-
Notifications
You must be signed in to change notification settings - Fork 1
dockerhub.hi.inet evolved 5g certification gmiaeronetapp gmiaeronetapp gmi_netapp_container
Evolved5G edited this page Oct 31, 2023
·
2 revisions
Scan of image: dockerhub.hi.inet/evolved-5g/certification/gmiaeronetapp/gmiaeronetapp-gmi_netapp_container
Severity | Number of vulnerabilities |
---|---|
CRITICAL | 95 |
HIGH | 738 |
MEDIUM | 968 |
LOW | 825 |
UNKNOWN | 3 |
Severity | ID | Title | PkgName | InstalledVersion | FixedVersion |
---|---|---|---|---|---|
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | Unpreserved file permissions | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32221 | POST following PUT confusion | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
CRITICAL | CVE-2023-23914 | HSTS ignored on multiple requests | curl | 7.74.0-1.3+deb11u1 | |
CRITICAL | CVE-2023-38545 | heap based buffer overflow in the SOCKS5 proxy handshake | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
CRITICAL | CVE-2022-1664 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... | dpkg | 1.20.9 | 1.20.10 |
CRITICAL | CVE-2022-1664 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... | dpkg-dev | 1.20.9 | 1.20.10 |
CRITICAL | CVE-2022-23521 | git: gitattributes parsing integer overflow | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
CRITICAL | CVE-2022-41903 | git: Heap overflow in git archive , git log --format leading to RCE |
git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
CRITICAL | CVE-2022-23521 | git: gitattributes parsing integer overflow | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
CRITICAL | CVE-2022-41903 | git: Heap overflow in git archive , git log --format leading to RCE |
git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
CRITICAL | CVE-2021-30473 | aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that i ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
CRITICAL | CVE-2021-30474 | aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
CRITICAL | CVE-2021-30475 | aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buf ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
CRITICAL | CVE-2022-24963 | integer overflow/wraparound in apr_encode | libapr1 | 1.7.0-6+deb11u1 | 1.7.0-6+deb11u2 |
CRITICAL | CVE-2021-43400 | bluez: use-after-free in gatt-database.c | libbluetooth-dev | 5.55-3.1 | |
CRITICAL | CVE-2021-43400 | bluez: use-after-free in gatt-database.c | libbluetooth3 | 5.55-3.1 | |
CRITICAL | CVE-2021-33574 | mq_notify does not handle separately allocated thread attributes | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23218 | Stack-based buffer overflow in svcunix_create via long pathnames | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23219 | Stack-based buffer overflow in sunrpc clnt_create via a long pathname | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2021-33574 | mq_notify does not handle separately allocated thread attributes | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23218 | Stack-based buffer overflow in svcunix_create via long pathnames | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23219 | Stack-based buffer overflow in sunrpc clnt_create via a long pathname | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2021-33574 | mq_notify does not handle separately allocated thread attributes | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23218 | Stack-based buffer overflow in svcunix_create via long pathnames | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23219 | Stack-based buffer overflow in sunrpc clnt_create via a long pathname | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2021-33574 | mq_notify does not handle separately allocated thread attributes | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23218 | Stack-based buffer overflow in svcunix_create via long pathnames | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2022-23219 | Stack-based buffer overflow in sunrpc clnt_create via a long pathname | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | Unpreserved file permissions | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32221 | POST following PUT confusion | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
CRITICAL | CVE-2023-23914 | HSTS ignored on multiple requests | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
CRITICAL | CVE-2023-38545 | heap based buffer overflow in the SOCKS5 proxy handshake | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | Unpreserved file permissions | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32221 | POST following PUT confusion | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
CRITICAL | CVE-2023-23914 | HSTS ignored on multiple requests | libcurl4 | 7.74.0-1.3+deb11u1 | |
CRITICAL | CVE-2023-38545 | heap based buffer overflow in the SOCKS5 proxy handshake | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | Unpreserved file permissions | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32221 | POST following PUT confusion | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
CRITICAL | CVE-2023-23914 | HSTS ignored on multiple requests | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
