "ArtifactName": "nginx:latest", + "ArtifactType": "container_image", + "Metadata": { + "Size": 196616192, + "OS": { + "Family": "debian", + "Name": "12.10" + }, + "ImageID": "sha256:a830707172e8069c09cf6c67a04e23e5a1a332d70a90a54999b76273a928b9ce", + "DiffIDs": [ + "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c", + "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38", + "sha256:46a24b5c31d8c214496acac6cc4245efc3e27fd04f2b66aa30647bdc0271cc11", + "sha256:286733b13b0fc9737a65b2f11d79c44c7c23a373d03eb85abc59f6e769eb6671", + "sha256:f8455d4eb3fff05a6c75a80704e661eb2777ff194a573d0eb9d2849f787afe21", + "sha256:d842334334377567945d0b67a318fb2584f042a1fad5af514e7ec73907de3bf3", + "sha256:8030dd26ec5df545d1f1326e23382a06ac79cf0c26ada971b5eba399e3b64703" + ], + "RepoTags": [ + "nginx:latest" + ], + "RepoDigests": [ + "nginx@sha256:c15da6c91de8d2f436196f3a768483ad32c258ed4e1beb3d367a27ed67253e66" + ], + "ImageConfig": { + "architecture": "amd64", + "created": "2025-04-16T14:50:31Z", + "history": [ + { + "created": "2025-04-16T14:50:31Z", + "created_by": "# debian.sh --arch 'amd64' out/ 'bookworm' '@1745798400'", + "comment": "debuerreotype 0.15" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "LABEL maintainer=NGINX Docker Maintainers \u003cdocker-maint@nginx.com\u003e", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENV NGINX_VERSION=1.27.5", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENV NJS_VERSION=0.8.10", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENV NJS_RELEASE=1~bookworm", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENV PKG_RELEASE=1~bookworm", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENV DYNPKG_RELEASE=1~bookworm", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "RUN /bin/sh -c set -x \u0026\u0026 groupadd --system --gid 101 nginx \u0026\u0026 useradd --system --gid nginx --no-create-home --home /nonexistent --comment \"nginx user\" --shell /bin/false --uid 101 nginx \u0026\u0026 apt-get update \u0026\u0026 apt-get install --no-install-recommends --no-install-suggests -y gnupg1 ca-certificates \u0026\u0026 NGINX_GPGKEYS=\"573BFD6B3D8FBC641079A6ABABF5BD827BD9BF62 8540A6F18833A80E9C1653A42FD21310B49F6B46 9E9BE90EACBCDE69FE9B204CBCDCD8A38D88A2B3\"; NGINX_GPGKEY_PATH=/etc/apt/keyrings/nginx-archive-keyring.gpg; export GNUPGHOME=\"$(mktemp -d)\"; found=''; for NGINX_GPGKEY in $NGINX_GPGKEYS; do for server in hkp://keyserver.ubuntu.com:80 pgp.mit.edu ; do echo \"Fetching GPG key $NGINX_GPGKEY from $server\"; gpg1 --keyserver \"$server\" --keyserver-options timeout=10 --recv-keys \"$NGINX_GPGKEY\" \u0026\u0026 found=yes \u0026\u0026 break; done; test -z \"$found\" \u0026\u0026 echo \u003e\u00262 \"error: failed to fetch GPG key $NGINX_GPGKEY\" \u0026\u0026 exit 1; done; gpg1 --export \"$NGINX_GPGKEYS\" \u003e \"$NGINX_GPGKEY_PATH\" ; rm -rf \"$GNUPGHOME\"; apt-get remove --purge --auto-remove -y gnupg1 \u0026\u0026 rm -rf /var/lib/apt/lists/* \u0026\u0026 dpkgArch=\"$(dpkg --print-architecture)\" \u0026\u0026 nginxPackages=\" nginx=${NGINX_VERSION}-${PKG_RELEASE} nginx-module-xslt=${NGINX_VERSION}-${DYNPKG_RELEASE} nginx-module-geoip=${NGINX_VERSION}-${DYNPKG_RELEASE} nginx-module-image-filter=${NGINX_VERSION}-${DYNPKG_RELEASE} nginx-module-njs=${NGINX_VERSION}+${NJS_VERSION}-${NJS_RELEASE} \" \u0026\u0026 case \"$dpkgArch\" in amd64|arm64) echo \"deb [signed-by=$NGINX_GPGKEY_PATH] https://nginx.org/packages/mainline/debian/ bookworm nginx\" \u003e\u003e /etc/apt/sources.list.d/nginx.list \u0026\u0026 apt-get update ;; *) tempDir=\"$(mktemp -d)\" \u0026\u0026 chmod 777 \"$tempDir\" \u0026\u0026 savedAptMark=\"$(apt-mark showmanual)\" \u0026\u0026 apt-get update \u0026\u0026 apt-get install --no-install-recommends --no-install-suggests -y curl devscripts equivs git libxml2-utils lsb-release xsltproc \u0026\u0026 ( cd \"$tempDir\" \u0026\u0026 REVISION=\"${NGINX_VERSION}-${PKG_RELEASE}\" \u0026\u0026 REVISION=${REVISION%~*} \u0026\u0026 curl -f -L -O https://github.com/nginx/pkg-oss/archive/${REVISION}.tar.gz \u0026\u0026 PKGOSSCHECKSUM=\"c773d98b567bd585c17f55702bf3e4c7d82b676bfbde395270e90a704dca3c758dfe0380b3f01770542b4fd9bed1f1149af4ce28bfc54a27a96df6b700ac1745 *${REVISION}.tar.gz\" \u0026\u0026 if [ \"$(openssl sha512 -r ${REVISION}.tar.gz)\" = \"$PKGOSSCHECKSUM\" ]; then echo \"pkg-oss tarball checksum verification succeeded!\"; else echo \"pkg-oss tarball checksum verification failed!\"; exit 1; fi \u0026\u0026 tar xzvf ${REVISION}.tar.gz \u0026\u0026 cd pkg-oss-${REVISION} \u0026\u0026 cd debian \u0026\u0026 for target in base module-geoip module-image-filter module-njs module-xslt; do make rules-$target; mk-build-deps --install --tool=\"apt-get -o Debug::pkgProblemResolver=yes --no-install-recommends --yes\" debuild-$target/nginx-$NGINX_VERSION/debian/control; done \u0026\u0026 make base module-geoip module-image-filter module-njs module-xslt ) \u0026\u0026 apt-mark showmanual | xargs apt-mark auto \u003e /dev/null \u0026\u0026 { [ -z \"$savedAptMark\" ] || apt-mark manual $savedAptMark; } \u0026\u0026 ls -lAFh \"$tempDir\" \u0026\u0026 ( cd \"$tempDir\" \u0026\u0026 dpkg-scanpackages . \u003e Packages ) \u0026\u0026 grep '^Package: ' \"$tempDir/Packages\" \u0026\u0026 echo \"deb [ trusted=yes ] file://$tempDir ./\" \u003e /etc/apt/sources.list.d/temp.list \u0026\u0026 apt-get -o Acquire::GzipIndexes=false update ;; esac \u0026\u0026 apt-get install --no-install-recommends --no-install-suggests -y $nginxPackages gettext-base curl \u0026\u0026 apt-get remove --purge --auto-remove -y \u0026\u0026 rm -rf /var/lib/apt/lists/* /etc/apt/sources.list.d/nginx.list \u0026\u0026 if [ -n \"$tempDir\" ]; then apt-get purge -y --auto-remove \u0026\u0026 rm -rf \"$tempDir\" /etc/apt/sources.list.d/temp.list; fi \u0026\u0026 ln -sf /dev/stdout /var/log/nginx/access.log \u0026\u0026 ln -sf /dev/stderr /var/log/nginx/error.log \u0026\u0026 mkdir /docker-entrypoint.d # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "COPY docker-entrypoint.sh / # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "COPY 10-listen-on-ipv6-by-default.sh /docker-entrypoint.d # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "COPY 15-local-resolvers.envsh /docker-entrypoint.d # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "COPY 20-envsubst-on-templates.sh /docker-entrypoint.d # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "COPY 30-tune-worker-processes.sh /docker-entrypoint.d # buildkit", + "comment": "buildkit.dockerfile.v0" + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "ENTRYPOINT [\"/docker-entrypoint.sh\"]", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "EXPOSE map[80/tcp:{}]", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "STOPSIGNAL SIGQUIT", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + }, + { + "created": "2025-04-16T14:50:31Z", + "created_by": "CMD [\"nginx\" \"-g\" \"daemon off;\"]", + "comment": "buildkit.dockerfile.v0", + "empty_layer": true + } + ], + "os": "linux", + "rootfs": { + "type": "layers", + "diff_ids": [ + "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c", + "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38", + "sha256:46a24b5c31d8c214496acac6cc4245efc3e27fd04f2b66aa30647bdc0271cc11", + "sha256:286733b13b0fc9737a65b2f11d79c44c7c23a373d03eb85abc59f6e769eb6671", + "sha256:f8455d4eb3fff05a6c75a80704e661eb2777ff194a573d0eb9d2849f787afe21", + "sha256:d842334334377567945d0b67a318fb2584f042a1fad5af514e7ec73907de3bf3", + "sha256:8030dd26ec5df545d1f1326e23382a06ac79cf0c26ada971b5eba399e3b64703" + ] + }, + "config": { + "Cmd": [ + "nginx", + "-g", + "daemon off;" + ], + "Entrypoint": [ + "/docker-entrypoint.sh" + ], + "Env": [ + "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", + "NGINX_VERSION=1.27.5", + "NJS_VERSION=0.8.10", + "NJS_RELEASE=1~bookworm", + "PKG_RELEASE=1~bookworm", + "DYNPKG_RELEASE=1~bookworm" + ], + "Labels": { + "maintainer": "NGINX Docker Maintainers \u003cdocker-maint@nginx.com\u003e" + }, + "ExposedPorts": { + "80/tcp": {} + }, + "StopSignal": "SIGQUIT" + } + }, + "Layers": [ + { + "Size": 77895680, + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + { + "Size": 118697472, + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + { + "Size": 3584, + "Digest": "sha256:3e544d53ce49d405a41bd59e97d102d77cc5412a717b3bae2295d237ccdfb706", + "DiffID": "sha256:46a24b5c31d8c214496acac6cc4245efc3e27fd04f2b66aa30647bdc0271cc11" + }, + { + "Size": 4608, + "Digest": "sha256:4f21ed9ac0c04aa7c64ffd32df025f4545ab9f007d175ce82c920903590daec7", + "DiffID": "sha256:286733b13b0fc9737a65b2f11d79c44c7c23a373d03eb85abc59f6e769eb6671" + }, + { + "Size": 2560, + "Digest": "sha256:d38f2ef2d6f270e6bc87cad48e49a5ec4ebdd2f5d1d4955c4df3780dabbf2393", + "DiffID": "sha256:f8455d4eb3fff05a6c75a80704e661eb2777ff194a573d0eb9d2849f787afe21" + }, + { + "Size": 5120, + "Digest": "sha256:40a6e9f4e4564bc7213f3983964e76c27e1dc94ceb473f04a8460f5e95e365d1", + "DiffID": "sha256:d842334334377567945d0b67a318fb2584f042a1fad5af514e7ec73907de3bf3" + }, + { + "Size": 7168, + "Digest": "sha256:d3dc5ec71e9d6d1a06a1740efb4a875b28b102166509c8563c90b48f7c5e0bcb", + "DiffID": "sha256:8030dd26ec5df545d1f1326e23382a06ac79cf0c26ada971b5eba399e3b64703" + } + ] + }, + "Results": [ + { + "Target": "nginx:latest (debian 12.10)", + "Class": "os-pkgs", + "Type": "debian", + "Vulnerabilities": [ + { + "VulnerabilityID": "CVE-2011-3374", + "PkgID": "apt@2.6.1", + "PkgName": "apt", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/apt@2.6.1?arch=amd64\u0026distro=debian-12.10", + "UID": "d08c5489d80bc317" + }, + "InstalledVersion": "2.6.1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...", + "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.", + "Severity": "LOW", + "CweIDs": [ + "CWE-347" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V2Score": 4.3, + "V3Score": 3.7 + } + }, + "References": [ + "https://access.redhat.com/security/cve/cve-2011-3374", + "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480", + "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html", + "https://seclists.org/fulldisclosure/2011/Sep/221", + "https://security-tracker.debian.org/tracker/CVE-2011-3374", + "https://snyk.io/vuln/SNYK-LINUX-APT-116518", + "https://ubuntu.com/security/CVE-2011-3374" + ], + "PublishedDate": "2019-11-26T00:15:11.03Z", + "LastModifiedDate": "2024-11-21T01:30:22.61Z" + }, + { + "VulnerabilityID": "TEMP-0841856-B18BAF", + "PkgID": "bash@5.2.15-2+b7", + "PkgName": "bash", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/bash@5.2.15-2%2Bb7?arch=amd64\u0026distro=debian-12.10", + "UID": "9bf7a8e6bd5c6485" + }, + "InstalledVersion": "5.2.15-2+b7", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "[Privilege escalation possible to other user than root]", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1 + } + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "bsdutils@1:2.38.1-5+deb12u3", + "PkgName": "bsdutils", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/bsdutils@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "b5147cb35d13a963" + }, + "InstalledVersion": "1:2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2016-2781", + "PkgID": "coreutils@9.1-1", + "PkgName": "coreutils", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/coreutils@9.1-1?arch=amd64\u0026distro=debian-12.10", + "UID": "bed513a0ab732758" + }, + "InstalledVersion": "9.1-1", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2016-2781", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "coreutils: Non-privileged session can escape to the parent session in chroot", + "Description": "chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.", + "Severity": "LOW", + "CweIDs": [ + "CWE-20" + ], + "VendorSeverity": { + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "V2Score": 2.1, + "V3Score": 6.5 + }, + "redhat": { + "V2Vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "V2Score": 6.2, + "V3Score": 8.6 + } + }, + "References": [ + "http://seclists.org/oss-sec/2016/q1/452", + "http://www.openwall.com/lists/oss-security/2016/02/28/2", + "http://www.openwall.com/lists/oss-security/2016/02/28/3", + "https://access.redhat.com/security/cve/CVE-2016-2781", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://lore.kernel.org/patchwork/patch/793178/", + "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes", + "https://nvd.nist.gov/vuln/detail/CVE-2016-2781", + "https://www.cve.org/CVERecord?id=CVE-2016-2781" + ], + "PublishedDate": "2017-02-07T15:59:00.333Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2017-18018", + "PkgID": "coreutils@9.1-1", + "PkgName": "coreutils", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/coreutils@9.1-1?arch=amd64\u0026distro=debian-12.10", + "UID": "bed513a0ab732758" + }, + "InstalledVersion": "9.1-1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-18018", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "coreutils: race condition vulnerability in chown and chgrp", + "Description": "In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \"-R -L\" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.", + "Severity": "LOW", + "CweIDs": [ + "CWE-362" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 1.9, + "V3Score": 4.7 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", + "V3Score": 4.2 + } + }, + "References": [ + "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html", + "https://access.redhat.com/security/cve/CVE-2017-18018", + "https://nvd.nist.gov/vuln/detail/CVE-2017-18018", + "https://www.cve.org/CVERecord?id=CVE-2017-18018" + ], + "PublishedDate": "2018-01-04T04:29:00.19Z", + "LastModifiedDate": "2024-11-21T03:19:10.713Z" + }, + { + "VulnerabilityID": "CVE-2024-2379", + "PkgID": "curl@7.88.1-10+deb12u12", + "PkgName": "curl", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=amd64\u0026distro=debian-12.10", + "UID": "ffb7e6418760458f" + }, + "InstalledVersion": "7.88.1-10+deb12u12", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-2379", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "curl: QUIC certificate check bypass with wolfSSL", + "Description": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", + "Severity": "LOW", + "VendorSeverity": { + "azure": 2, + "debian": 1, + "redhat": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 5.4 + } + }, + "References": [ + "http://seclists.org/fulldisclosure/2024/Jul/18", + "http://seclists.org/fulldisclosure/2024/Jul/19", + "http://seclists.org/fulldisclosure/2024/Jul/20", + "http://www.openwall.com/lists/oss-security/2024/03/27/2", + "https://access.redhat.com/security/cve/CVE-2024-2379", + "https://curl.se/docs/CVE-2024-2379.html", + "https://curl.se/docs/CVE-2024-2379.json", + "https://hackerone.com/reports/2410774", + "https://nvd.nist.gov/vuln/detail/CVE-2024-2379", + "https://security.netapp.com/advisory/ntap-20240531-0001/", + "https://support.apple.com/kb/HT214118", + "https://support.apple.com/kb/HT214119", + "https://support.apple.com/kb/HT214120", + "https://www.cve.org/CVERecord?id=CVE-2024-2379" + ], + "PublishedDate": "2024-03-27T08:15:41.23Z", + "LastModifiedDate": "2024-11-21T09:09:37.57Z" + }, + { + "VulnerabilityID": "CVE-2025-0725", + "PkgID": "curl@7.88.1-10+deb12u12", + "PkgName": "curl", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u12?arch=amd64\u0026distro=debian-12.10", + "UID": "ffb7e6418760458f" + }, + "InstalledVersion": "7.88.1-10+deb12u12", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-0725", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libcurl: Buffer Overflow in libcurl via zlib Integer Overflow", + "Description": "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow.", + "Severity": "LOW", + "VendorSeverity": { + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "redhat": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 4 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2025/02/05/3", + "http://www.openwall.com/lists/oss-security/2025/02/06/2", + "http://www.openwall.com/lists/oss-security/2025/02/06/4", + "https://access.redhat.com/security/cve/CVE-2025-0725", + "https://curl.se/docs/CVE-2025-0725.html", + "https://curl.se/docs/CVE-2025-0725.json", + "https://hackerone.com/reports/2956023", + "https://nvd.nist.gov/vuln/detail/CVE-2025-0725", + "https://security.netapp.com/advisory/ntap-20250306-0009/", + "https://www.cve.org/CVERecord?id=CVE-2025-0725" + ], + "PublishedDate": "2025-02-05T10:15:22.98Z", + "LastModifiedDate": "2025-03-07T01:15:12.403Z" + }, + { + "VulnerabilityID": "CVE-2022-27943", + "PkgID": "gcc-12-base@12.2.0-14", + "PkgName": "gcc-12-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/gcc-12-base@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "9a668c24c45de553" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27943", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const", + "Description": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "amazon": 1, + "debian": 1, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-27943", + "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead", + "https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/", + "https://nvd.nist.gov/vuln/detail/CVE-2022-27943", + "https://sourceware.org/bugzilla/show_bug.cgi?id=28995", + "https://www.cve.org/CVERecord?id=CVE-2022-27943" + ], + "PublishedDate": "2022-03-26T13:15:07.9Z", + "LastModifiedDate": "2024-11-21T06:56:31.04Z" + }, + { + "VulnerabilityID": "CVE-2023-4039", + "PkgID": "gcc-12-base@12.2.0-14", + "PkgName": "gcc-12-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/gcc-12-base@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "9a668c24c45de553" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-4039", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64", + "Description": "**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.", + "Severity": "LOW", + "CweIDs": [ + "CWE-693" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "oracle-oval": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 4.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-4039", + "https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64", + "https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt", + "https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html", + "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf", + "https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org", + "https://linux.oracle.com/cve/CVE-2023-4039.html", + "https://linux.oracle.com/errata/ELSA-2023-28766.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-4039", + "https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html", + "https://www.cve.org/CVERecord?id=CVE-2023-4039" + ], + "PublishedDate": "2023-09-13T09:15:15.69Z", + "LastModifiedDate": "2025-02-13T17:17:14.717Z" + }, + { + "VulnerabilityID": "CVE-2022-3219", + "PkgID": "gpgv@2.2.40-1.1", + "PkgName": "gpgv", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/gpgv@2.2.40-1.1?arch=amd64\u0026distro=debian-12.10", + "UID": "7e56e6619044133a" + }, + "InstalledVersion": "2.2.40-1.1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-3219", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "gnupg: denial of service issue (resource consumption) using compressed packets", + "Description": "GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.", + "Severity": "LOW", + "CweIDs": [ + "CWE-787" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 1, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 6.2 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-3219", + "https://bugzilla.redhat.com/show_bug.cgi?id=2127010", + "https://dev.gnupg.org/D556", + "https://dev.gnupg.org/T5993", + "https://marc.info/?l=oss-security\u0026m=165696590211434\u0026w=4", + "https://nvd.nist.gov/vuln/detail/CVE-2022-3219", + "https://security.netapp.com/advisory/ntap-20230324-0001/", + "https://www.cve.org/CVERecord?id=CVE-2022-3219" + ], + "PublishedDate": "2023-02-23T20:15:12.393Z", + "LastModifiedDate": "2025-03-12T21:15:38.207Z" + }, + { + "VulnerabilityID": "CVE-2025-30258", + "PkgID": "gpgv@2.2.40-1.1", + "PkgName": "gpgv", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/gpgv@2.2.40-1.1?arch=amd64\u0026distro=debian-12.10", + "UID": "7e56e6619044133a" + }, + "InstalledVersion": "2.2.40-1.1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-30258", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "gnupg: verification DoS due to a malicious subkey in the keyring", + "Description": "In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \"verification DoS.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-754" + ], + "VendorSeverity": { + "redhat": 1, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", + "V3Score": 2.7 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-30258", + "https://dev.gnupg.org/T7527", + "https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158", + "https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-30258", + "https://ubuntu.com/security/notices/USN-7412-1", + "https://www.cve.org/CVERecord?id=CVE-2025-30258" + ], + "PublishedDate": "2025-03-19T20:15:20.14Z", + "LastModifiedDate": "2025-03-19T20:15:20.14Z" + }, + { + "VulnerabilityID": "CVE-2025-0838", + "PkgID": "libabsl20220623@20220623.1-1", + "PkgName": "libabsl20220623", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libabsl20220623@20220623.1-1?arch=amd64\u0026distro=debian-12.10", + "UID": "f2018780fcadc561" + }, + "InstalledVersion": "20220623.1-1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-0838", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "abseil-cpp: Heap Buffer overflow in Abseil", + "Description": "There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L", + "V3Score": 5.6 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-0838", + "https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1", + "https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-0838", + "https://www.cve.org/CVERecord?id=CVE-2025-0838" + ], + "PublishedDate": "2025-02-21T15:15:11.89Z", + "LastModifiedDate": "2025-04-05T16:15:33.45Z" + }, + { + "VulnerabilityID": "CVE-2023-6879", + "PkgID": "libaom3@3.6.0-1+deb12u1", + "PkgName": "libaom3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libaom3@3.6.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "2af453d8c99d1627" + }, + "InstalledVersion": "3.6.0-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-6879", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "aom: heap-buffer-overflow on frame size change", + "Description": "Increasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().", + "Severity": "CRITICAL", + "CweIDs": [ + "CWE-20", + "CWE-787" + ], + "VendorSeverity": { + "nvd": 4, + "redhat": 3 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 9.8 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 9.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-6879", + "https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1", + "https://crbug.com/aomedia/3491", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/", + "https://nvd.nist.gov/vuln/detail/CVE-2023-6879", + "https://www.cve.org/CVERecord?id=CVE-2023-6879" + ], + "PublishedDate": "2023-12-27T23:15:07.53Z", + "LastModifiedDate": "2025-02-13T18:16:11.25Z" + }, + { + "VulnerabilityID": "CVE-2023-39616", + "PkgID": "libaom3@3.6.0-1+deb12u1", + "PkgName": "libaom3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libaom3@3.6.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "2af453d8c99d1627" + }, + "InstalledVersion": "3.6.0-1+deb12u1", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-39616", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid read mem ...", + "Description": "AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid read memory access via the component assign_frame_buffer_p in av1/common/av1_common_int.h.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "nvd": 3 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3" + ], + "PublishedDate": "2023-08-29T17:15:12.633Z", + "LastModifiedDate": "2024-11-21T08:15:42.747Z" + }, + { + "VulnerabilityID": "CVE-2011-3374", + "PkgID": "libapt-pkg6.0@2.6.1", + "PkgName": "libapt-pkg6.0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libapt-pkg6.0@2.6.1?arch=amd64\u0026distro=debian-12.10", + "UID": "c802efe78032f16d" + }, + "InstalledVersion": "2.6.1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...", + "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.", + "Severity": "LOW", + "CweIDs": [ + "CWE-347" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V2Score": 4.3, + "V3Score": 3.7 + } + }, + "References": [ + "https://access.redhat.com/security/cve/cve-2011-3374", + "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480", + "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html", + "https://seclists.org/fulldisclosure/2011/Sep/221", + "https://security-tracker.debian.org/tracker/CVE-2011-3374", + "https://snyk.io/vuln/SNYK-LINUX-APT-116518", + "https://ubuntu.com/security/CVE-2011-3374" + ], + "PublishedDate": "2019-11-26T00:15:11.03Z", + "LastModifiedDate": "2024-11-21T01:30:22.61Z" + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "libblkid1@2.38.1-5+deb12u3", + "PkgName": "libblkid1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libblkid1@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "db8b5ae53bf85f30" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2010-4756", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions", + "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.", + "Severity": "LOW", + "CweIDs": [ + "CWE-399" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "V2Score": 4 + }, + "redhat": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V2Score": 5 + } + }, + "References": [ + "http://cxib.net/stuff/glob-0day.c", + "http://securityreason.com/achievement_securityalert/89", + "http://securityreason.com/exploitalert/9223", + "https://access.redhat.com/security/cve/CVE-2010-4756", + "https://bugzilla.redhat.com/show_bug.cgi?id=681681", + "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756", + "https://nvd.nist.gov/vuln/detail/CVE-2010-4756", + "https://www.cve.org/CVERecord?id=CVE-2010-4756" + ], + "PublishedDate": "2011-03-02T20:00:01.037Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2018-20796", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c", + "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 5.3 + } + }, + "References": [ + "http://www.securityfocus.com/bid/107160", + "https://access.redhat.com/security/cve/CVE-2018-20796", + "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141", + "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html", + "https://nvd.nist.gov/vuln/detail/CVE-2018-20796", + "https://security.netapp.com/advisory/ntap-20190315-0002/", + "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://www.cve.org/CVERecord?id=CVE-2018-20796" + ], + "PublishedDate": "2019-02-26T02:29:00.45Z", + "LastModifiedDate": "2024-11-21T04:02:11.827Z" + }, + { + "VulnerabilityID": "CVE-2019-1010022", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: stack guard protection bypass", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 4 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V2Score": 7.5, + "V3Score": 9.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-1010022", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022", + "https://security-tracker.debian.org/tracker/CVE-2019-1010022", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22850", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3", + "https://ubuntu.com/security/CVE-2019-1010022", + "https://www.cve.org/CVERecord?id=CVE-2019-1010022" + ], + "PublishedDate": "2019-07-15T04:15:13.317Z", + "LastModifiedDate": "2024-11-21T04:17:55.5Z" + }, + { + "VulnerabilityID": "CVE-2019-1010023", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation", + "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V2Score": 6.8, + "V3Score": 8.8 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V3Score": 7.8 + } + }, + "References": [ + "http://www.securityfocus.com/bid/109167", + "https://access.redhat.com/security/cve/CVE-2019-1010023", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023", + "https://security-tracker.debian.org/tracker/CVE-2019-1010023", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22851", + "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010023", + "https://www.cve.org/CVERecord?id=CVE-2019-1010023" + ], + "PublishedDate": "2019-07-15T04:15:13.397Z", + "LastModifiedDate": "2024-11-21T04:17:55.643Z" + }, + { + "VulnerabilityID": "CVE-2019-1010024", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: ASLR bypass using cache of thread stack and heap", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "CweIDs": [ + "CWE-200" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V2Score": 5, + "V3Score": 5.3 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "http://www.securityfocus.com/bid/109162", + "https://access.redhat.com/security/cve/CVE-2019-1010024", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024", + "https://security-tracker.debian.org/tracker/CVE-2019-1010024", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22852", + "https://support.f5.com/csp/article/K06046097", + "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010024", + "https://www.cve.org/CVERecord?id=CVE-2019-1010024" + ], + "PublishedDate": "2019-07-15T04:15:13.473Z", + "LastModifiedDate": "2024-11-21T04:17:55.843Z" + }, + { + "VulnerabilityID": "CVE-2019-1010025", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: information disclosure of heap addresses of pthread_created thread", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.", + "Severity": "LOW", + "CweIDs": [ + "CWE-330" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V2Score": 5, + "V3Score": 5.3 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V3Score": 2.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-1010025", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025", + "https://security-tracker.debian.org/tracker/CVE-2019-1010025", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22853", + "https://support.f5.com/csp/article/K06046097", + "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010025", + "https://www.cve.org/CVERecord?id=CVE-2019-1010025" + ], + "PublishedDate": "2019-07-15T04:15:13.537Z", + "LastModifiedDate": "2024-11-21T04:17:55.96Z" + }, + { + "VulnerabilityID": "CVE-2019-9192", + "PkgID": "libc-bin@2.36-9+deb12u10", + "PkgName": "libc-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc-bin@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "205f0e4a1d969bcb" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c", + "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 2.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-9192", + "https://nvd.nist.gov/vuln/detail/CVE-2019-9192", + "https://sourceware.org/bugzilla/show_bug.cgi?id=24269", + "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://www.cve.org/CVERecord?id=CVE-2019-9192" + ], + "PublishedDate": "2019-02-26T18:29:00.34Z", + "LastModifiedDate": "2024-11-21T04:51:10.53Z" + }, + { + "VulnerabilityID": "CVE-2010-4756", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions", + "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.", + "Severity": "LOW", + "CweIDs": [ + "CWE-399" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "V2Score": 4 + }, + "redhat": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V2Score": 5 + } + }, + "References": [ + "http://cxib.net/stuff/glob-0day.c", + "http://securityreason.com/achievement_securityalert/89", + "http://securityreason.com/exploitalert/9223", + "https://access.redhat.com/security/cve/CVE-2010-4756", + "https://bugzilla.redhat.com/show_bug.cgi?id=681681", + "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756", + "https://nvd.nist.gov/vuln/detail/CVE-2010-4756", + "https://www.cve.org/CVERecord?id=CVE-2010-4756" + ], + "PublishedDate": "2011-03-02T20:00:01.037Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2018-20796", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c", + "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 5.3 + } + }, + "References": [ + "http://www.securityfocus.com/bid/107160", + "https://access.redhat.com/security/cve/CVE-2018-20796", + "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141", + "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html", + "https://nvd.nist.gov/vuln/detail/CVE-2018-20796", + "https://security.netapp.com/advisory/ntap-20190315-0002/", + "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://www.cve.org/CVERecord?id=CVE-2018-20796" + ], + "PublishedDate": "2019-02-26T02:29:00.45Z", + "LastModifiedDate": "2024-11-21T04:02:11.827Z" + }, + { + "VulnerabilityID": "CVE-2019-1010022", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: stack guard protection bypass", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 4 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V2Score": 7.5, + "V3Score": 9.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-1010022", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022", + "https://security-tracker.debian.org/tracker/CVE-2019-1010022", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22850", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3", + "https://ubuntu.com/security/CVE-2019-1010022", + "https://www.cve.org/CVERecord?id=CVE-2019-1010022" + ], + "PublishedDate": "2019-07-15T04:15:13.317Z", + "LastModifiedDate": "2024-11-21T04:17:55.5Z" + }, + { + "VulnerabilityID": "CVE-2019-1010023", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation", + "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V2Score": 6.8, + "V3Score": 8.8 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V3Score": 7.8 + } + }, + "References": [ + "http://www.securityfocus.com/bid/109167", + "https://access.redhat.com/security/cve/CVE-2019-1010023", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023", + "https://security-tracker.debian.org/tracker/CVE-2019-1010023", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22851", + "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010023", + "https://www.cve.org/CVERecord?id=CVE-2019-1010023" + ], + "PublishedDate": "2019-07-15T04:15:13.397Z", + "LastModifiedDate": "2024-11-21T04:17:55.643Z" + }, + { + "VulnerabilityID": "CVE-2019-1010024", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: ASLR bypass using cache of thread stack and heap", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.", + "Severity": "LOW", + "CweIDs": [ + "CWE-200" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V2Score": 5, + "V3Score": 5.3 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "http://www.securityfocus.com/bid/109162", + "https://access.redhat.com/security/cve/CVE-2019-1010024", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024", + "https://security-tracker.debian.org/tracker/CVE-2019-1010024", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22852", + "https://support.f5.com/csp/article/K06046097", + "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010024", + "https://www.cve.org/CVERecord?id=CVE-2019-1010024" + ], + "PublishedDate": "2019-07-15T04:15:13.473Z", + "LastModifiedDate": "2024-11-21T04:17:55.843Z" + }, + { + "VulnerabilityID": "CVE-2019-1010025", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: information disclosure of heap addresses of pthread_created thread", + "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.", + "Severity": "LOW", + "CweIDs": [ + "CWE-330" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V2Score": 5, + "V3Score": 5.3 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V3Score": 2.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-1010025", + "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025", + "https://security-tracker.debian.org/tracker/CVE-2019-1010025", + "https://sourceware.org/bugzilla/show_bug.cgi?id=22853", + "https://support.f5.com/csp/article/K06046097", + "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://ubuntu.com/security/CVE-2019-1010025", + "https://www.cve.org/CVERecord?id=CVE-2019-1010025" + ], + "PublishedDate": "2019-07-15T04:15:13.537Z", + "LastModifiedDate": "2024-11-21T04:17:55.96Z" + }, + { + "VulnerabilityID": "CVE-2019-9192", + "PkgID": "libc6@2.36-9+deb12u10", + "PkgName": "libc6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64\u0026distro=debian-12.10", + "UID": "1a7eeabc0a4eae7" + }, + "InstalledVersion": "2.36-9+deb12u10", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c", + "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 2.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2019-9192", + "https://nvd.nist.gov/vuln/detail/CVE-2019-9192", + "https://sourceware.org/bugzilla/show_bug.cgi?id=24269", + "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS", + "https://www.cve.org/CVERecord?id=CVE-2019-9192" + ], + "PublishedDate": "2019-02-26T18:29:00.34Z", + "LastModifiedDate": "2024-11-21T04:51:10.53Z" + }, + { + "VulnerabilityID": "CVE-2025-1390", + "PkgID": "libcap2@1:2.66-4", + "PkgName": "libcap2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libcap2@2.66-4?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "59e5af23bbe95278" + }, + "InstalledVersion": "1:2.66-4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-1390", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libcap: pam_cap: Fix potential configuration parsing error", + "Description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-284" + ], + "VendorSeverity": { + "amazon": 3, + "azure": 2, + "cbl-mariner": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", + "V3Score": 6.1 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-1390", + "https://bugzilla.openanolis.cn/show_bug.cgi?id=18804", + "https://nvd.nist.gov/vuln/detail/CVE-2025-1390", + "https://ubuntu.com/security/notices/USN-7287-1", + "https://www.cve.org/CVERecord?id=CVE-2025-1390" + ], + "PublishedDate": "2025-02-18T03:15:10.447Z", + "LastModifiedDate": "2025-02-18T03:15:10.447Z" + }, + { + "VulnerabilityID": "CVE-2024-2379", + "PkgID": "libcurl4@7.88.1-10+deb12u12", + "PkgName": "libcurl4", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libcurl4@7.88.1-10%2Bdeb12u12?arch=amd64\u0026distro=debian-12.10", + "UID": "963e31acaaab5995" + }, + "InstalledVersion": "7.88.1-10+deb12u12", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-2379", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "curl: QUIC certificate check bypass with wolfSSL", + "Description": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", + "Severity": "LOW", + "VendorSeverity": { + "azure": 2, + "debian": 1, + "redhat": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 5.4 + } + }, + "References": [ + "http://seclists.org/fulldisclosure/2024/Jul/18", + "http://seclists.org/fulldisclosure/2024/Jul/19", + "http://seclists.org/fulldisclosure/2024/Jul/20", + "http://www.openwall.com/lists/oss-security/2024/03/27/2", + "https://access.redhat.com/security/cve/CVE-2024-2379", + "https://curl.se/docs/CVE-2024-2379.html", + "https://curl.se/docs/CVE-2024-2379.json", + "https://hackerone.com/reports/2410774", + "https://nvd.nist.gov/vuln/detail/CVE-2024-2379", + "https://security.netapp.com/advisory/ntap-20240531-0001/", + "https://support.apple.com/kb/HT214118", + "https://support.apple.com/kb/HT214119", + "https://support.apple.com/kb/HT214120", + "https://www.cve.org/CVERecord?id=CVE-2024-2379" + ], + "PublishedDate": "2024-03-27T08:15:41.23Z", + "LastModifiedDate": "2024-11-21T09:09:37.57Z" + }, + { + "VulnerabilityID": "CVE-2025-0725", + "PkgID": "libcurl4@7.88.1-10+deb12u12", + "PkgName": "libcurl4", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libcurl4@7.88.1-10%2Bdeb12u12?arch=amd64\u0026distro=debian-12.10", + "UID": "963e31acaaab5995" + }, + "InstalledVersion": "7.88.1-10+deb12u12", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-0725", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libcurl: Buffer Overflow in libcurl via zlib Integer Overflow", + "Description": "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow.", + "Severity": "LOW", + "VendorSeverity": { + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "redhat": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 4 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2025/02/05/3", + "http://www.openwall.com/lists/oss-security/2025/02/06/2", + "http://www.openwall.com/lists/oss-security/2025/02/06/4", + "https://access.redhat.com/security/cve/CVE-2025-0725", + "https://curl.se/docs/CVE-2025-0725.html", + "https://curl.se/docs/CVE-2025-0725.json", + "https://hackerone.com/reports/2956023", + "https://nvd.nist.gov/vuln/detail/CVE-2025-0725", + "https://security.netapp.com/advisory/ntap-20250306-0009/", + "https://www.cve.org/CVERecord?id=CVE-2025-0725" + ], + "PublishedDate": "2025-02-05T10:15:22.98Z", + "LastModifiedDate": "2025-03-07T01:15:12.403Z" + }, + { + "VulnerabilityID": "CVE-2023-32570", + "PkgID": "libdav1d6@1.0.0-2+deb12u1", + "PkgName": "libdav1d6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libdav1d6@1.0.0-2%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "82973a517c23dc92" + }, + "InstalledVersion": "1.0.0-2+deb12u1", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-32570", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that ca ...", + "Description": "VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-362" + ], + "VendorSeverity": { + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa", + "https://code.videolan.org/videolan/dav1d/-/tags/1.2.0", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/", + "https://security.gentoo.org/glsa/202310-05" + ], + "PublishedDate": "2023-05-10T05:15:12.19Z", + "LastModifiedDate": "2025-01-28T16:15:36.333Z" + }, + { + "VulnerabilityID": "CVE-2023-51792", + "PkgID": "libde265-0@1.0.11-1+deb12u2", + "PkgName": "libde265-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libde265-0@1.0.11-1%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "43084ec079e1d31c" + }, + "InstalledVersion": "1.0.11-1+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-51792", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attac ...", + "Description": "Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-121" + ], + "VendorSeverity": { + "ubuntu": 2 + }, + "References": [ + "https://github.com/strukturag/libde265", + "https://github.com/strukturag/libde265/issues/427", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", + "https://ubuntu.com/security/notices/USN-6764-1", + "https://www.cve.org/CVERecord?id=CVE-2023-51792" + ], + "PublishedDate": "2024-04-19T17:15:52.24Z", + "LastModifiedDate": "2024-11-21T08:38:49.18Z" + }, + { + "VulnerabilityID": "CVE-2024-38949", + "PkgID": "libde265-0@1.0.11-1+deb12u2", + "PkgName": "libde265-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libde265-0@1.0.11-1%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "43084ec079e1d31c" + }, + "InstalledVersion": "1.0.11-1+deb12u2", + "Status": "fix_deferred", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-38949", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...", + "Description": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to display444as420 function at sdl.cc", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-122" + ], + "VendorSeverity": { + "ubuntu": 2 + }, + "References": [ + "https://github.com/strukturag/libde265/issues/460", + "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38949", + "https://www.cve.org/CVERecord?id=CVE-2024-38949" + ], + "PublishedDate": "2024-06-26T20:15:16.263Z", + "LastModifiedDate": "2024-11-21T09:27:00.007Z" + }, + { + "VulnerabilityID": "CVE-2024-38950", + "PkgID": "libde265-0@1.0.11-1+deb12u2", + "PkgName": "libde265-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libde265-0@1.0.11-1%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "43084ec079e1d31c" + }, + "InstalledVersion": "1.0.11-1+deb12u2", + "Status": "fix_deferred", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-38950", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...", + "Description": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to __interceptor_memcpy function.