CRITICAL | CVE-2023-38545 | heap based buffer overflow in the SOCKS5 proxy handshake | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
CRITICAL | CVE-2019-8457 | heap out-of-bound read in function rtreenode() | libdb5.3 | 5.3.28+dfsg1-0.8 | |
CRITICAL | CVE-2019-8457 | heap out-of-bound read in function rtreenode() | libdb5.3-dev | 5.3.28+dfsg1-0.8 | |
CRITICAL | CVE-2022-1253 | Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
CRITICAL | CVE-2022-1664 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... | libdpkg-perl | 1.20.9 | 1.20.10 |
CRITICAL | CVE-2022-22822 | Integer overflow in addBinding in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-22823 | Integer overflow in build_model in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-22824 | Integer overflow in defineAttribute in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-23852 | Integer overflow in function XML_GetBuffer | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-25235 | Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-25236 | prefix]" attribute values can lead to arbitrary code execution | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-25315 | Integer overflow in storeRawNames() | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-22822 | Integer overflow in addBinding in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-22823 | Integer overflow in build_model in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-22824 | Integer overflow in defineAttribute in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-23852 | Integer overflow in function XML_GetBuffer | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
CRITICAL | CVE-2022-25235 | Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-25236 | prefix]" attribute values can lead to arbitrary code execution | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-25315 | Integer overflow in storeRawNames() | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u2 |
CRITICAL | CVE-2022-27404 | Buffer overflow in sfnt_init_face | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-27404 | Buffer overflow in sfnt_init_face | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-27404 | Buffer overflow in sfnt_init_face | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-3515 | integer overflow may lead to remote code execution | libksba8 | 1.5.0-3 | 1.5.0-3+deb11u1 |
CRITICAL | CVE-2022-47629 | integer overflow to code execution | libksba8 | 1.5.0-3 | 1.5.0-3+deb11u2 |
CRITICAL | CVE-2022-29155 | OpenLDAP SQL injection | libldap-2.4-2 | 2.4.57+dfsg-3 | 2.4.57+dfsg-3+deb11u1 |
CRITICAL | CVE-2022-1586 | Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-16-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-16-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-32-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-32-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-8-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-8-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-dev | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-dev | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-posix2 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-posix2 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | libpython3.9-minimal | 3.9.2-1 | |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | libpython3.9-stdlib | 3.9.2-1 | |
CRITICAL | CVE-2022-1292 | c_rehash script allows command injection | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
CRITICAL | CVE-2022-2068 | the c_rehash script allows command injection | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2022-1292 | c_rehash script allows command injection | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
CRITICAL | CVE-2022-2068 | the c_rehash script allows command injection | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2021-46848 | Out-of-bound access in ETYPE_OK | libtasn1-6 | 4.16.0-2 | 4.16.0-2+deb11u1 |
CRITICAL | CVE-2023-45871 | IGB driver inadequate buffer size for frames larger than MTU | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
CRITICAL | CVE-2023-38408 | Remote code execution in ssh-agent PKCS#11 support | openssh-client | 1:8.4p1-5 | 1:8.4p1-5+deb11u2 |
CRITICAL | CVE-2022-1292 | c_rehash script allows command injection | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
CRITICAL | CVE-2022-2068 | the c_rehash script allows command injection | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | python3.9 | 3.9.2-1 | |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | python3.9-minimal | 3.9.2-1 | |
CRITICAL | CVE-2022-37434 | heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra fie | zlib1g | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u2 |
CRITICAL | CVE-2023-45853 | integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 | zlib1g | 1:1.2.11.dfsg-2 | |
CRITICAL | CVE-2022-37434 | heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra fie | zlib1g-dev | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u2 |
CRITICAL | CVE-2023-45853 | integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 | zlib1g-dev | 1:1.2.11.dfsg-2 | |