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-122" + ], + "VendorSeverity": { + "ubuntu": 2 + }, + "References": [ + "https://github.com/strukturag/libde265/issues/460", + "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38950", + "https://www.cve.org/CVERecord?id=CVE-2024-38950" + ], + "PublishedDate": "2024-06-26T20:15:16.367Z", + "LastModifiedDate": "2024-11-21T09:27:00.26Z" + }, + { + "VulnerabilityID": "CVE-2023-52425", + "PkgID": "libexpat1@2.5.0-1+deb12u1", + "PkgName": "libexpat1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "de8a0c0c9f928741" + }, + "InstalledVersion": "2.5.0-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-52425", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "expat: parsing large tokens can trigger a denial of service", + "Description": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-400" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 3, + "azure": 3, + "cbl-mariner": 3, + "nvd": 3, + "oracle-oval": 2, + "photon": 3, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/03/20/5", + "https://access.redhat.com/errata/RHSA-2024:1530", + "https://access.redhat.com/security/cve/CVE-2023-52425", + "https://bugzilla.redhat.com/2262877", + "https://bugzilla.redhat.com/2268766", + "https://bugzilla.redhat.com/show_bug.cgi?id=2262877", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425", + "https://errata.almalinux.org/9/ALSA-2024-1530.html", + "https://errata.rockylinux.org/RLSA-2024:1615", + "https://github.com/libexpat/libexpat/pull/789", + "https://linux.oracle.com/cve/CVE-2023-52425.html", + "https://linux.oracle.com/errata/ELSA-2024-4259.html", + "https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/", + "https://nvd.nist.gov/vuln/detail/CVE-2023-52425", + "https://security.netapp.com/advisory/ntap-20240614-0003/", + "https://ubuntu.com/security/notices/USN-6694-1", + "https://www.cve.org/CVERecord?id=CVE-2023-52425" + ], + "PublishedDate": "2024-02-04T20:15:46.063Z", + "LastModifiedDate": "2024-11-21T08:39:43.393Z" + }, + { + "VulnerabilityID": "CVE-2024-8176", + "PkgID": "libexpat1@2.5.0-1+deb12u1", + "PkgName": "libexpat1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "de8a0c0c9f928741" + }, + "InstalledVersion": "2.5.0-1+deb12u1", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-8176", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat", + "Description": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "alma": 2, + "azure": 3, + "cbl-mariner": 3, + "oracle-oval": 2, + "photon": 3, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2025/03/15/1", + "https://access.redhat.com/errata/RHSA-2025:3531", + "https://access.redhat.com/errata/RHSA-2025:3734", + "https://access.redhat.com/errata/RHSA-2025:3913", + "https://access.redhat.com/errata/RHSA-2025:4048", + "https://access.redhat.com/security/cve/CVE-2024-8176", + "https://blog.hartwork.org/posts/expat-2-7-0-released/", + "https://bugzilla.redhat.com/2310137", + "https://bugzilla.redhat.com/show_bug.cgi?id=2310137", + "https://bugzilla.suse.com/show_bug.cgi?id=1239618", + "https://errata.almalinux.org/9/ALSA-2025-3531.html", + "https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52", + "https://github.com/libexpat/libexpat/issues/893", + "https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53", + "https://linux.oracle.com/cve/CVE-2024-8176.html", + "https://linux.oracle.com/errata/ELSA-2025-4048.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-8176", + "https://security-tracker.debian.org/tracker/CVE-2024-8176", + "https://security.netapp.com/advisory/ntap-20250328-0009/", + "https://ubuntu.com/security/CVE-2024-8176", + "https://ubuntu.com/security/notices/USN-7424-1", + "https://www.cve.org/CVERecord?id=CVE-2024-8176" + ], + "PublishedDate": "2025-03-14T09:15:14.157Z", + "LastModifiedDate": "2025-04-23T12:15:15.957Z" + }, + { + "VulnerabilityID": "CVE-2024-50602", + "PkgID": "libexpat1@2.5.0-1+deb12u1", + "PkgName": "libexpat1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "de8a0c0c9f928741" + }, + "InstalledVersion": "2.5.0-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-50602", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libexpat: expat: DoS via XML_ResumeParser", + "Description": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-754" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "bitnami": 2, + "cbl-mariner": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "bitnami": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9541", + "https://access.redhat.com/security/cve/CVE-2024-50602", + "https://bugzilla.redhat.com/2321987", + "https://bugzilla.redhat.com/show_bug.cgi?id=2321987", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602", + "https://errata.almalinux.org/9/ALSA-2024-9541.html", + "https://errata.rockylinux.org/RLSA-2024:9502", + "https://github.com/libexpat/libexpat/pull/915", + "https://linux.oracle.com/cve/CVE-2024-50602.html", + "https://linux.oracle.com/errata/ELSA-2024-9541.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-50602", + "https://security.netapp.com/advisory/ntap-20250404-0008/", + "https://www.cve.org/CVERecord?id=CVE-2024-50602" + ], + "PublishedDate": "2024-10-27T05:15:04.09Z", + "LastModifiedDate": "2024-10-30T18:35:16.237Z" + }, + { + "VulnerabilityID": "CVE-2023-52426", + "PkgID": "libexpat1@2.5.0-1+deb12u1", + "PkgName": "libexpat1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "de8a0c0c9f928741" + }, + "InstalledVersion": "2.5.0-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-52426", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "expat: recursive XML entity expansion vulnerability", + "Description": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.", + "Severity": "LOW", + "CweIDs": [ + "CWE-776" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-52426", + "https://cwe.mitre.org/data/definitions/776.html", + "https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404", + "https://github.com/libexpat/libexpat/pull/777", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/", + "https://nvd.nist.gov/vuln/detail/CVE-2023-52426", + "https://security.netapp.com/advisory/ntap-20240307-0005/", + "https://www.cve.org/CVERecord?id=CVE-2023-52426" + ], + "PublishedDate": "2024-02-04T20:15:46.12Z", + "LastModifiedDate": "2024-11-21T08:39:43.64Z" + }, + { + "VulnerabilityID": "CVE-2024-28757", + "PkgID": "libexpat1@2.5.0-1+deb12u1", + "PkgName": "libexpat1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libexpat1@2.5.0-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "de8a0c0c9f928741" + }, + "InstalledVersion": "2.5.0-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-28757", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "expat: XML Entity Expansion", + "Description": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).", + "Severity": "LOW", + "CweIDs": [ + "CWE-776" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 3, + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "oracle-oval": 2, + "photon": 3, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/03/15/1", + "https://access.redhat.com/errata/RHSA-2024:1530", + "https://access.redhat.com/security/cve/CVE-2024-28757", + "https://bugzilla.redhat.com/2262877", + "https://bugzilla.redhat.com/2268766", + "https://errata.almalinux.org/9/ALSA-2024-1530.html", + "https://github.com/libexpat/libexpat/issues/839", + "https://github.com/libexpat/libexpat/pull/842", + "https://linux.oracle.com/cve/CVE-2024-28757.html", + "https://linux.oracle.com/errata/ELSA-2024-1530.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/", + "https://nvd.nist.gov/vuln/detail/CVE-2024-28757", + "https://security.netapp.com/advisory/ntap-20240322-0001/", + "https://ubuntu.com/security/notices/USN-6694-1", + "https://www.cve.org/CVERecord?id=CVE-2024-28757" + ], + "PublishedDate": "2024-03-10T05:15:06.57Z", + "LastModifiedDate": "2025-03-28T19:15:21.23Z" + }, + { + "VulnerabilityID": "CVE-2022-27943", + "PkgID": "libgcc-s1@12.2.0-14", + "PkgName": "libgcc-s1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgcc-s1@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "b286857ae84ea462" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27943", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const", + "Description": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "amazon": 1, + "debian": 1, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-27943", + "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead", + "https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/", + "https://nvd.nist.gov/vuln/detail/CVE-2022-27943", + "https://sourceware.org/bugzilla/show_bug.cgi?id=28995", + "https://www.cve.org/CVERecord?id=CVE-2022-27943" + ], + "PublishedDate": "2022-03-26T13:15:07.9Z", + "LastModifiedDate": "2024-11-21T06:56:31.04Z" + }, + { + "VulnerabilityID": "CVE-2023-4039", + "PkgID": "libgcc-s1@12.2.0-14", + "PkgName": "libgcc-s1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgcc-s1@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "b286857ae84ea462" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-4039", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64", + "Description": "**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.", + "Severity": "LOW", + "CweIDs": [ + "CWE-693" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "oracle-oval": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 4.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-4039", + "https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64", + "https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt", + "https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html", + "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf", + "https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org", + "https://linux.oracle.com/cve/CVE-2023-4039.html", + "https://linux.oracle.com/errata/ELSA-2023-28766.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-4039", + "https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html", + "https://www.cve.org/CVERecord?id=CVE-2023-4039" + ], + "PublishedDate": "2023-09-13T09:15:15.69Z", + "LastModifiedDate": "2025-02-13T17:17:14.717Z" + }, + { + "VulnerabilityID": "CVE-2018-6829", + "PkgID": "libgcrypt20@1.10.1-3", + "PkgName": "libgcrypt20", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgcrypt20@1.10.1-3?arch=amd64\u0026distro=debian-12.10", + "UID": "14d13b47811260d3" + }, + "InstalledVersion": "1.10.1-3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-6829", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information", + "Description": "cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.", + "Severity": "LOW", + "CweIDs": [ + "CWE-327" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2018-6829", + "https://github.com/weikengchen/attack-on-libgcrypt-elgamal", + "https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki", + "https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html", + "https://nvd.nist.gov/vuln/detail/CVE-2018-6829", + "https://www.cve.org/CVERecord?id=CVE-2018-6829", + "https://www.oracle.com/security-alerts/cpujan2020.html" + ], + "PublishedDate": "2018-02-07T23:29:01.703Z", + "LastModifiedDate": "2024-11-21T04:11:15.41Z" + }, + { + "VulnerabilityID": "CVE-2024-2236", + "PkgID": "libgcrypt20@1.10.1-3", + "PkgName": "libgcrypt20", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgcrypt20@1.10.1-3?arch=amd64\u0026distro=debian-12.10", + "UID": "14d13b47811260d3" + }, + "InstalledVersion": "1.10.1-3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-2236", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libgcrypt: vulnerable to Marvin Attack", + "Description": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.", + "Severity": "LOW", + "CweIDs": [ + "CWE-208" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "debian": 1, + "oracle-oval": 2, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9404", + "https://access.redhat.com/errata/RHSA-2025:3530", + "https://access.redhat.com/errata/RHSA-2025:3534", + "https://access.redhat.com/security/cve/CVE-2024-2236", + "https://bugzilla.redhat.com/2245218", + "https://bugzilla.redhat.com/show_bug.cgi?id=2245218", + "https://bugzilla.redhat.com/show_bug.cgi?id=2268268", + "https://dev.gnupg.org/T7136", + "https://errata.almalinux.org/9/ALSA-2024-9404.html", + "https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt", + "https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17", + "https://linux.oracle.com/cve/CVE-2024-2236.html", + "https://linux.oracle.com/errata/ELSA-2024-9404.html", + "https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-2236", + "https://www.cve.org/CVERecord?id=CVE-2024-2236" + ], + "PublishedDate": "2024-03-06T22:15:57.977Z", + "LastModifiedDate": "2025-04-02T17:15:37.79Z" + }, + { + "VulnerabilityID": "CVE-2011-3389", + "PkgID": "libgnutls30@3.7.9-2+deb12u4", + "PkgName": "libgnutls30", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgnutls30@3.7.9-2%2Bdeb12u4?arch=amd64\u0026distro=debian-12.10", + "UID": "43b99bda745a9f24" + }, + "InstalledVersion": "3.7.9-2+deb12u4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3389", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", + "Description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", + "Severity": "LOW", + "CweIDs": [ + "CWE-326" + ], + "VendorSeverity": { + "amazon": 4, + "debian": 1, + "nvd": 2, + "oracle-oval": 4, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "V2Score": 4.3 + }, + "redhat": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "V2Score": 4.3 + } + }, + "References": [ + "http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/", + "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/", + "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx", + "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx", + "http://curl.haxx.se/docs/adv_20120124B.html", + "http://downloads.asterisk.org/pub/security/AST-2016-001.html", + "http://ekoparty.org/2011/juliano-rizzo.php", + "http://eprint.iacr.org/2004/111", + "http://eprint.iacr.org/2006/136", + "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html", + "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635", + "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html", + "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html", + "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html", + "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html", + "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html", + "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html", + "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html", + "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html", + "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html", + "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html", + "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2", + "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2", + "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2", + "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2", + "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2", + "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2", + "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue", + "http://osvdb.org/74829", + "http://rhn.redhat.com/errata/RHSA-2012-0508.html", + "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "http://secunia.com/advisories/45791", + "http://secunia.com/advisories/47998", + "http://secunia.com/advisories/48256", + "http://secunia.com/advisories/48692", + "http://secunia.com/advisories/48915", + "http://secunia.com/advisories/48948", + "http://secunia.com/advisories/49198", + "http://secunia.com/advisories/55322", + "http://secunia.com/advisories/55350", + "http://secunia.com/advisories/55351", + "http://security.gentoo.org/glsa/glsa-201203-02.xml", + "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "http://support.apple.com/kb/HT4999", + "http://support.apple.com/kb/HT5001", + "http://support.apple.com/kb/HT5130", + "http://support.apple.com/kb/HT5281", + "http://support.apple.com/kb/HT5501", + "http://support.apple.com/kb/HT6150", + "http://technet.microsoft.com/security/advisory/2588513", + "http://vnhacker.blogspot.com/2011/09/beast.html", + "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", + "http://www.debian.org/security/2012/dsa-2398", + "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html", + "http://www.ibm.com/developerworks/java/jdk/alerts/", + "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html", + "http://www.insecure.cl/Beast-SSL.rar", + "http://www.kb.cert.org/vuls/id/864643", + "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058", + "http://www.opera.com/docs/changelogs/mac/1151/", + "http://www.opera.com/docs/changelogs/mac/1160/", + "http://www.opera.com/docs/changelogs/unix/1151/", + "http://www.opera.com/docs/changelogs/unix/1160/", + "http://www.opera.com/docs/changelogs/windows/1151/", + "http://www.opera.com/docs/changelogs/windows/1160/", + "http://www.opera.com/support/kb/view/1004/", + "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", + "http://www.redhat.com/support/errata/RHSA-2011-1384.html", + "http://www.redhat.com/support/errata/RHSA-2012-0006.html", + "http://www.securityfocus.com/bid/49388", + "http://www.securityfocus.com/bid/49778", + "http://www.securitytracker.com/id/1029190", + "http://www.securitytracker.com/id?1025997", + "http://www.securitytracker.com/id?1026103", + "http://www.securitytracker.com/id?1026704", + "http://www.ubuntu.com/usn/USN-1263-1", + "http://www.us-cert.gov/cas/techalerts/TA12-010A.html", + "https://access.redhat.com/security/cve/CVE-2011-3389", + "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail", + "https://bugzilla.novell.com/show_bug.cgi?id=719047", + "https://bugzilla.redhat.com/show_bug.cgi?id=737506", + "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", + "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006", + "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "https://hermes.opensuse.org/messages/13154861", + "https://hermes.opensuse.org/messages/13155432", + "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", + "https://linux.oracle.com/cve/CVE-2011-3389.html", + "https://linux.oracle.com/errata/ELSA-2011-1380.html", + "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", + "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752", + "https://ubuntu.com/security/notices/USN-1263-1", + "https://www.cve.org/CVERecord?id=CVE-2011-3389" + ], + "PublishedDate": "2011-09-06T19:55:03.197Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2024-26462", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26462", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/kdc/ndr.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-401" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26462", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", + "https://linux.oracle.com/cve/CVE-2024-26462.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26462", + "https://security.netapp.com/advisory/ntap-20240415-0012/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26462" + ], + "PublishedDate": "2024-02-29T01:44:18.857Z", + "LastModifiedDate": "2025-03-25T20:15:21.143Z" + }, + { + "VulnerabilityID": "CVE-2025-24528", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-24528", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: overflow when calculating ulog block size", + "Description": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "oracle-oval": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2722", + "https://access.redhat.com/security/cve/CVE-2025-24528", + "https://bugzilla.redhat.com/2342796", + "https://errata.almalinux.org/8/ALSA-2025-2722.html", + "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", + "https://linux.oracle.com/cve/CVE-2025-24528.html", + "https://linux.oracle.com/errata/ELSA-2025-2722.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2025-24528" + ] + }, + { + "VulnerabilityID": "CVE-2025-3576", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-3576", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions", + "Description": "A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-328" + ], + "VendorSeverity": { + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-3576", + "https://bugzilla.redhat.com/show_bug.cgi?id=2359465", + "https://nvd.nist.gov/vuln/detail/CVE-2025-3576", + "https://www.cve.org/CVERecord?id=CVE-2025-3576" + ], + "PublishedDate": "2025-04-15T06:15:44.047Z", + "LastModifiedDate": "2025-04-15T18:39:27.967Z" + }, + { + "VulnerabilityID": "CVE-2018-5709", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: integer overflow in dbentry-\u003en_key_data in kadmin/dbutil/dump.c", + "Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry-\u003en_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.", + "Severity": "LOW", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "V3Score": 6.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2018-5709", + "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2018-5709", + "https://www.cve.org/CVERecord?id=CVE-2018-5709" + ], + "PublishedDate": "2018-01-16T09:29:00.5Z", + "LastModifiedDate": "2024-11-21T04:09:13.037Z" + }, + { + "VulnerabilityID": "CVE-2024-26458", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26458", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.", + "Severity": "LOW", + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26458", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md", + "https://linux.oracle.com/cve/CVE-2024-26458.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26458", + "https://security.netapp.com/advisory/ntap-20240415-0010/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26458" + ], + "PublishedDate": "2024-02-29T01:44:18.78Z", + "LastModifiedDate": "2024-12-06T21:15:06.28Z" + }, + { + "VulnerabilityID": "CVE-2024-26461", + "PkgID": "libgssapi-krb5-2@1.20.1-2+deb12u2", + "PkgName": "libgssapi-krb5-2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libgssapi-krb5-2@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a766fc6f5729a82a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26461", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-770" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26461", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md", + "https://linux.oracle.com/cve/CVE-2024-26461.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26461", + "https://security.netapp.com/advisory/ntap-20240415-0011/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26461" + ], + "PublishedDate": "2024-02-29T01:44:18.82Z", + "LastModifiedDate": "2024-11-21T09:02:26.477Z" + }, + { + "VulnerabilityID": "CVE-2023-49463", + "PkgID": "libheif1@1.15.1-1+deb12u1", + "PkgName": "libheif1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libheif1@1.15.1-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "4eb53d0aa669a22c" + }, + "InstalledVersion": "1.15.1-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-49463", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libheif v1.17.5 was discovered to contain a segmentation violation via ...", + "Description": "libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc.", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V3Score": 8.8 + } + }, + "References": [ + "https://github.com/strukturag/libheif", + "https://github.com/strukturag/libheif/issues/1042", + "https://ubuntu.com/security/notices/USN-6847-1", + "https://www.cve.org/CVERecord?id=CVE-2023-49463" + ], + "PublishedDate": "2023-12-07T20:15:38.26Z", + "LastModifiedDate": "2024-11-21T08:33:26.393Z" + }, + { + "VulnerabilityID": "CVE-2024-25269", + "PkgID": "libheif1@1.15.1-1+deb12u1", + "PkgName": "libheif1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libheif1@1.15.1-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "4eb53d0aa669a22c" + }, + "InstalledVersion": "1.15.1-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-25269", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libheif \u003c= 1.17.6 contains a memory leak in the function JpegEncoder:: ...", + "Description": "libheif \u003c= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw allows an attacker to cause a denial of service attack.", + "Severity": "LOW", + "CweIDs": [ + "CWE-400" + ], + "VendorSeverity": { + "debian": 1 + }, + "References": [ + "https://github.com/strukturag/libheif/issues/1073" + ], + "PublishedDate": "2024-03-05T01:15:06.78Z", + "LastModifiedDate": "2025-03-24T14:40:29.34Z" + }, + { + "VulnerabilityID": "CVE-2025-43966", + "PkgID": "libheif1@1.15.1-1+deb12u1", + "PkgName": "libheif1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libheif1@1.15.1-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "4eb53d0aa669a22c" + }, + "InstalledVersion": "1.15.1-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-43966", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden ...", + "Description": "libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden in image-items/iden.cc.", + "Severity": "UNKNOWN", + "CweIDs": [ + "CWE-476" + ], + "References": [ + "https://github.com/strukturag/libheif/commit/b38555387e4b5dcf036fe45b0c440aca19b7b69c", + "https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6" + ], + "PublishedDate": "2025-04-21T00:15:33.457Z", + "LastModifiedDate": "2025-04-21T14:23:45.95Z" + }, + { + "VulnerabilityID": "CVE-2025-43967", + "PkgID": "libheif1@1.15.1-1+deb12u1", + "PkgName": "libheif1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libheif1@1.15.1-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "4eb53d0aa669a22c" + }, + "InstalledVersion": "1.15.1-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-43967", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libheif before 1.19.6 has a NULL pointer dereference in ImageItem_Grid ...", + "Description": "libheif before 1.19.6 has a NULL pointer dereference in ImageItem_Grid::get_decoder in image-items/grid.cc because a grid image can reference a nonexistent image item.", + "Severity": "UNKNOWN", + "CweIDs": [ + "CWE-476" + ], + "References": [ + "https://github.com/strukturag/libheif/commit/6e35af7b0ff9fb6cc952a1539590d160db32f671", + "https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6", + "https://github.com/strukturag/libheif/issues/1455" + ], + "PublishedDate": "2025-04-21T00:15:33.607Z", + "LastModifiedDate": "2025-04-21T14:23:45.95Z" + }, + { + "VulnerabilityID": "CVE-2017-9937", + "PkgID": "libjbig0@2.1-6.1", + "PkgName": "libjbig0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libjbig0@2.1-6.1?arch=amd64\u0026distro=debian-12.10", + "UID": "485e07103432caa0" + }, + "InstalledVersion": "2.1-6.1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9937", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: memory malloc failure in tif_jbig.c could cause DOS.", + "Description": "In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.", + "Severity": "LOW", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + } + }, + "References": [ + "http://bugzilla.maptools.org/show_bug.cgi?id=2707", + "http://www.securityfocus.com/bid/99304", + "https://access.redhat.com/security/cve/CVE-2017-9937", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2017-9937", + "https://ubuntu.com/security/notices/USN-5742-1", + "https://www.cve.org/CVERecord?id=CVE-2017-9937" + ], + "PublishedDate": "2017-06-26T12:29:00.25Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2024-26462", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26462", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/kdc/ndr.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-401" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26462", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", + "https://linux.oracle.com/cve/CVE-2024-26462.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26462", + "https://security.netapp.com/advisory/ntap-20240415-0012/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26462" + ], + "PublishedDate": "2024-02-29T01:44:18.857Z", + "LastModifiedDate": "2025-03-25T20:15:21.143Z" + }, + { + "VulnerabilityID": "CVE-2025-24528", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-24528", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: overflow when calculating ulog block size", + "Description": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "oracle-oval": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2722", + "https://access.redhat.com/security/cve/CVE-2025-24528", + "https://bugzilla.redhat.com/2342796", + "https://errata.almalinux.org/8/ALSA-2025-2722.html", + "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", + "https://linux.oracle.com/cve/CVE-2025-24528.html", + "https://linux.oracle.com/errata/ELSA-2025-2722.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2025-24528" + ] + }, + { + "VulnerabilityID": "CVE-2025-3576", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-3576", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions", + "Description": "A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-328" + ], + "VendorSeverity": { + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-3576", + "https://bugzilla.redhat.com/show_bug.cgi?id=2359465", + "https://nvd.nist.gov/vuln/detail/CVE-2025-3576", + "https://www.cve.org/CVERecord?id=CVE-2025-3576" + ], + "PublishedDate": "2025-04-15T06:15:44.047Z", + "LastModifiedDate": "2025-04-15T18:39:27.967Z" + }, + { + "VulnerabilityID": "CVE-2018-5709", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: integer overflow in dbentry-\u003en_key_data in kadmin/dbutil/dump.c", + "Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry-\u003en_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.", + "Severity": "LOW", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "V3Score": 6.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2018-5709", + "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2018-5709", + "https://www.cve.org/CVERecord?id=CVE-2018-5709" + ], + "PublishedDate": "2018-01-16T09:29:00.5Z", + "LastModifiedDate": "2024-11-21T04:09:13.037Z" + }, + { + "VulnerabilityID": "CVE-2024-26458", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26458", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.", + "Severity": "LOW", + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26458", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md", + "https://linux.oracle.com/cve/CVE-2024-26458.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26458", + "https://security.netapp.com/advisory/ntap-20240415-0010/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26458" + ], + "PublishedDate": "2024-02-29T01:44:18.78Z", + "LastModifiedDate": "2024-12-06T21:15:06.28Z" + }, + { + "VulnerabilityID": "CVE-2024-26461", + "PkgID": "libk5crypto3@1.20.1-2+deb12u2", + "PkgName": "libk5crypto3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libk5crypto3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "a6385e8d146138e3" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26461", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-770" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26461", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md", + "https://linux.oracle.com/cve/CVE-2024-26461.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26461", + "https://security.netapp.com/advisory/ntap-20240415-0011/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26461" + ], + "PublishedDate": "2024-02-29T01:44:18.82Z", + "LastModifiedDate": "2024-11-21T09:02:26.477Z" + }, + { + "VulnerabilityID": "CVE-2024-26462", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26462", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/kdc/ndr.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-401" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26462", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", + "https://linux.oracle.com/cve/CVE-2024-26462.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26462", + "https://security.netapp.com/advisory/ntap-20240415-0012/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26462" + ], + "PublishedDate": "2024-02-29T01:44:18.857Z", + "LastModifiedDate": "2025-03-25T20:15:21.143Z" + }, + { + "VulnerabilityID": "CVE-2025-24528", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-24528", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: overflow when calculating ulog block size", + "Description": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "oracle-oval": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2722", + "https://access.redhat.com/security/cve/CVE-2025-24528", + "https://bugzilla.redhat.com/2342796", + "https://errata.almalinux.org/8/ALSA-2025-2722.html", + "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", + "https://linux.oracle.com/cve/CVE-2025-24528.html", + "https://linux.oracle.com/errata/ELSA-2025-2722.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2025-24528" + ] + }, + { + "VulnerabilityID": "CVE-2025-3576", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-3576", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions", + "Description": "A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-328" + ], + "VendorSeverity": { + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-3576", + "https://bugzilla.redhat.com/show_bug.cgi?id=2359465", + "https://nvd.nist.gov/vuln/detail/CVE-2025-3576", + "https://www.cve.org/CVERecord?id=CVE-2025-3576" + ], + "PublishedDate": "2025-04-15T06:15:44.047Z", + "LastModifiedDate": "2025-04-15T18:39:27.967Z" + }, + { + "VulnerabilityID": "CVE-2018-5709", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: integer overflow in dbentry-\u003en_key_data in kadmin/dbutil/dump.c", + "Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry-\u003en_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.", + "Severity": "LOW", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "V3Score": 6.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2018-5709", + "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2018-5709", + "https://www.cve.org/CVERecord?id=CVE-2018-5709" + ], + "PublishedDate": "2018-01-16T09:29:00.5Z", + "LastModifiedDate": "2024-11-21T04:09:13.037Z" + }, + { + "VulnerabilityID": "CVE-2024-26458", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26458", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.", + "Severity": "LOW", + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26458", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md", + "https://linux.oracle.com/cve/CVE-2024-26458.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26458", + "https://security.netapp.com/advisory/ntap-20240415-0010/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26458" + ], + "PublishedDate": "2024-02-29T01:44:18.78Z", + "LastModifiedDate": "2024-12-06T21:15:06.28Z" + }, + { + "VulnerabilityID": "CVE-2024-26461", + "PkgID": "libkrb5-3@1.20.1-2+deb12u2", + "PkgName": "libkrb5-3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5-3@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "84bd54cf04d783a" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26461", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-770" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26461", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md", + "https://linux.oracle.com/cve/CVE-2024-26461.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26461", + "https://security.netapp.com/advisory/ntap-20240415-0011/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26461" + ], + "PublishedDate": "2024-02-29T01:44:18.82Z", + "LastModifiedDate": "2024-11-21T09:02:26.477Z" + }, + { + "VulnerabilityID": "CVE-2024-26462", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26462", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/kdc/ndr.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-401" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26462", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md", + "https://linux.oracle.com/cve/CVE-2024-26462.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26462", + "https://security.netapp.com/advisory/ntap-20240415-0012/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26462" + ], + "PublishedDate": "2024-02-29T01:44:18.857Z", + "LastModifiedDate": "2025-03-25T20:15:21.143Z" + }, + { + "VulnerabilityID": "CVE-2025-24528", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-24528", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: overflow when calculating ulog block size", + "Description": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "oracle-oval": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2722", + "https://access.redhat.com/security/cve/CVE-2025-24528", + "https://bugzilla.redhat.com/2342796", + "https://errata.almalinux.org/8/ALSA-2025-2722.html", + "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", + "https://linux.oracle.com/cve/CVE-2025-24528.html", + "https://linux.oracle.com/errata/ELSA-2025-2722.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2025-24528" + ] + }, + { + "VulnerabilityID": "CVE-2025-3576", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-3576", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions", + "Description": "A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-328" + ], + "VendorSeverity": { + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-3576", + "https://bugzilla.redhat.com/show_bug.cgi?id=2359465", + "https://nvd.nist.gov/vuln/detail/CVE-2025-3576", + "https://www.cve.org/CVERecord?id=CVE-2025-3576" + ], + "PublishedDate": "2025-04-15T06:15:44.047Z", + "LastModifiedDate": "2025-04-15T18:39:27.967Z" + }, + { + "VulnerabilityID": "CVE-2018-5709", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-5709", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: integer overflow in dbentry-\u003en_key_data in kadmin/dbutil/dump.c", + "Description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry-\u003en_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.", + "Severity": "LOW", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "V3Score": 6.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2018-5709", + "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2018-5709", + "https://www.cve.org/CVERecord?id=CVE-2018-5709" + ], + "PublishedDate": "2018-01-16T09:29:00.5Z", + "LastModifiedDate": "2024-11-21T04:09:13.037Z" + }, + { + "VulnerabilityID": "CVE-2024-26458", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26458", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.", + "Severity": "LOW", + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26458", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md", + "https://linux.oracle.com/cve/CVE-2024-26458.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26458", + "https://security.netapp.com/advisory/ntap-20240415-0010/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26458" + ], + "PublishedDate": "2024-02-29T01:44:18.78Z", + "LastModifiedDate": "2024-12-06T21:15:06.28Z" + }, + { + "VulnerabilityID": "CVE-2024-26461", + "PkgID": "libkrb5support0@1.20.1-2+deb12u2", + "PkgName": "libkrb5support0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libkrb5support0@1.20.1-2%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "9d869b6ab3b3ff5b" + }, + "InstalledVersion": "1.20.1-2+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-26461", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c", + "Description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-770" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 3, + "cbl-mariner": 3, + "debian": 1, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:9331", + "https://access.redhat.com/security/cve/CVE-2024-26461", + "https://bugzilla.redhat.com/2266731", + "https://bugzilla.redhat.com/2266740", + "https://bugzilla.redhat.com/2266742", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266731", + "https://bugzilla.redhat.com/show_bug.cgi?id=2266740", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461", + "https://errata.almalinux.org/9/ALSA-2024-9331.html", + "https://errata.rockylinux.org/RLSA-2024:3268", + "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md", + "https://linux.oracle.com/cve/CVE-2024-26461.html", + "https://linux.oracle.com/errata/ELSA-2024-9331.html", + "https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-26461", + "https://security.netapp.com/advisory/ntap-20240415-0011/", + "https://ubuntu.com/security/notices/USN-7314-1", + "https://www.cve.org/CVERecord?id=CVE-2024-26461" + ], + "PublishedDate": "2024-02-29T01:44:18.82Z", + "LastModifiedDate": "2024-11-21T09:02:26.477Z" + }, + { + "VulnerabilityID": "CVE-2023-2953", + "PkgID": "libldap-2.5-0@2.5.13+dfsg-5", + "PkgName": "libldap-2.5-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=amd64\u0026distro=debian-12.10", + "UID": "b9bd1cf03a5819bf" + }, + "InstalledVersion": "2.5.13+dfsg-5", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-2953", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openldap: null pointer dereference in ber_memalloc_x function", + "Description": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-476" + ], + "VendorSeverity": { + "alma": 1, + "amazon": 2, + "bitnami": 3, + "cbl-mariner": 3, + "nvd": 3, + "oracle-oval": 1, + "photon": 3, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "bitnami": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", + "V3Score": 7.1 + } + }, + "References": [ + "http://seclists.org/fulldisclosure/2023/Jul/47", + "http://seclists.org/fulldisclosure/2023/Jul/48", + "http://seclists.org/fulldisclosure/2023/Jul/52", + "https://access.redhat.com/errata/RHSA-2024:4264", + "https://access.redhat.com/security/cve/CVE-2023-2953", + "https://bugs.openldap.org/show_bug.cgi?id=9904", + "https://bugzilla.redhat.com/2210651", + "https://errata.almalinux.org/8/ALSA-2024-4264.html", + "https://linux.oracle.com/cve/CVE-2023-2953.html", + "https://linux.oracle.com/errata/ELSA-2024-4264.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-2953", + "https://security.netapp.com/advisory/ntap-20230703-0005/", + "https://support.apple.com/kb/HT213843", + "https://support.apple.com/kb/HT213844", + "https://support.apple.com/kb/HT213845", + "https://ubuntu.com/security/notices/USN-6197-1", + "https://ubuntu.com/security/notices/USN-6616-1", + "https://www.cve.org/CVERecord?id=CVE-2023-2953" + ], + "PublishedDate": "2023-05-30T22:15:10.613Z", + "LastModifiedDate": "2025-01-10T22:15:23.557Z" + }, + { + "VulnerabilityID": "CVE-2015-3276", + "PkgID": "libldap-2.5-0@2.5.13+dfsg-5", + "PkgName": "libldap-2.5-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=amd64\u0026distro=debian-12.10", + "UID": "b9bd1cf03a5819bf" + }, + "InstalledVersion": "2.5.13+dfsg-5", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-3276", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openldap: incorrect multi-keyword mode cipherstring parsing", + "Description": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.", + "Severity": "LOW", + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "oracle-oval": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "V2Score": 4.3 + } + }, + "References": [ + "http://rhn.redhat.com/errata/RHSA-2015-2131.html", + "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "http://www.securitytracker.com/id/1034221", + "https://access.redhat.com/security/cve/CVE-2015-3276", + "https://bugzilla.redhat.com/show_bug.cgi?id=1238322", + "https://linux.oracle.com/cve/CVE-2015-3276.html", + "https://linux.oracle.com/errata/ELSA-2015-2131.html", + "https://nvd.nist.gov/vuln/detail/CVE-2015-3276", + "https://www.cve.org/CVERecord?id=CVE-2015-3276" + ], + "PublishedDate": "2015-12-07T20:59:03.023Z", + "LastModifiedDate": "2025-04-12T10:46:40.837Z" + }, + { + "VulnerabilityID": "CVE-2017-14159", + "PkgID": "libldap-2.5-0@2.5.13+dfsg-5", + "PkgName": "libldap-2.5-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=amd64\u0026distro=debian-12.10", + "UID": "b9bd1cf03a5819bf" + }, + "InstalledVersion": "2.5.13+dfsg-5", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-14159", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openldap: Privilege escalation via PID file manipulation", + "Description": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript.", + "Severity": "LOW", + "CweIDs": [ + "CWE-665" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 1.9, + "V3Score": 4.7 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 4.4 + } + }, + "References": [ + "http://www.openldap.org/its/index.cgi?findid=8703", + "https://access.redhat.com/security/cve/CVE-2017-14159", + "https://nvd.nist.gov/vuln/detail/CVE-2017-14159", + "https://www.cve.org/CVERecord?id=CVE-2017-14159", + "https://www.oracle.com/security-alerts/cpuapr2022.html" + ], + "PublishedDate": "2017-09-05T18:29:00.133Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2017-17740", + "PkgID": "libldap-2.5-0@2.5.13+dfsg-5", + "PkgName": "libldap-2.5-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=amd64\u0026distro=debian-12.10", + "UID": "b9bd1cf03a5819bf" + }, + "InstalledVersion": "2.5.13+dfsg-5", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17740", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service", + "Description": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.", + "Severity": "LOW", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html", + "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html", + "http://www.openldap.org/its/index.cgi/Incoming?id=8759", + "https://access.redhat.com/security/cve/CVE-2017-17740", + "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", + "https://nvd.nist.gov/vuln/detail/CVE-2017-17740", + "https://www.cve.org/CVERecord?id=CVE-2017-17740", + "https://www.oracle.com/security-alerts/cpuapr2022.html" + ], + "PublishedDate": "2017-12-18T06:29:00.397Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2020-15719", + "PkgID": "libldap-2.5-0@2.5.13+dfsg-5", + "PkgName": "libldap-2.5-0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libldap-2.5-0@2.5.13%2Bdfsg-5?arch=amd64\u0026distro=debian-12.10", + "UID": "b9bd1cf03a5819bf" + }, + "InstalledVersion": "2.5.13+dfsg-5", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-15719", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openldap: Certificate validation incorrectly matches name against CN-ID", + "Description": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.", + "Severity": "LOW", + "CweIDs": [ + "CWE-295" + ], + "VendorSeverity": { + "bitnami": 2, + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "bitnami": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "V3Score": 4.2 + }, + "nvd": { + "V2Vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "V2Score": 4, + "V3Score": 4.2 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "V3Score": 4.2 + } + }, + "References": [ + "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html", + "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html", + "https://access.redhat.com/errata/RHBA-2019:3674", + "https://access.redhat.com/security/cve/CVE-2020-15719", + "https://bugs.openldap.org/show_bug.cgi?id=9266", + "https://bugzilla.redhat.com/show_bug.cgi?id=1740070", + "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", + "https://nvd.nist.gov/vuln/detail/CVE-2020-15719", + "https://www.cve.org/CVERecord?id=CVE-2020-15719", + "https://www.oracle.com/security-alerts/cpuapr2022.html" + ], + "PublishedDate": "2020-07-14T14:15:17.667Z", + "LastModifiedDate": "2024-11-21T05:06:05.903Z" + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "libmount1@2.38.1-5+deb12u3", + "PkgName": "libmount1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libmount1@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "6ebca51aff38e6ce" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2024-10041", + "PkgID": "libpam-modules@1.5.2-6+deb12u1", + "PkgName": "libpam-modules", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-modules@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "854c4c35b318f724" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-10041", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: libpam: Libpam vulnerable to read hashed password", + "Description": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-922" + ], + "VendorSeverity": { + "alma": 2, + "azure": 2, + "cbl-mariner": 2, + "oracle-oval": 2, + "redhat": 2, + "rocky": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:10379", + "https://access.redhat.com/errata/RHSA-2024:11250", + "https://access.redhat.com/errata/RHSA-2024:9941", + "https://access.redhat.com/security/cve/CVE-2024-10041", + "https://bugzilla.redhat.com/2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2324291", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963", + "https://errata.almalinux.org/9/ALSA-2024-11250.html", + "https://errata.rockylinux.org/RLSA-2024:10379", + "https://linux.oracle.com/cve/CVE-2024-10041.html", + "https://linux.oracle.com/errata/ELSA-2024-11250.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-10041", + "https://www.cve.org/CVERecord?id=CVE-2024-10041" + ], + "PublishedDate": "2024-10-23T14:15:03.97Z", + "LastModifiedDate": "2024-12-18T10:15:05.85Z" + }, + { + "VulnerabilityID": "CVE-2024-22365", + "PkgID": "libpam-modules@1.5.2-6+deb12u1", + "PkgName": "libpam-modules", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-modules@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "854c4c35b318f724" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-22365", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: allowing unprivileged user to block another user namespace", + "Description": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "amazon": 1, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/01/18/3", + "https://access.redhat.com/errata/RHSA-2024:2438", + "https://access.redhat.com/security/cve/CVE-2024-22365", + "https://bugzilla.redhat.com/2257722", + "https://bugzilla.redhat.com/show_bug.cgi?id=2257722", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365", + "https://errata.almalinux.org/9/ALSA-2024-2438.html", + "https://errata.rockylinux.org/RLSA-2024:3163", + "https://github.com/linux-pam/linux-pam", + "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb", + "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0", + "https://linux.oracle.com/cve/CVE-2024-22365.html", + "https://linux.oracle.com/errata/ELSA-2024-3163.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-22365", + "https://ubuntu.com/security/notices/USN-6588-1", + "https://ubuntu.com/security/notices/USN-6588-2", + "https://www.cve.org/CVERecord?id=CVE-2024-22365", + "https://www.openwall.com/lists/oss-security/2024/01/18/3" + ], + "PublishedDate": "2024-02-06T08:15:52.203Z", + "LastModifiedDate": "2024-11-21T08:56:07.76Z" + }, + { + "VulnerabilityID": "CVE-2024-10041", + "PkgID": "libpam-modules-bin@1.5.2-6+deb12u1", + "PkgName": "libpam-modules-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-modules-bin@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "6e01953a38b979ef" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-10041", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: libpam: Libpam vulnerable to read hashed password", + "Description": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-922" + ], + "VendorSeverity": { + "alma": 2, + "azure": 2, + "cbl-mariner": 2, + "oracle-oval": 2, + "redhat": 2, + "rocky": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:10379", + "https://access.redhat.com/errata/RHSA-2024:11250", + "https://access.redhat.com/errata/RHSA-2024:9941", + "https://access.redhat.com/security/cve/CVE-2024-10041", + "https://bugzilla.redhat.com/2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2324291", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963", + "https://errata.almalinux.org/9/ALSA-2024-11250.html", + "https://errata.rockylinux.org/RLSA-2024:10379", + "https://linux.oracle.com/cve/CVE-2024-10041.html", + "https://linux.oracle.com/errata/ELSA-2024-11250.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-10041", + "https://www.cve.org/CVERecord?id=CVE-2024-10041" + ], + "PublishedDate": "2024-10-23T14:15:03.97Z", + "LastModifiedDate": "2024-12-18T10:15:05.85Z" + }, + { + "VulnerabilityID": "CVE-2024-22365", + "PkgID": "libpam-modules-bin@1.5.2-6+deb12u1", + "PkgName": "libpam-modules-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-modules-bin@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "6e01953a38b979ef" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-22365", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: allowing unprivileged user to block another user namespace", + "Description": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "amazon": 1, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/01/18/3", + "https://access.redhat.com/errata/RHSA-2024:2438", + "https://access.redhat.com/security/cve/CVE-2024-22365", + "https://bugzilla.redhat.com/2257722", + "https://bugzilla.redhat.com/show_bug.cgi?id=2257722", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365", + "https://errata.almalinux.org/9/ALSA-2024-2438.html", + "https://errata.rockylinux.org/RLSA-2024:3163", + "https://github.com/linux-pam/linux-pam", + "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb", + "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0", + "https://linux.oracle.com/cve/CVE-2024-22365.html", + "https://linux.oracle.com/errata/ELSA-2024-3163.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-22365", + "https://ubuntu.com/security/notices/USN-6588-1", + "https://ubuntu.com/security/notices/USN-6588-2", + "https://www.cve.org/CVERecord?id=CVE-2024-22365", + "https://www.openwall.com/lists/oss-security/2024/01/18/3" + ], + "PublishedDate": "2024-02-06T08:15:52.203Z", + "LastModifiedDate": "2024-11-21T08:56:07.76Z" + }, + { + "VulnerabilityID": "CVE-2024-10041", + "PkgID": "libpam-runtime@1.5.2-6+deb12u1", + "PkgName": "libpam-runtime", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-runtime@1.5.2-6%2Bdeb12u1?arch=all\u0026distro=debian-12.10", + "UID": "a4ba3bc9ed7e203b" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-10041", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: libpam: Libpam vulnerable to read hashed password", + "Description": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-922" + ], + "VendorSeverity": { + "alma": 2, + "azure": 2, + "cbl-mariner": 2, + "oracle-oval": 2, + "redhat": 2, + "rocky": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:10379", + "https://access.redhat.com/errata/RHSA-2024:11250", + "https://access.redhat.com/errata/RHSA-2024:9941", + "https://access.redhat.com/security/cve/CVE-2024-10041", + "https://bugzilla.redhat.com/2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2324291", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963", + "https://errata.almalinux.org/9/ALSA-2024-11250.html", + "https://errata.rockylinux.org/RLSA-2024:10379", + "https://linux.oracle.com/cve/CVE-2024-10041.html", + "https://linux.oracle.com/errata/ELSA-2024-11250.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-10041", + "https://www.cve.org/CVERecord?id=CVE-2024-10041" + ], + "PublishedDate": "2024-10-23T14:15:03.97Z", + "LastModifiedDate": "2024-12-18T10:15:05.85Z" + }, + { + "VulnerabilityID": "CVE-2024-22365", + "PkgID": "libpam-runtime@1.5.2-6+deb12u1", + "PkgName": "libpam-runtime", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam-runtime@1.5.2-6%2Bdeb12u1?arch=all\u0026distro=debian-12.10", + "UID": "a4ba3bc9ed7e203b" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-22365", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: allowing unprivileged user to block another user namespace", + "Description": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "amazon": 1, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/01/18/3", + "https://access.redhat.com/errata/RHSA-2024:2438", + "https://access.redhat.com/security/cve/CVE-2024-22365", + "https://bugzilla.redhat.com/2257722", + "https://bugzilla.redhat.com/show_bug.cgi?id=2257722", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365", + "https://errata.almalinux.org/9/ALSA-2024-2438.html", + "https://errata.rockylinux.org/RLSA-2024:3163", + "https://github.com/linux-pam/linux-pam", + "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb", + "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0", + "https://linux.oracle.com/cve/CVE-2024-22365.html", + "https://linux.oracle.com/errata/ELSA-2024-3163.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-22365", + "https://ubuntu.com/security/notices/USN-6588-1", + "https://ubuntu.com/security/notices/USN-6588-2", + "https://www.cve.org/CVERecord?id=CVE-2024-22365", + "https://www.openwall.com/lists/oss-security/2024/01/18/3" + ], + "PublishedDate": "2024-02-06T08:15:52.203Z", + "LastModifiedDate": "2024-11-21T08:56:07.76Z" + }, + { + "VulnerabilityID": "CVE-2024-10041", + "PkgID": "libpam0g@1.5.2-6+deb12u1", + "PkgName": "libpam0g", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam0g@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "ceb03f98e63e7ec7" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-10041", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: libpam: Libpam vulnerable to read hashed password", + "Description": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-922" + ], + "VendorSeverity": { + "alma": 2, + "azure": 2, + "cbl-mariner": 2, + "oracle-oval": 2, + "redhat": 2, + "rocky": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:10379", + "https://access.redhat.com/errata/RHSA-2024:11250", + "https://access.redhat.com/errata/RHSA-2024:9941", + "https://access.redhat.com/security/cve/CVE-2024-10041", + "https://bugzilla.redhat.com/2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2319212", + "https://bugzilla.redhat.com/show_bug.cgi?id=2324291", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963", + "https://errata.almalinux.org/9/ALSA-2024-11250.html", + "https://errata.rockylinux.org/RLSA-2024:10379", + "https://linux.oracle.com/cve/CVE-2024-10041.html", + "https://linux.oracle.com/errata/ELSA-2024-11250.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-10041", + "https://www.cve.org/CVERecord?id=CVE-2024-10041" + ], + "PublishedDate": "2024-10-23T14:15:03.97Z", + "LastModifiedDate": "2024-12-18T10:15:05.85Z" + }, + { + "VulnerabilityID": "CVE-2024-22365", + "PkgID": "libpam0g@1.5.2-6+deb12u1", + "PkgName": "libpam0g", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpam0g@1.5.2-6%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "ceb03f98e63e7ec7" + }, + "InstalledVersion": "1.5.2-6+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-22365", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "pam: allowing unprivileged user to block another user namespace", + "Description": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", + "Severity": "MEDIUM", + "VendorSeverity": { + "alma": 2, + "amazon": 1, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/01/18/3", + "https://access.redhat.com/errata/RHSA-2024:2438", + "https://access.redhat.com/security/cve/CVE-2024-22365", + "https://bugzilla.redhat.com/2257722", + "https://bugzilla.redhat.com/show_bug.cgi?id=2257722", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365", + "https://errata.almalinux.org/9/ALSA-2024-2438.html", + "https://errata.rockylinux.org/RLSA-2024:3163", + "https://github.com/linux-pam/linux-pam", + "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb", + "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0", + "https://linux.oracle.com/cve/CVE-2024-22365.html", + "https://linux.oracle.com/errata/ELSA-2024-3163.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-22365", + "https://ubuntu.com/security/notices/USN-6588-1", + "https://ubuntu.com/security/notices/USN-6588-2", + "https://www.cve.org/CVERecord?id=CVE-2024-22365", + "https://www.openwall.com/lists/oss-security/2024/01/18/3" + ], + "PublishedDate": "2024-02-06T08:15:52.203Z", + "LastModifiedDate": "2024-11-21T08:56:07.76Z" + }, + { + "VulnerabilityID": "CVE-2021-4214", + "PkgID": "libpng16-16@1.6.39-2", + "PkgName": "libpng16-16", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libpng16-16@1.6.39-2?arch=amd64\u0026distro=debian-12.10", + "UID": "6c4f8e571f246e7" + }, + "InstalledVersion": "1.6.39-2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-4214", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libpng: hardcoded value leads to heap-overflow", + "Description": "A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.", + "Severity": "LOW", + "CweIDs": [ + "CWE-120", + "CWE-787" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2021-4214", + "https://bugzilla.redhat.com/show_bug.cgi?id=2043393", + "https://github.com/glennrp/libpng/issues/302", + "https://nvd.nist.gov/vuln/detail/CVE-2021-4214", + "https://security-tracker.debian.org/tracker/CVE-2021-4214", + "https://security.netapp.com/advisory/ntap-20221020-0001/", + "https://www.cve.org/CVERecord?id=CVE-2021-4214" + ], + "PublishedDate": "2022-08-24T16:15:10.037Z", + "LastModifiedDate": "2024-11-21T06:37:10.063Z" + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "libsmartcols1@2.38.1-5+deb12u3", + "PkgName": "libsmartcols1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libsmartcols1@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "ccde01db134296f8" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2024-13176", + "PkgID": "libssl3@3.0.15-1~deb12u1", + "PkgName": "libssl3", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libssl3@3.0.15-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "da582553a7427034" + }, + "InstalledVersion": "3.0.15-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-13176", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openssl: Timing side-channel in ECDSA signature computation", + "Description": "Issue summary: A timing side-channel which could potentially allow recovering\nthe private key exists in the ECDSA signature computation.\n\nImpact summary: A timing side-channel in ECDSA signature computations\ncould allow recovering the private key by an attacker. However, measuring\nthe timing would require either local access to the signing application or\na very fast network connection with low latency.\n\nThere is a timing signal of around 300 nanoseconds when the top word of\nthe inverted ECDSA nonce value is zero. This can happen with significant\nprobability only for some of the supported elliptic curves. In particular\nthe NIST P-521 curve is affected. To be able to measure this leak, the attacker\nprocess must either be located in the same physical computer or must\nhave a very fast network connection with low latency. For that reason\nthe severity of this vulnerability is Low.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-385" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2025/01/20/2", + "https://access.redhat.com/security/cve/CVE-2024-13176", + "https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844", + "https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467", + "https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902", + "https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65", + "https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f", + "https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded", + "https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86", + "https://nvd.nist.gov/vuln/detail/CVE-2024-13176", + "https://openssl-library.org/news/secadv/20250120.txt", + "https://security.netapp.com/advisory/ntap-20250124-0005/", + "https://security.netapp.com/advisory/ntap-20250418-0010/", + "https://ubuntu.com/security/notices/USN-7264-1", + "https://ubuntu.com/security/notices/USN-7278-1", + "https://www.cve.org/CVERecord?id=CVE-2024-13176", + "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL" + ], + "PublishedDate": "2025-01-20T14:15:26.247Z", + "LastModifiedDate": "2025-04-19T01:15:43.007Z" + }, + { + "VulnerabilityID": "CVE-2022-27943", + "PkgID": "libstdc++6@12.2.0-14", + "PkgName": "libstdc++6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libstdc%2B%2B6@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "d98f13167e17dd53" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-27943", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const", + "Description": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", + "Severity": "LOW", + "CweIDs": [ + "CWE-674" + ], + "VendorSeverity": { + "amazon": 1, + "debian": 1, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-27943", + "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79", + "https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead", + "https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/", + "https://nvd.nist.gov/vuln/detail/CVE-2022-27943", + "https://sourceware.org/bugzilla/show_bug.cgi?id=28995", + "https://www.cve.org/CVERecord?id=CVE-2022-27943" + ], + "PublishedDate": "2022-03-26T13:15:07.9Z", + "LastModifiedDate": "2024-11-21T06:56:31.04Z" + }, + { + "VulnerabilityID": "CVE-2023-4039", + "PkgID": "libstdc++6@12.2.0-14", + "PkgName": "libstdc++6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libstdc%2B%2B6@12.2.0-14?arch=amd64\u0026distro=debian-12.10", + "UID": "d98f13167e17dd53" + }, + "InstalledVersion": "12.2.0-14", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-4039", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64", + "Description": "**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.", + "Severity": "LOW", + "CweIDs": [ + "CWE-693" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "oracle-oval": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 4.8 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-4039", + "https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64", + "https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt", + "https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html", + "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf", + "https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org", + "https://linux.oracle.com/cve/CVE-2023-4039.html", + "https://linux.oracle.com/errata/ELSA-2023-28766.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-4039", + "https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html", + "https://www.cve.org/CVERecord?id=CVE-2023-4039" + ], + "PublishedDate": "2023-09-13T09:15:15.69Z", + "LastModifiedDate": "2025-02-13T17:17:14.717Z" + }, + { + "VulnerabilityID": "CVE-2013-4392", + "PkgID": "libsystemd0@252.36-1~deb12u1", + "PkgName": "libsystemd0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "9dd113709a07c85c" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts", + "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.", + "Severity": "LOW", + "CweIDs": [ + "CWE-59" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 1, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "V2Score": 3.3 + }, + "redhat": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "V2Score": 3.3 + } + }, + "References": [ + "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357", + "http://www.openwall.com/lists/oss-security/2013/10/01/9", + "https://access.redhat.com/security/cve/CVE-2013-4392", + "https://bugzilla.redhat.com/show_bug.cgi?id=859060", + "https://nvd.nist.gov/vuln/detail/CVE-2013-4392", + "https://www.cve.org/CVERecord?id=CVE-2013-4392" + ], + "PublishedDate": "2013-10-28T22:55:03.773Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2023-31437", + "PkgID": "libsystemd0@252.36-1~deb12u1", + "PkgName": "libsystemd0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "9dd113709a07c85c" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...", + "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.657Z", + "LastModifiedDate": "2025-01-03T20:15:26.457Z" + }, + { + "VulnerabilityID": "CVE-2023-31438", + "PkgID": "libsystemd0@252.36-1~deb12u1", + "PkgName": "libsystemd0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "9dd113709a07c85c" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...", + "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/pull/28886", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.707Z", + "LastModifiedDate": "2024-11-21T08:01:51.953Z" + }, + { + "VulnerabilityID": "CVE-2023-31439", + "PkgID": "libsystemd0@252.36-1~deb12u1", + "PkgName": "libsystemd0", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libsystemd0@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "9dd113709a07c85c" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...", + "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "amazon": 1, + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/pull/28885", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.753Z", + "LastModifiedDate": "2024-11-21T08:01:52.097Z" + }, + { + "VulnerabilityID": "CVE-2023-52355", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-52355", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM", + "Description": "An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-787" + ], + "VendorSeverity": { + "nvd": 3, + "photon": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-52355", + "https://bugzilla.redhat.com/show_bug.cgi?id=2251326", + "https://gitlab.com/libtiff/libtiff/-/issues/621", + "https://nvd.nist.gov/vuln/detail/CVE-2023-52355", + "https://www.cve.org/CVERecord?id=CVE-2023-52355" + ], + "PublishedDate": "2024-01-25T20:15:38.353Z", + "LastModifiedDate": "2024-11-21T08:39:38.02Z" + }, + { + "VulnerabilityID": "CVE-2023-6277", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-6277", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: Out-of-memory in TIFFOpen via a craft file", + "Description": "An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-400" + ], + "VendorSeverity": { + "amazon": 3, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "photon": 3, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "http://seclists.org/fulldisclosure/2024/Jul/16", + "http://seclists.org/fulldisclosure/2024/Jul/17", + "http://seclists.org/fulldisclosure/2024/Jul/18", + "http://seclists.org/fulldisclosure/2024/Jul/19", + "http://seclists.org/fulldisclosure/2024/Jul/20", + "http://seclists.org/fulldisclosure/2024/Jul/21", + "http://seclists.org/fulldisclosure/2024/Jul/22", + "http://seclists.org/fulldisclosure/2024/Jul/23", + "https://access.redhat.com/security/cve/CVE-2023-6277", + "https://bugzilla.redhat.com/show_bug.cgi?id=2251311", + "https://gitlab.com/libtiff/libtiff/-/issues/614", + "https://gitlab.com/libtiff/libtiff/-/merge_requests/545", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/", + "https://nvd.nist.gov/vuln/detail/CVE-2023-6277", + "https://security.netapp.com/advisory/ntap-20240119-0002/", + "https://support.apple.com/kb/HT214116", + "https://support.apple.com/kb/HT214117", + "https://support.apple.com/kb/HT214118", + "https://support.apple.com/kb/HT214119", + "https://support.apple.com/kb/HT214120", + "https://support.apple.com/kb/HT214122", + "https://support.apple.com/kb/HT214123", + "https://support.apple.com/kb/HT214124", + "https://ubuntu.com/security/notices/USN-6644-1", + "https://ubuntu.com/security/notices/USN-6644-2", + "https://www.cve.org/CVERecord?id=CVE-2023-6277" + ], + "PublishedDate": "2023-11-24T19:15:07.643Z", + "LastModifiedDate": "2024-11-21T08:43:31.253Z" + }, + { + "VulnerabilityID": "CVE-2017-16232", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-16232", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c", + "Description": "LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue", + "Severity": "LOW", + "CweIDs": [ + "CWE-772" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + } + }, + "References": [ + "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html", + "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html", + "http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html", + "http://seclists.org/fulldisclosure/2018/Dec/32", + "http://seclists.org/fulldisclosure/2018/Dec/47", + "http://www.openwall.com/lists/oss-security/2017/11/01/11", + "http://www.openwall.com/lists/oss-security/2017/11/01/3", + "http://www.openwall.com/lists/oss-security/2017/11/01/7", + "http://www.openwall.com/lists/oss-security/2017/11/01/8", + "http://www.securityfocus.com/bid/101696", + "https://access.redhat.com/security/cve/CVE-2017-16232", + "https://nvd.nist.gov/vuln/detail/CVE-2017-16232", + "https://www.cve.org/CVERecord?id=CVE-2017-16232" + ], + "PublishedDate": "2019-03-21T15:59:56.53Z", + "LastModifiedDate": "2024-11-21T03:16:05.423Z" + }, + { + "VulnerabilityID": "CVE-2017-17973", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-17973", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc", + "Description": "In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue", + "Severity": "LOW", + "CweIDs": [ + "CWE-416" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "photon": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V2Score": 6.8, + "V3Score": 8.8 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "http://bugzilla.maptools.org/show_bug.cgi?id=2769", + "http://www.securityfocus.com/bid/102331", + "https://access.redhat.com/security/cve/CVE-2017-17973", + "https://bugzilla.novell.com/show_bug.cgi?id=1074318", + "https://bugzilla.redhat.com/show_bug.cgi?id=1530912", + "https://nvd.nist.gov/vuln/detail/CVE-2017-17973", + "https://www.cve.org/CVERecord?id=CVE-2017-17973" + ], + "PublishedDate": "2017-12-29T21:29:00.19Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2017-5563", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-5563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c", + "Description": "LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.", + "Severity": "LOW", + "CweIDs": [ + "CWE-125" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V2Score": 6.8, + "V3Score": 8.8 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "V3Score": 5.3 + } + }, + "References": [ + "http://bugzilla.maptools.org/show_bug.cgi?id=2664", + "http://www.securityfocus.com/bid/95705", + "https://access.redhat.com/security/cve/CVE-2017-5563", + "https://nvd.nist.gov/vuln/detail/CVE-2017-5563", + "https://security.gentoo.org/glsa/201709-27", + "https://ubuntu.com/security/notices/USN-3606-1", + "https://usn.ubuntu.com/3606-1/", + "https://www.cve.org/CVERecord?id=CVE-2017-5563" + ], + "PublishedDate": "2017-01-23T07:59:00.69Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2017-9117", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-9117", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: Heap-based buffer over-read in bmp2tiff", + "Description": "In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).", + "Severity": "LOW", + "CweIDs": [ + "CWE-125" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 4, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V2Score": 7.5, + "V3Score": 9.8 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + } + }, + "References": [ + "http://bugzilla.maptools.org/show_bug.cgi?id=2690", + "http://www.securityfocus.com/bid/98581", + "https://access.redhat.com/security/cve/CVE-2017-9117", + "https://gitlab.com/libtiff/libtiff/-/issues/89", + "https://nvd.nist.gov/vuln/detail/CVE-2017-9117", + "https://ubuntu.com/security/notices/USN-3606-1", + "https://usn.ubuntu.com/3606-1/", + "https://www.cve.org/CVERecord?id=CVE-2017-9117" + ], + "PublishedDate": "2017-05-21T19:29:00.187Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2018-10126", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-10126", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c", + "Description": "ijg-libjpeg before 9d, as used in tiff2pdf (from LibTIFF) and other products, does not check for a NULL pointer at a certain place in jpeg_fdct_16x16 in jfdctint.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-476" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + } + }, + "References": [ + "http://bugzilla.maptools.org/show_bug.cgi?id=2786", + "https://access.redhat.com/security/cve/CVE-2018-10126", + "https://gitlab.com/libtiff/libtiff/-/issues/128", + "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2018-10126", + "https://www.cve.org/CVERecord?id=CVE-2018-10126" + ], + "PublishedDate": "2018-04-21T21:29:00.29Z", + "LastModifiedDate": "2024-11-21T03:40:53.537Z" + }, + { + "VulnerabilityID": "CVE-2022-1210", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-1210", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "tiff: Malicious file leads to a denial of service in TIFF File Handler", + "Description": "A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.", + "Severity": "LOW", + "CweIDs": [ + "CWE-400", + "CWE-404" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V2Score": 4.3, + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 4.3 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-1210", + "https://gitlab.com/libtiff/libtiff/-/issues/402", + "https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff", + "https://nvd.nist.gov/vuln/detail/CVE-2022-1210", + "https://security.gentoo.org/glsa/202210-10", + "https://security.netapp.com/advisory/ntap-20220513-0005/", + "https://vuldb.com/?id.196363", + "https://www.cve.org/CVERecord?id=CVE-2022-1210" + ], + "PublishedDate": "2022-04-03T09:15:09.033Z", + "LastModifiedDate": "2024-11-21T06:40:15.74Z" + }, + { + "VulnerabilityID": "CVE-2023-1916", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-1916", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c", + "Description": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.", + "Severity": "LOW", + "CweIDs": [ + "CWE-125" + ], + "VendorSeverity": { + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", + "V3Score": 6.1 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", + "V3Score": 6.1 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-1916", + "https://gitlab.com/libtiff/libtiff/-/issues/536", + "https://gitlab.com/libtiff/libtiff/-/issues/536%2C", + "https://gitlab.com/libtiff/libtiff/-/issues/536,", + "https://gitlab.com/libtiff/libtiff/-/issues/537", + "https://nvd.nist.gov/vuln/detail/CVE-2023-1916", + "https://support.apple.com/kb/HT213844", + "https://ubuntu.com/security/notices/USN-6428-1", + "https://www.cve.org/CVERecord?id=CVE-2023-1916" + ], + "PublishedDate": "2023-04-10T22:15:09.223Z", + "LastModifiedDate": "2024-11-21T07:40:08.09Z" + }, + { + "VulnerabilityID": "CVE-2023-3164", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-3164", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: heap-buffer-overflow in extractImageSection()", + "Description": "A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.", + "Severity": "LOW", + "CweIDs": [ + "CWE-120", + "CWE-787" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-3164", + "https://bugzilla.redhat.com/show_bug.cgi?id=2213531", + "https://gitlab.com/libtiff/libtiff/-/issues/542", + "https://gitlab.com/libtiff/libtiff/-/merge_requests/595", + "https://nvd.nist.gov/vuln/detail/CVE-2023-3164", + "https://ubuntu.com/security/notices/USN-6827-1", + "https://www.cve.org/CVERecord?id=CVE-2023-3164" + ], + "PublishedDate": "2023-11-02T12:15:09.543Z", + "LastModifiedDate": "2024-11-21T08:16:36.097Z" + }, + { + "VulnerabilityID": "CVE-2023-6228", + "PkgID": "libtiff6@4.5.0-6+deb12u2", + "PkgName": "libtiff6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtiff6@4.5.0-6%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "c97a98b3b324d944" + }, + "InstalledVersion": "4.5.0-6+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-6228", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c", + "Description": "An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.", + "Severity": "LOW", + "CweIDs": [ + "CWE-787" + ], + "VendorSeverity": { + "alma": 2, + "cbl-mariner": 1, + "debian": 1, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 1, + "rocky": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 3.3 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:2289", + "https://access.redhat.com/errata/RHSA-2024:5079", + "https://access.redhat.com/security/cve/CVE-2023-6228", + "https://bugzilla.redhat.com/2215865", + "https://bugzilla.redhat.com/2234970", + "https://bugzilla.redhat.com/2235264", + "https://bugzilla.redhat.com/2235265", + "https://bugzilla.redhat.com/2240995", + "https://bugzilla.redhat.com/show_bug.cgi?id=1614051", + "https://bugzilla.redhat.com/show_bug.cgi?id=2218744", + "https://bugzilla.redhat.com/show_bug.cgi?id=2240995", + "https://bugzilla.redhat.com/show_bug.cgi?id=2251344", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228", + "https://errata.almalinux.org/9/ALSA-2024-2289.html", + "https://errata.rockylinux.org/RLSA-2024:5079", + "https://linux.oracle.com/cve/CVE-2023-6228.html", + "https://linux.oracle.com/errata/ELSA-2024-5079.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-6228", + "https://ubuntu.com/security/notices/USN-6644-1", + "https://ubuntu.com/security/notices/USN-6644-2", + "https://www.cve.org/CVERecord?id=CVE-2023-6228" + ], + "PublishedDate": "2023-12-18T14:15:11.84Z", + "LastModifiedDate": "2024-11-21T08:43:24.483Z" + }, + { + "VulnerabilityID": "CVE-2023-50495", + "PkgID": "libtinfo6@6.4-4", + "PkgName": "libtinfo6", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libtinfo6@6.4-4?arch=amd64\u0026distro=debian-12.10", + "UID": "c798ccd544602ef8" + }, + "InstalledVersion": "6.4-4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-50495", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "ncurses: segmentation fault via _nc_wrap_entry()", + "Description": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", + "Severity": "MEDIUM", + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-50495", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-50495", + "https://security.netapp.com/advisory/ntap-20240119-0008/", + "https://ubuntu.com/security/notices/USN-6684-1", + "https://www.cve.org/CVERecord?id=CVE-2023-50495" + ], + "PublishedDate": "2023-12-12T15:15:07.867Z", + "LastModifiedDate": "2024-11-21T08:37:04.243Z" + }, + { + "VulnerabilityID": "CVE-2013-4392", + "PkgID": "libudev1@252.36-1~deb12u1", + "PkgName": "libudev1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "73f955f96c796a94" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts", + "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.", + "Severity": "LOW", + "CweIDs": [ + "CWE-59" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 1, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "V2Score": 3.3 + }, + "redhat": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "V2Score": 3.3 + } + }, + "References": [ + "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357", + "http://www.openwall.com/lists/oss-security/2013/10/01/9", + "https://access.redhat.com/security/cve/CVE-2013-4392", + "https://bugzilla.redhat.com/show_bug.cgi?id=859060", + "https://nvd.nist.gov/vuln/detail/CVE-2013-4392", + "https://www.cve.org/CVERecord?id=CVE-2013-4392" + ], + "PublishedDate": "2013-10-28T22:55:03.773Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2023-31437", + "PkgID": "libudev1@252.36-1~deb12u1", + "PkgName": "libudev1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "73f955f96c796a94" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...", + "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.657Z", + "LastModifiedDate": "2025-01-03T20:15:26.457Z" + }, + { + "VulnerabilityID": "CVE-2023-31438", + "PkgID": "libudev1@252.36-1~deb12u1", + "PkgName": "libudev1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "73f955f96c796a94" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...", + "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/pull/28886", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.707Z", + "LastModifiedDate": "2024-11-21T08:01:51.953Z" + }, + { + "VulnerabilityID": "CVE-2023-31439", + "PkgID": "libudev1@252.36-1~deb12u1", + "PkgName": "libudev1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libudev1@252.36-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "73f955f96c796a94" + }, + "InstalledVersion": "252.36-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...", + "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"", + "Severity": "LOW", + "CweIDs": [ + "CWE-354" + ], + "VendorSeverity": { + "amazon": 1, + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 5.3 + } + }, + "References": [ + "https://github.com/kastel-security/Journald", + "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf", + "https://github.com/systemd/systemd/pull/28885", + "https://github.com/systemd/systemd/releases" + ], + "PublishedDate": "2023-06-13T17:15:14.753Z", + "LastModifiedDate": "2024-11-21T08:01:52.097Z" + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "libuuid1@2.38.1-5+deb12u3", + "PkgName": "libuuid1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libuuid1@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "9ad01d49bd044281" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2024-25062", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-25062", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: use-after-free in XMLReader", + "Description": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-416" + ], + "VendorSeverity": { + "alma": 2, + "azure": 3, + "cbl-mariner": 3, + "nvd": 3, + "oracle-oval": 2, + "photon": 3, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2024:2679", + "https://access.redhat.com/security/cve/CVE-2024-25062", + "https://bugzilla.redhat.com/2262726", + "https://bugzilla.redhat.com/show_bug.cgi?id=2262726", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062", + "https://errata.almalinux.org/9/ALSA-2024-2679.html", + "https://errata.rockylinux.org/RLSA-2024:2679", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/604", + "https://gitlab.gnome.org/GNOME/libxml2/-/tags", + "https://linux.oracle.com/cve/CVE-2024-25062.html", + "https://linux.oracle.com/errata/ELSA-2024-3626.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-25062", + "https://ubuntu.com/security/notices/USN-6658-1", + "https://ubuntu.com/security/notices/USN-6658-2", + "https://www.cve.org/CVERecord?id=CVE-2024-25062" + ], + "PublishedDate": "2024-02-04T16:15:45.12Z", + "LastModifiedDate": "2024-11-21T09:00:10.427Z" + }, + { + "VulnerabilityID": "CVE-2024-56171", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56171", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: Use-After-Free in libxml2", + "Description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-416" + ], + "VendorSeverity": { + "alma": 3, + "amazon": 3, + "azure": 3, + "cbl-mariner": 3, + "oracle-oval": 3, + "photon": 3, + "redhat": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "V3Score": 8.1 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2679", + "https://access.redhat.com/security/cve/CVE-2024-56171", + "https://bugzilla.redhat.com/2346416", + "https://bugzilla.redhat.com/2346421", + "https://errata.almalinux.org/9/ALSA-2025-2679.html", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828", + "https://linux.oracle.com/cve/CVE-2024-56171.html", + "https://linux.oracle.com/errata/ELSA-2025-2686.html", + "https://nvd.nist.gov/vuln/detail/CVE-2024-56171", + "https://security.netapp.com/advisory/ntap-20250328-0010/", + "https://ubuntu.com/security/notices/USN-7302-1", + "https://www.cve.org/CVERecord?id=CVE-2024-56171", + "https://www.openwall.com/lists/oss-security/2025/02/18/2" + ], + "PublishedDate": "2025-02-18T22:15:12.797Z", + "LastModifiedDate": "2025-03-28T15:15:46.003Z" + }, + { + "VulnerabilityID": "CVE-2025-24928", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-24928", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2", + "Description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-121" + ], + "VendorSeverity": { + "alma": 3, + "amazon": 3, + "azure": 3, + "cbl-mariner": 3, + "oracle-oval": 3, + "photon": 3, + "redhat": 3, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "V3Score": 7.8 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:2679", + "https://access.redhat.com/security/cve/CVE-2025-24928", + "https://bugzilla.redhat.com/2346416", + "https://bugzilla.redhat.com/2346421", + "https://errata.almalinux.org/9/ALSA-2025-2679.html", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847", + "https://issues.oss-fuzz.com/issues/392687022", + "https://linux.oracle.com/cve/CVE-2025-24928.html", + "https://linux.oracle.com/errata/ELSA-2025-2686.html", + "https://nvd.nist.gov/vuln/detail/CVE-2025-24928", + "https://security.netapp.com/advisory/ntap-20250321-0006/", + "https://ubuntu.com/security/notices/USN-7302-1", + "https://www.cve.org/CVERecord?id=CVE-2025-24928", + "https://www.openwall.com/lists/oss-security/2025/02/18/2" + ], + "PublishedDate": "2025-02-18T23:15:10.25Z", + "LastModifiedDate": "2025-03-21T18:15:34.86Z" + }, + { + "VulnerabilityID": "CVE-2025-27113", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-27113", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch", + "Description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-476" + ], + "VendorSeverity": { + "amazon": 3, + "azure": 1, + "cbl-mariner": 1, + "nvd": 3, + "photon": 3, + "redhat": 1, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "V3Score": 3.1 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-27113", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/861", + "https://nvd.nist.gov/vuln/detail/CVE-2025-27113", + "https://security.netapp.com/advisory/ntap-20250306-0004/", + "https://ubuntu.com/security/notices/USN-7302-1", + "https://www.cve.org/CVERecord?id=CVE-2025-27113", + "https://www.openwall.com/lists/oss-security/2025/02/18/2" + ], + "PublishedDate": "2025-02-18T23:15:10.96Z", + "LastModifiedDate": "2025-03-07T01:15:12.823Z" + }, + { + "VulnerabilityID": "CVE-2025-32414", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-32414", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: Out-of-Bounds Read in libxml2", + "Description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-393", + "CWE-252" + ], + "VendorSeverity": { + "nvd": 3, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "V3Score": 5.6 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-32414", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889", + "https://nvd.nist.gov/vuln/detail/CVE-2025-32414", + "https://ubuntu.com/security/notices/USN-7467-1", + "https://ubuntu.com/security/notices/USN-7467-2", + "https://www.cve.org/CVERecord?id=CVE-2025-32414" + ], + "PublishedDate": "2025-04-08T03:15:15.94Z", + "LastModifiedDate": "2025-04-23T19:09:35.517Z" + }, + { + "VulnerabilityID": "CVE-2025-32415", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-32415", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables", + "Description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-1284", + "CWE-125" + ], + "VendorSeverity": { + "nvd": 3, + "photon": 1, + "redhat": 1, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 2.9 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2025-32415", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890", + "https://nvd.nist.gov/vuln/detail/CVE-2025-32415", + "https://ubuntu.com/security/notices/USN-7467-1", + "https://ubuntu.com/security/notices/USN-7467-2", + "https://www.cve.org/CVERecord?id=CVE-2025-32415" + ], + "PublishedDate": "2025-04-17T17:15:33.733Z", + "LastModifiedDate": "2025-04-23T18:17:52.053Z" + }, + { + "VulnerabilityID": "CVE-2022-49043", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-49043", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml: use-after-free in xmlXIncludeAddNode", + "Description": "xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-416" + ], + "VendorSeverity": { + "alma": 3, + "amazon": 3, + "cbl-mariner": 4, + "oracle-oval": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2025:1350", + "https://access.redhat.com/security/cve/CVE-2022-49043", + "https://bugzilla.redhat.com/2342118", + "https://bugzilla.redhat.com/show_bug.cgi?id=2342118", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043", + "https://errata.almalinux.org/9/ALSA-2025-1350.html", + "https://errata.rockylinux.org/RLSA-2025:1517", + "https://github.com/php/php-src/issues/17467", + "https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b", + "https://linux.oracle.com/cve/CVE-2022-49043.html", + "https://linux.oracle.com/errata/ELSA-2025-1517.html", + "https://nvd.nist.gov/vuln/detail/CVE-2022-49043", + "https://ubuntu.com/security/notices/USN-7240-1", + "https://ubuntu.com/security/notices/USN-7302-1", + "https://www.cve.org/CVERecord?id=CVE-2022-49043" + ], + "PublishedDate": "2025-01-26T06:15:21Z", + "LastModifiedDate": "2025-01-26T06:15:21Z" + }, + { + "VulnerabilityID": "CVE-2023-39615", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-39615", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: crafted xml can cause global buffer overflow", + "Description": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-119" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2023:7747", + "https://access.redhat.com/security/cve/CVE-2023-39615", + "https://bugzilla.redhat.com/2235864", + "https://errata.almalinux.org/9/ALSA-2023-7747.html", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/535", + "https://linux.oracle.com/cve/CVE-2023-39615.html", + "https://linux.oracle.com/errata/ELSA-2024-0119.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-39615", + "https://www.cve.org/CVERecord?id=CVE-2023-39615" + ], + "PublishedDate": "2023-08-29T17:15:12.527Z", + "LastModifiedDate": "2024-11-21T08:15:42.583Z" + }, + { + "VulnerabilityID": "CVE-2023-45322", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-45322", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: use-after-free in xmlUnlinkNode() in tree.c", + "Description": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is \"I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail.\"", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-416" + ], + "VendorSeverity": { + "amazon": 3, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "photon": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 5.9 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2023/10/06/5", + "https://access.redhat.com/security/cve/CVE-2023-45322", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/344", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/583", + "https://nvd.nist.gov/vuln/detail/CVE-2023-45322", + "https://www.cve.org/CVERecord?id=CVE-2023-45322" + ], + "PublishedDate": "2023-10-06T22:15:11.66Z", + "LastModifiedDate": "2024-11-21T08:26:44.78Z" + }, + { + "VulnerabilityID": "CVE-2024-34459", + "PkgID": "libxml2@2.9.14+dfsg-1.3~deb12u1", + "PkgName": "libxml2", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "1011f6e78c566886" + }, + "InstalledVersion": "2.9.14+dfsg-1.3~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-34459", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c", + "Description": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.", + "Severity": "LOW", + "CweIDs": [ + "CWE-122" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 3, + "debian": 1, + "photon": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2024-34459", + "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720", + "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8", + "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/", + "https://nvd.nist.gov/vuln/detail/CVE-2024-34459", + "https://ubuntu.com/security/notices/USN-7240-1", + "https://ubuntu.com/security/notices/USN-7302-1", + "https://www.cve.org/CVERecord?id=CVE-2024-34459" + ], + "PublishedDate": "2024-05-14T15:39:11.917Z", + "LastModifiedDate": "2024-11-21T09:18:43.59Z" + }, + { + "VulnerabilityID": "CVE-2015-9019", + "PkgID": "libxslt1.1@1.1.35-1+deb12u1", + "PkgName": "libxslt1.1", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/libxslt1.1@1.1.35-1%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "4f2e71f8a62b1771" + }, + "InstalledVersion": "1.1.35-1+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2015-9019", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "libxslt: math.random() in xslt uses unseeded randomness", + "Description": "In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.", + "Severity": "LOW", + "CweIDs": [ + "CWE-330" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "V2Score": 5, + "V3Score": 5.3 + }, + "redhat": { + "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 4 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2015-9019", + "https://bugzilla.gnome.org/show_bug.cgi?id=758400", + "https://bugzilla.suse.com/show_bug.cgi?id=934119", + "https://nvd.nist.gov/vuln/detail/CVE-2015-9019", + "https://www.cve.org/CVERecord?id=CVE-2015-9019" + ], + "PublishedDate": "2017-04-05T21:59:00.147Z", + "LastModifiedDate": "2025-04-20T01:37:25.86Z" + }, + { + "VulnerabilityID": "CVE-2023-4641", + "PkgID": "login@1:4.13+dfsg1-1+b1", + "PkgName": "login", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "9c383ff5c6ed1c81" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-4641", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow-utils: possible password leak during passwd(1) change", + "Description": "A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-303", + "CWE-287" + ], + "VendorSeverity": { + "alma": 1, + "amazon": 1, + "nvd": 2, + "oracle-oval": 1, + "photon": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2023:6632", + "https://access.redhat.com/errata/RHSA-2023:7112", + "https://access.redhat.com/errata/RHSA-2024:0417", + "https://access.redhat.com/errata/RHSA-2024:2577", + "https://access.redhat.com/security/cve/CVE-2023-4641", + "https://bugzilla.redhat.com/2215945", + "https://bugzilla.redhat.com/show_bug.cgi?id=2215945", + "https://errata.almalinux.org/9/ALSA-2023-6632.html", + "https://linux.oracle.com/cve/CVE-2023-4641.html", + "https://linux.oracle.com/errata/ELSA-2023-7112.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-4641", + "https://ubuntu.com/security/notices/USN-6640-1", + "https://www.cve.org/CVERecord?id=CVE-2023-4641" + ], + "PublishedDate": "2023-12-27T16:15:13.363Z", + "LastModifiedDate": "2024-11-21T08:35:35.837Z" + }, + { + "VulnerabilityID": "CVE-2007-5686", + "PkgID": "login@1:4.13+dfsg1-1+b1", + "PkgName": "login", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "9c383ff5c6ed1c81" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...", + "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.", + "Severity": "LOW", + "CweIDs": [ + "CWE-264" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "V2Score": 4.9 + } + }, + "References": [ + "http://secunia.com/advisories/27215", + "http://www.securityfocus.com/archive/1/482129/100/100/threaded", + "http://www.securityfocus.com/archive/1/482857/100/0/threaded", + "http://www.securityfocus.com/bid/26048", + "http://www.vupen.com/english/advisories/2007/3474", + "https://issues.rpath.com/browse/RPL-1825" + ], + "PublishedDate": "2007-10-28T17:08:00Z", + "LastModifiedDate": "2024-11-21T00:38:27.587Z" + }, + { + "VulnerabilityID": "CVE-2023-29383", + "PkgID": "login@1:4.13+dfsg1-1+b1", + "PkgName": "login", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "9c383ff5c6ed1c81" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-29383", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow: Improper input validation in shadow-utils package utility chfn", + "Description": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", + "Severity": "LOW", + "CweIDs": [ + "CWE-74", + "CWE-125" + ], + "VendorSeverity": { + "cbl-mariner": 1, + "nvd": 1, + "photon": 1, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 3.3 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-29383", + "https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d", + "https://github.com/shadow-maint/shadow/pull/687", + "https://nvd.nist.gov/vuln/detail/CVE-2023-29383", + "https://www.cve.org/CVERecord?id=CVE-2023-29383", + "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/", + "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797" + ], + "PublishedDate": "2023-04-14T22:15:07.68Z", + "LastModifiedDate": "2025-02-06T22:15:35.057Z" + }, + { + "VulnerabilityID": "CVE-2024-56433", + "PkgID": "login@1:4.13+dfsg1-1+b1", + "PkgName": "login", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "9c383ff5c6ed1c81" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise", + "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.", + "Severity": "LOW", + "CweIDs": [ + "CWE-1188" + ], + "VendorSeverity": { + "azure": 1, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 3.6 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2024-56433", + "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241", + "https://github.com/shadow-maint/shadow/issues/1157", + "https://github.com/shadow-maint/shadow/releases/tag/4.4", + "https://nvd.nist.gov/vuln/detail/CVE-2024-56433", + "https://www.cve.org/CVERecord?id=CVE-2024-56433" + ], + "PublishedDate": "2024-12-26T09:15:07.267Z", + "LastModifiedDate": "2024-12-26T09:15:07.267Z" + }, + { + "VulnerabilityID": "TEMP-0628843-DBAD28", + "PkgID": "login@1:4.13+dfsg1-1+b1", + "PkgName": "login", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/login@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "9c383ff5c6ed1c81" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "[more related to CVE-2005-4890]", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1 + } + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "mount@2.38.1-5+deb12u3", + "PkgName": "mount", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/mount@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "63b0977e705f5d35" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2023-50495", + "PkgID": "ncurses-base@6.4-4", + "PkgName": "ncurses-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/ncurses-base@6.4-4?arch=all\u0026distro=debian-12.10", + "UID": "9836f95b93f3d6b3" + }, + "InstalledVersion": "6.4-4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-50495", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "ncurses: segmentation fault via _nc_wrap_entry()", + "Description": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", + "Severity": "MEDIUM", + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-50495", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-50495", + "https://security.netapp.com/advisory/ntap-20240119-0008/", + "https://ubuntu.com/security/notices/USN-6684-1", + "https://www.cve.org/CVERecord?id=CVE-2023-50495" + ], + "PublishedDate": "2023-12-12T15:15:07.867Z", + "LastModifiedDate": "2024-11-21T08:37:04.243Z" + }, + { + "VulnerabilityID": "CVE-2023-50495", + "PkgID": "ncurses-bin@6.4-4", + "PkgName": "ncurses-bin", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/ncurses-bin@6.4-4?arch=amd64\u0026distro=debian-12.10", + "UID": "d53f35453c9fec6d" + }, + "InstalledVersion": "6.4-4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-50495", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "ncurses: segmentation fault via _nc_wrap_entry()", + "Description": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", + "Severity": "MEDIUM", + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "nvd": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 6.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-50495", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html", + "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-50495", + "https://security.netapp.com/advisory/ntap-20240119-0008/", + "https://ubuntu.com/security/notices/USN-6684-1", + "https://www.cve.org/CVERecord?id=CVE-2023-50495" + ], + "PublishedDate": "2023-12-12T15:15:07.867Z", + "LastModifiedDate": "2024-11-21T08:37:04.243Z" + }, + { + "VulnerabilityID": "CVE-2024-7347", + "PkgID": "nginx@1.27.5-1~bookworm", + "PkgName": "nginx", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/nginx@1.27.5-1~bookworm?arch=amd64\u0026distro=debian-12.10", + "UID": "cc598444ac4c52a1" + }, + "InstalledVersion": "1.27.5-1~bookworm", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-7347", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "nginx: specially crafted MP4 file may cause denial of service", + "Description": "NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-126", + "CWE-125" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "nvd": 2, + "oracle-oval": 2, + "photon": 2, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 4.7 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 4.7 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2024/08/14/4", + "https://access.redhat.com/errata/RHSA-2025:3261", + "https://access.redhat.com/security/cve/CVE-2024-7347", + "https://errata.almalinux.org/9/ALSA-2025-3261.html", + "https://forum.nginx.org/read.php?27,300027", + "https://linux.oracle.com/cve/CVE-2024-7347.html", + "https://linux.oracle.com/errata/ELSA-2025-3262.html", + "https://my.f5.com/manage/s/article/K000140529", + "https://nvd.nist.gov/vuln/detail/CVE-2024-7347", + "https://ubuntu.com/security/notices/USN-7014-1", + "https://ubuntu.com/security/notices/USN-7014-2", + "https://ubuntu.com/security/notices/USN-7014-3", + "https://www.cve.org/CVERecord?id=CVE-2024-7347" + ], + "PublishedDate": "2024-08-14T15:15:31.87Z", + "LastModifiedDate": "2025-01-22T16:10:28.49Z" + }, + { + "VulnerabilityID": "CVE-2009-4487", + "PkgID": "nginx@1.27.5-1~bookworm", + "PkgName": "nginx", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/nginx@1.27.5-1~bookworm?arch=amd64\u0026distro=debian-12.10", + "UID": "cc598444ac4c52a1" + }, + "InstalledVersion": "1.27.5-1~bookworm", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2009-4487", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "nginx: Absent sanitation of escape sequences in web server log", + "Description": "nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.", + "Severity": "LOW", + "VendorSeverity": { + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "V2Score": 6.8 + }, + "redhat": { + "V2Vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "V2Score": 2.6 + } + }, + "References": [ + "http://www.securityfocus.com/archive/1/508830/100/0/threaded", + "http://www.securityfocus.com/bid/37711", + "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt", + "https://access.redhat.com/security/cve/CVE-2009-4487", + "https://nvd.nist.gov/vuln/detail/CVE-2009-4487", + "https://www.cve.org/CVERecord?id=CVE-2009-4487" + ], + "PublishedDate": "2010-01-13T20:30:00.357Z", + "LastModifiedDate": "2024-11-21T01:09:45.65Z" + }, + { + "VulnerabilityID": "CVE-2013-0337", + "PkgID": "nginx@1.27.5-1~bookworm", + "PkgName": "nginx", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/nginx@1.27.5-1~bookworm?arch=amd64\u0026distro=debian-12.10", + "UID": "cc598444ac4c52a1" + }, + "InstalledVersion": "1.27.5-1~bookworm", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-0337", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "The default configuration of nginx, possibly 1.3.13 and earlier, uses ...", + "Description": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.", + "Severity": "LOW", + "CweIDs": [ + "CWE-264" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "V2Score": 7.5 + } + }, + "References": [ + "http://secunia.com/advisories/55181", + "http://security.gentoo.org/glsa/glsa-201310-04.xml", + "http://www.openwall.com/lists/oss-security/2013/02/21/15", + "http://www.openwall.com/lists/oss-security/2013/02/22/1", + "http://www.openwall.com/lists/oss-security/2013/02/24/1" + ], + "PublishedDate": "2013-10-27T00:55:03.713Z", + "LastModifiedDate": "2025-04-11T00:51:21.963Z" + }, + { + "VulnerabilityID": "CVE-2023-44487", + "PkgID": "nginx@1.27.5-1~bookworm", + "PkgName": "nginx", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/nginx@1.27.5-1~bookworm?arch=amd64\u0026distro=debian-12.10", + "UID": "cc598444ac4c52a1" + }, + "InstalledVersion": "1.27.5-1~bookworm", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-44487", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)", + "Description": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", + "Severity": "LOW", + "CweIDs": [ + "CWE-400" + ], + "VendorSeverity": { + "alma": 3, + "amazon": 3, + "azure": 3, + "bitnami": 3, + "cbl-mariner": 3, + "debian": 1, + "ghsa": 2, + "nvd": 3, + "oracle-oval": 3, + "photon": 3, + "redhat": 3, + "rocky": 3, + "ubuntu": 3 + }, + "CVSS": { + "bitnami": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "ghsa": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "V3Score": 5.3 + }, + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "V3Score": 7.5 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2023/10/10/6", + "http://www.openwall.com/lists/oss-security/2023/10/10/7", + "http://www.openwall.com/lists/oss-security/2023/10/13/4", + "http://www.openwall.com/lists/oss-security/2023/10/13/9", + "http://www.openwall.com/lists/oss-security/2023/10/18/4", + "http://www.openwall.com/lists/oss-security/2023/10/18/8", + "http://www.openwall.com/lists/oss-security/2023/10/19/6", + "http://www.openwall.com/lists/oss-security/2023/10/20/8", + "https://access.redhat.com/errata/RHSA-2023:6746", + "https://access.redhat.com/security/cve/CVE-2023-44487", + "https://access.redhat.com/security/cve/cve-2023-44487", + "https://akka.io/security/akka-http-cve-2023-44487.html", + "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size", + "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/", + "https://aws.amazon.com/security/security-bulletins/AWS-2023-011", + "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/", + "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack", + "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/", + "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack", + "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/", + "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty", + "https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/", + "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack", + "https://blog.vespa.ai/cve-2023-44487", + "https://blog.vespa.ai/cve-2023-44487/", + "https://bugzilla.proxmox.com/show_bug.cgi?id=4988", + "https://bugzilla.redhat.com/2242803", + "https://bugzilla.redhat.com/show_bug.cgi?id=2242803", + "https://bugzilla.suse.com/show_bug.cgi?id=1216123", + "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9", + "https://chaos.social/@icing/111210915918780532", + "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps", + "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/", + "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack", + "https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487", + "https://devblogs.microsoft.com/dotnet/october-2023-updates/", + "https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715", + "https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve", + "https://errata.almalinux.org/9/ALSA-2023-6746.html", + "https://errata.rockylinux.org/RLSA-2023:5838", + "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764", + "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088", + "https://github.com/Azure/AKS/issues/3947", + "https://github.com/Kong/kong/discussions/11741", + "https://github.com/advisories/GHSA-qppj-fm5r-hxr3", + "https://github.com/advisories/GHSA-vx74-f528-fxqg", + "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p", + "https://github.com/akka/akka-http/issues/4323", + "https://github.com/akka/akka-http/pull/4324", + "https://github.com/akka/akka-http/pull/4325", + "https://github.com/alibaba/tengine/issues/1872", + "https://github.com/apache/apisix/issues/10320", + "https://github.com/apache/httpd-site/pull/10", + "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113", + "https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628", + "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2", + "https://github.com/apache/trafficserver/pull/10564", + "https://github.com/apple/swift-nio-http2", + "https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3", + "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487", + "https://github.com/bcdannyboy/CVE-2023-44487", + "https://github.com/caddyserver/caddy/issues/5877", + "https://github.com/caddyserver/caddy/releases/tag/v2.7.5", + "https://github.com/dotnet/announcements/issues/277", + "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73", + "https://github.com/eclipse/jetty.project/issues/10679", + "https://github.com/envoyproxy/envoy/pull/30055", + "https://github.com/etcd-io/etcd/issues/16740", + "https://github.com/facebook/proxygen/pull/466", + "https://github.com/golang/go/issues/63417", + "https://github.com/grpc/grpc-go/pull/6703", + "https://github.com/grpc/grpc-go/releases", + "https://github.com/grpc/grpc/releases/tag/v1.59.2", + "https://github.com/h2o/h2o/pull/3291", + "https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf", + "https://github.com/haproxy/haproxy/issues/2312", + "https://github.com/hyperium/hyper/issues/3337", + "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244", + "https://github.com/junkurihara/rust-rpxy/issues/97", + "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1", + "https://github.com/kazu-yamamoto/http2/issues/93", + "https://github.com/kubernetes/kubernetes/pull/121120", + "https://github.com/line/armeria/pull/5232", + "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632", + "https://github.com/micrictor/http2-rst-stream", + "https://github.com/microsoft/CBL-Mariner/pull/6381", + "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61", + "https://github.com/nghttp2/nghttp2/pull/1961", + "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0", + "https://github.com/ninenines/cowboy/issues/1615", + "https://github.com/nodejs/node/pull/50121", + "https://github.com/openresty/openresty/issues/930", + "https://github.com/opensearch-project/data-prepper/issues/3474", + "https://github.com/oqtane/oqtane.framework/discussions/3367", + "https://github.com/projectcontour/contour/pull/5826", + "https://github.com/tempesta-tech/tempesta/issues/1986", + "https://github.com/varnishcache/varnish-cache/issues/3996", + "https://go.dev/cl/534215", + "https://go.dev/cl/534235", + "https://go.dev/issue/63417", + "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo", + "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ", + "https://istio.io/latest/news/security/istio-security-2023-004", + "https://istio.io/latest/news/security/istio-security-2023-004/", + "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487", + "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/", + "https://linux.oracle.com/cve/CVE-2023-44487.html", + "https://linux.oracle.com/errata/ELSA-2024-1444.html", + "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q", + "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html", + "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html", + "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html", + "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html", + "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html", + "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html", + "https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/", + "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html", + "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html", + "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html", + "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2", + "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/", + "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487", + "https://my.f5.com/manage/s/article/K000137106", + "https://netty.io/news/2023/10/10/4-1-100-Final.html", + "https://news.ycombinator.com/item?id=37830987", + "https://news.ycombinator.com/item?id=37830998", + "https://news.ycombinator.com/item?id=37831062", + "https://news.ycombinator.com/item?id=37837043", + "https://nodejs.org/en/blog/vulnerability/october-2023-security-releases", + "https://nvd.nist.gov/vuln/detail/CVE-2023-44487", + "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response", + "https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/", + "https://pkg.go.dev/vuln/GO-2023-2102", + "https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected", + "https://security.gentoo.org/glsa/202311-09", + "https://security.netapp.com/advisory/ntap-20231016-0001", + "https://security.netapp.com/advisory/ntap-20231016-0001/", + "https://security.netapp.com/advisory/ntap-20240426-0007", + "https://security.netapp.com/advisory/ntap-20240426-0007/", + "https://security.netapp.com/advisory/ntap-20240621-0006", + "https://security.netapp.com/advisory/ntap-20240621-0006/", + "https://security.netapp.com/advisory/ntap-20240621-0007", + "https://security.netapp.com/advisory/ntap-20240621-0007/", + "https://security.paloaltonetworks.com/CVE-2023-44487", + "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14", + "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12", + "https://tomcat.apache.org/security-8.html", + "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94", + "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81", + "https://ubuntu.com/security/CVE-2023-44487", + "https://ubuntu.com/security/notices/USN-6427-1", + "https://ubuntu.com/security/notices/USN-6427-2", + "https://ubuntu.com/security/notices/USN-6438-1", + "https://ubuntu.com/security/notices/USN-6505-1", + "https://ubuntu.com/security/notices/USN-6574-1", + "https://ubuntu.com/security/notices/USN-6754-1", + "https://ubuntu.com/security/notices/USN-6994-1", + "https://ubuntu.com/security/notices/USN-7067-1", + "https://ubuntu.com/security/notices/USN-7410-1", + "https://ubuntu.com/security/notices/USN-7469-1", + "https://ubuntu.com/security/notices/USN-7469-2", + "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records", + "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/", + "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", + "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487", + "https://www.cve.org/CVERecord?id=CVE-2023-44487", + "https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event", + "https://www.debian.org/security/2023/dsa-5521", + "https://www.debian.org/security/2023/dsa-5522", + "https://www.debian.org/security/2023/dsa-5540", + "https://www.debian.org/security/2023/dsa-5549", + "https://www.debian.org/security/2023/dsa-5558", + "https://www.debian.org/security/2023/dsa-5570", + "https://www.eclipse.org/lists/jetty-announce/msg00181.html", + "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487", + "https://www.mail-archive.com/haproxy@formilux.org/msg44134.html", + "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487", + "https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/", + "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products", + "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/", + "https://www.openwall.com/lists/oss-security/2023/10/10/6", + "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack", + "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday", + "https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/", + "https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause" + ], + "PublishedDate": "2023-10-10T14:15:10.883Z", + "LastModifiedDate": "2025-04-12T01:00:01.957Z" + }, + { + "VulnerabilityID": "CVE-2024-13176", + "PkgID": "openssl@3.0.15-1~deb12u1", + "PkgName": "openssl", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/openssl@3.0.15-1~deb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "eaef4b3cbff90c54" + }, + "InstalledVersion": "3.0.15-1~deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:91311529275035c77ef310fe38a81841c8f3e0a324cf6a68d86b36f48a145d0a", + "DiffID": "sha256:84accda66bf08ee5b495ac11c2c2d2b8fa0773bdd148b1976788ca4a64775d38" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-13176", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "openssl: Timing side-channel in ECDSA signature computation", + "Description": "Issue summary: A timing side-channel which could potentially allow recovering\nthe private key exists in the ECDSA signature computation.\n\nImpact summary: A timing side-channel in ECDSA signature computations\ncould allow recovering the private key by an attacker. However, measuring\nthe timing would require either local access to the signing application or\na very fast network connection with low latency.\n\nThere is a timing signal of around 300 nanoseconds when the top word of\nthe inverted ECDSA nonce value is zero. This can happen with significant\nprobability only for some of the supported elliptic curves. In particular\nthe NIST P-521 curve is affected. To be able to measure this leak, the attacker\nprocess must either be located in the same physical computer or must\nhave a very fast network connection with low latency. For that reason\nthe severity of this vulnerability is Low.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-385" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 2, + "cbl-mariner": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2025/01/20/2", + "https://access.redhat.com/security/cve/CVE-2024-13176", + "https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844", + "https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467", + "https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902", + "https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65", + "https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f", + "https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded", + "https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86", + "https://nvd.nist.gov/vuln/detail/CVE-2024-13176", + "https://openssl-library.org/news/secadv/20250120.txt", + "https://security.netapp.com/advisory/ntap-20250124-0005/", + "https://security.netapp.com/advisory/ntap-20250418-0010/", + "https://ubuntu.com/security/notices/USN-7264-1", + "https://ubuntu.com/security/notices/USN-7278-1", + "https://www.cve.org/CVERecord?id=CVE-2024-13176", + "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL" + ], + "PublishedDate": "2025-01-20T14:15:26.247Z", + "LastModifiedDate": "2025-04-19T01:15:43.007Z" + }, + { + "VulnerabilityID": "CVE-2023-4641", + "PkgID": "passwd@1:4.13+dfsg1-1+b1", + "PkgName": "passwd", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "414b9b1c20179157" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-4641", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow-utils: possible password leak during passwd(1) change", + "Description": "A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.", + "Severity": "MEDIUM", + "CweIDs": [ + "CWE-303", + "CWE-287" + ], + "VendorSeverity": { + "alma": 1, + "amazon": 1, + "nvd": 2, + "oracle-oval": 1, + "photon": 2, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 4.7 + } + }, + "References": [ + "https://access.redhat.com/errata/RHSA-2023:6632", + "https://access.redhat.com/errata/RHSA-2023:7112", + "https://access.redhat.com/errata/RHSA-2024:0417", + "https://access.redhat.com/errata/RHSA-2024:2577", + "https://access.redhat.com/security/cve/CVE-2023-4641", + "https://bugzilla.redhat.com/2215945", + "https://bugzilla.redhat.com/show_bug.cgi?id=2215945", + "https://errata.almalinux.org/9/ALSA-2023-6632.html", + "https://linux.oracle.com/cve/CVE-2023-4641.html", + "https://linux.oracle.com/errata/ELSA-2023-7112.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-4641", + "https://ubuntu.com/security/notices/USN-6640-1", + "https://www.cve.org/CVERecord?id=CVE-2023-4641" + ], + "PublishedDate": "2023-12-27T16:15:13.363Z", + "LastModifiedDate": "2024-11-21T08:35:35.837Z" + }, + { + "VulnerabilityID": "CVE-2007-5686", + "PkgID": "passwd@1:4.13+dfsg1-1+b1", + "PkgName": "passwd", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "414b9b1c20179157" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...", + "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.", + "Severity": "LOW", + "CweIDs": [ + "CWE-264" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "V2Score": 4.9 + } + }, + "References": [ + "http://secunia.com/advisories/27215", + "http://www.securityfocus.com/archive/1/482129/100/100/threaded", + "http://www.securityfocus.com/archive/1/482857/100/0/threaded", + "http://www.securityfocus.com/bid/26048", + "http://www.vupen.com/english/advisories/2007/3474", + "https://issues.rpath.com/browse/RPL-1825" + ], + "PublishedDate": "2007-10-28T17:08:00Z", + "LastModifiedDate": "2024-11-21T00:38:27.587Z" + }, + { + "VulnerabilityID": "CVE-2023-29383", + "PkgID": "passwd@1:4.13+dfsg1-1+b1", + "PkgName": "passwd", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "414b9b1c20179157" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-29383", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow: Improper input validation in shadow-utils package utility chfn", + "Description": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", + "Severity": "LOW", + "CweIDs": [ + "CWE-74", + "CWE-125" + ], + "VendorSeverity": { + "cbl-mariner": 1, + "nvd": 1, + "photon": 1, + "redhat": 2, + "ubuntu": 1 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "V3Score": 3.3 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2023-29383", + "https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d", + "https://github.com/shadow-maint/shadow/pull/687", + "https://nvd.nist.gov/vuln/detail/CVE-2023-29383", + "https://www.cve.org/CVERecord?id=CVE-2023-29383", + "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/", + "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797" + ], + "PublishedDate": "2023-04-14T22:15:07.68Z", + "LastModifiedDate": "2025-02-06T22:15:35.057Z" + }, + { + "VulnerabilityID": "CVE-2024-56433", + "PkgID": "passwd@1:4.13+dfsg1-1+b1", + "PkgName": "passwd", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "414b9b1c20179157" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise", + "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.", + "Severity": "LOW", + "CweIDs": [ + "CWE-1188" + ], + "VendorSeverity": { + "azure": 1, + "redhat": 1, + "ubuntu": 1 + }, + "CVSS": { + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", + "V3Score": 3.6 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2024-56433", + "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241", + "https://github.com/shadow-maint/shadow/issues/1157", + "https://github.com/shadow-maint/shadow/releases/tag/4.4", + "https://nvd.nist.gov/vuln/detail/CVE-2024-56433", + "https://www.cve.org/CVERecord?id=CVE-2024-56433" + ], + "PublishedDate": "2024-12-26T09:15:07.267Z", + "LastModifiedDate": "2024-12-26T09:15:07.267Z" + }, + { + "VulnerabilityID": "TEMP-0628843-DBAD28", + "PkgID": "passwd@1:4.13+dfsg1-1+b1", + "PkgName": "passwd", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/passwd@4.13%2Bdfsg1-1%2Bb1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "414b9b1c20179157" + }, + "InstalledVersion": "1:4.13+dfsg1-1+b1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "[more related to CVE-2005-4890]", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1 + } + }, + { + "VulnerabilityID": "CVE-2023-31484", + "PkgID": "perl-base@5.36.0-7+deb12u2", + "PkgName": "perl-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/perl-base@5.36.0-7%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "170e64dcedbd4508" + }, + "InstalledVersion": "5.36.0-7+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31484", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS", + "Description": "CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.", + "Severity": "HIGH", + "CweIDs": [ + "CWE-295" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 3, + "cbl-mariner": 3, + "nvd": 3, + "oracle-oval": 2, + "redhat": 2, + "rocky": 2, + "ubuntu": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 8.1 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "V3Score": 7.4 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2023/04/29/1", + "http://www.openwall.com/lists/oss-security/2023/05/03/3", + "http://www.openwall.com/lists/oss-security/2023/05/03/5", + "http://www.openwall.com/lists/oss-security/2023/05/07/2", + "https://access.redhat.com/errata/RHSA-2023:6539", + "https://access.redhat.com/security/cve/CVE-2023-31484", + "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", + "https://bugzilla.redhat.com/2218667", + "https://bugzilla.redhat.com/show_bug.cgi?id=2218667", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484", + "https://errata.almalinux.org/9/ALSA-2023-6539.html", + "https://errata.rockylinux.org/RLSA-2023:6539", + "https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)", + "https://github.com/andk/cpanpm/pull/175", + "https://linux.oracle.com/cve/CVE-2023-31484.html", + "https://linux.oracle.com/errata/ELSA-2024-3094.html", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", + "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", + "https://metacpan.org/dist/CPAN/changes", + "https://nvd.nist.gov/vuln/detail/CVE-2023-31484", + "https://security.netapp.com/advisory/ntap-20240621-0007/", + "https://ubuntu.com/security/notices/USN-6112-1", + "https://ubuntu.com/security/notices/USN-6112-2", + "https://www.cve.org/CVERecord?id=CVE-2023-31484", + "https://www.openwall.com/lists/oss-security/2023/04/18/14" + ], + "PublishedDate": "2023-04-29T00:15:09Z", + "LastModifiedDate": "2024-11-21T08:01:57.707Z" + }, + { + "VulnerabilityID": "CVE-2011-4116", + "PkgID": "perl-base@5.36.0-7+deb12u2", + "PkgName": "perl-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/perl-base@5.36.0-7%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "170e64dcedbd4508" + }, + "InstalledVersion": "5.36.0-7+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "perl: File:: Temp insecure temporary file handling", + "Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.", + "Severity": "LOW", + "CweIDs": [ + "CWE-59" + ], + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 1 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "V2Score": 5, + "V3Score": 7.5 + }, + "redhat": { + "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "V2Score": 1.9 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2011/11/04/2", + "http://www.openwall.com/lists/oss-security/2011/11/04/4", + "https://access.redhat.com/security/cve/CVE-2011-4116", + "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14", + "https://nvd.nist.gov/vuln/detail/CVE-2011-4116", + "https://rt.cpan.org/Public/Bug/Display.html?id=69106", + "https://seclists.org/oss-sec/2011/q4/238", + "https://www.cve.org/CVERecord?id=CVE-2011-4116" + ], + "PublishedDate": "2020-01-31T18:15:11.343Z", + "LastModifiedDate": "2024-11-21T01:31:52.77Z" + }, + { + "VulnerabilityID": "CVE-2023-31486", + "PkgID": "perl-base@5.36.0-7+deb12u2", + "PkgName": "perl-base", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/perl-base@5.36.0-7%2Bdeb12u2?arch=amd64\u0026distro=debian-12.10", + "UID": "170e64dcedbd4508" + }, + "InstalledVersion": "5.36.0-7+deb12u2", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31486", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "http-tiny: insecure TLS cert default", + "Description": "HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.", + "Severity": "LOW", + "CweIDs": [ + "CWE-295" + ], + "VendorSeverity": { + "alma": 2, + "amazon": 3, + "cbl-mariner": 3, + "debian": 1, + "nvd": 3, + "oracle-oval": 2, + "photon": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 8.1 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "V3Score": 6.8 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2023/04/29/1", + "http://www.openwall.com/lists/oss-security/2023/05/03/3", + "http://www.openwall.com/lists/oss-security/2023/05/03/5", + "http://www.openwall.com/lists/oss-security/2023/05/07/2", + "https://access.redhat.com/errata/RHSA-2023:6542", + "https://access.redhat.com/security/cve/CVE-2023-31486", + "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", + "https://bugzilla.redhat.com/2228392", + "https://errata.almalinux.org/9/ALSA-2023-6542.html", + "https://github.com/chansen/p5-http-tiny/pull/153", + "https://hackeriet.github.io/cpan-http-tiny-overview/", + "https://linux.oracle.com/cve/CVE-2023-31486.html", + "https://linux.oracle.com/errata/ELSA-2023-7174.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-31486", + "https://security.netapp.com/advisory/ntap-20241129-0011/", + "https://www.cve.org/CVERecord?id=CVE-2023-31486", + "https://www.openwall.com/lists/oss-security/2023/04/18/14", + "https://www.openwall.com/lists/oss-security/2023/05/03/4", + "https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/" + ], + "PublishedDate": "2023-04-29T00:15:09.083Z", + "LastModifiedDate": "2025-01-30T20:15:32.297Z" + }, + { + "VulnerabilityID": "TEMP-0517018-A83CE6", + "PkgID": "sysvinit-utils@3.06-4", + "PkgName": "sysvinit-utils", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/sysvinit-utils@3.06-4?arch=amd64\u0026distro=debian-12.10", + "UID": "aab9a8419e8391fc" + }, + "InstalledVersion": "3.06-4", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "[sysvinit: no-root option in expert installer exposes locally exploitable security flaw]", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1 + } + }, + { + "VulnerabilityID": "CVE-2005-2541", + "PkgID": "tar@1.34+dfsg-1.2+deb12u1", + "PkgName": "tar", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "40d3e19c8515b967" + }, + "InstalledVersion": "1.34+dfsg-1.2+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-2541", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "tar: does not properly warn the user when extracting setuid or setgid files", + "Description": "Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1, + "nvd": 3, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "V2Score": 10 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "V3Score": 7 + } + }, + "References": [ + "http://marc.info/?l=bugtraq\u0026m=112327628230258\u0026w=2", + "https://access.redhat.com/security/cve/CVE-2005-2541", + "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E", + "https://nvd.nist.gov/vuln/detail/CVE-2005-2541", + "https://www.cve.org/CVERecord?id=CVE-2005-2541" + ], + "PublishedDate": "2005-08-10T04:00:00Z", + "LastModifiedDate": "2025-04-03T01:03:51.193Z" + }, + { + "VulnerabilityID": "TEMP-0290435-0B57B5", + "PkgID": "tar@1.34+dfsg-1.2+deb12u1", + "PkgName": "tar", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?arch=amd64\u0026distro=debian-12.10", + "UID": "40d3e19c8515b967" + }, + "InstalledVersion": "1.34+dfsg-1.2+deb12u1", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "[tar's rmt command may have undesired side effects]", + "Severity": "LOW", + "VendorSeverity": { + "debian": 1 + } + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "util-linux@2.38.1-5+deb12u3", + "PkgName": "util-linux", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "7baf07217f173406" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2022-0563", + "PkgID": "util-linux-extra@2.38.1-5+deb12u3", + "PkgName": "util-linux-extra", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/util-linux-extra@2.38.1-5%2Bdeb12u3?arch=amd64\u0026distro=debian-12.10", + "UID": "30ac64362504313" + }, + "InstalledVersion": "2.38.1-5+deb12u3", + "Status": "affected", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "debian", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline", + "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", + "Severity": "LOW", + "CweIDs": [ + "CWE-209" + ], + "VendorSeverity": { + "amazon": 2, + "cbl-mariner": 2, + "debian": 1, + "nvd": 2, + "photon": 2, + "redhat": 2 + }, + "CVSS": { + "nvd": { + "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V2Score": 1.9, + "V3Score": 5.5 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "V3Score": 5.5 + } + }, + "References": [ + "https://access.redhat.com/security/cve/CVE-2022-0563", + "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u", + "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u", + "https://nvd.nist.gov/vuln/detail/CVE-2022-0563", + "https://security.gentoo.org/glsa/202401-08", + "https://security.netapp.com/advisory/ntap-20220331-0002/", + "https://www.cve.org/CVERecord?id=CVE-2022-0563" + ], + "PublishedDate": "2022-02-21T19:15:08.393Z", + "LastModifiedDate": "2024-11-21T06:38:55.503Z" + }, + { + "VulnerabilityID": "CVE-2023-45853", + "PkgID": "zlib1g@1:1.2.13.dfsg-1", + "PkgName": "zlib1g", + "PkgIdentifier": { + "PURL": "pkg:deb/debian/zlib1g@1.2.13.dfsg-1?arch=amd64\u0026distro=debian-12.10\u0026epoch=1", + "UID": "a68dc3e936e6a0f7" + }, + "InstalledVersion": "1:1.2.13.dfsg-1", + "Status": "will_not_fix", + "Layer": { + "Digest": "sha256:254e724d77862dc53abbd3bf0e27f9d2f64293909cdd3d0aad6a8fe5a6680659", + "DiffID": "sha256:6c4c763d22d0c5f9b2c5901dfa667fbbc4713cee6869336b8fd5022185071f1c" + }, + "SeveritySource": "nvd", + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-45853", + "DataSource": { + "ID": "debian", + "Name": "Debian Security Tracker", + "URL": "https://salsa.debian.org/security-tracker-team/security-tracker" + }, + "Title": "zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6", + "Description": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.", + "Severity": "CRITICAL", + "CweIDs": [ + "CWE-190" + ], + "VendorSeverity": { + "amazon": 2, + "azure": 4, + "cbl-mariner": 4, + "ghsa": 4, + "nvd": 4, + "photon": 4, + "redhat": 2, + "ubuntu": 2 + }, + "CVSS": { + "ghsa": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 9.8 + }, + "nvd": { + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "V3Score": 9.8 + }, + "redhat": { + "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "V3Score": 5.3 + } + }, + "References": [ + "http://www.openwall.com/lists/oss-security/2023/10/20/9", + "http://www.openwall.com/lists/oss-security/2024/01/24/10", + "https://access.redhat.com/security/cve/CVE-2023-45853", + "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356", + "https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61", + "https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4", + "https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c", + "https://github.com/madler/zlib/pull/843", + "https://github.com/smihica/pyminizip", + "https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c", + "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html", + "https://nvd.nist.gov/vuln/detail/CVE-2023-45853", + "https://pypi.org/project/pyminizip/#history", + "https://security.gentoo.org/glsa/202401-18", + "https://security.netapp.com/advisory/ntap-20231130-0009", + "https://security.netapp.com/advisory/ntap-20231130-0009/", + "https://ubuntu.com/security/notices/USN-7107-1", + "https://www.cve.org/CVERecord?id=CVE-2023-45853", + "https://www.winimage.com/zLibDll/minizip.html" + ], + "PublishedDate": "2023-10-14T02:15:09.323Z", + "LastModifiedDate": "2024-12-20T17:41:31.237Z" + } + ] + } + ] +}