HIGH | CVE-2022-3715 | a heap-buffer-overflow in valid_parameter_transform | bash | 5.1-2+b3 | |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | comerr-dev | 2.1-1.46.2-2 | |
HIGH | CVE-2021-22946 | Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | CERTINFO never-ending busy-loop | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | TLS and SSH connection too eager reuse | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | HSTS bypass via IDN | curl | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2022-43551 | HSTS bypass via IDN | curl | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2023-27533 | TELNET option IAC injection | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2023-27534 | SFTP path ~ resolving discrepancy | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | e2fsprogs | 1.46.2-2 | |
HIGH | CVE-2021-44648 | heap-buffer overflow when decoding the lzw compressed stream of image data | gir1.2-gdkpixbuf-2.0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | heap-based buffer overflow when compositing or clearing frames in GIF files | gir1.2-gdkpixbuf-2.0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2022-24765 | On multi-user machines Git users might find themselves unexpectedly in a Git worktree | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2022-29187 | Bypass of safe.directory protections | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2022-39260 | git shell function that splits command arguments can lead to arbitrary heap writes. | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2023-23946 | a path outside the working tree can be overwritten with crafted input | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 |
HIGH | CVE-2023-25652 | by feeding specially crafted input to git apply --reject , a path outside the working tree can be o |
git | 1:2.30.2-1 | |
HIGH | CVE-2023-29007 | arbitrary configuration injection when renaming or deleting a section from a configuration file | git | 1:2.30.2-1 | |
HIGH | CVE-2022-24765 | On multi-user machines Git users might find themselves unexpectedly in a Git worktree | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2022-29187 | Bypass of safe.directory protections | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2022-39260 | git shell function that splits command arguments can lead to arbitrary heap writes. | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
HIGH | CVE-2023-23946 | a path outside the working tree can be overwritten with crafted input | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 |
HIGH | CVE-2023-25652 | by feeding specially crafted input to git apply --reject , a path outside the working tree can be o |
git-man | 1:2.30.2-1 | |
HIGH | CVE-2023-29007 | arbitrary configuration injection when renaming or deleting a section from a configuration file | git-man | 1:2.30.2-1 | |
HIGH | CVE-2022-1271 | arbitrary-file-write vulnerability | gzip | 1.10-4 | 1.10-4+deb11u1 |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | krb5-multidev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2020-0478 | In extend_frame_lowbd of restoration.c, there is a possible out of bou ... | libaom0 | 1.0.0.errata1-3 | |
HIGH | CVE-2020-36131 | AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
HIGH | CVE-2020-36133 | AOM v2.0.1 was discovered to contain a global buffer overflow via the ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
HIGH | CVE-2022-0204 | heap-based buffer overflow in the implementation of the gatt protocol | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-39176 | BlueZ allows physically proximate attackers to obtain sensitive information because profiles/audio/a | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-39177 | BlueZ allows physically proximate attackers to cause a denial of service because malformed and inval | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-0204 | heap-based buffer overflow in the implementation of the gatt protocol | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2022-39176 | BlueZ allows physically proximate attackers to obtain sensitive information because profiles/audio/a | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2022-39177 | BlueZ allows physically proximate attackers to cause a denial of service because malformed and inval | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2021-3999 | Off-by-one buffer overflow/underflow in getcwd() | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u4 |
HIGH | CVE-2023-4911 | buffer overflow in ld.so leading to privilege escalation | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u7 |
HIGH | CVE-2021-3999 | Off-by-one buffer overflow/underflow in getcwd() | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u4 |
HIGH | CVE-2023-4911 | buffer overflow in ld.so leading to privilege escalation | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u7 |
HIGH | CVE-2021-3999 | Off-by-one buffer overflow/underflow in getcwd() | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u4 |
HIGH | CVE-2023-4911 | buffer overflow in ld.so leading to privilege escalation | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u7 |
HIGH | CVE-2021-3999 | Off-by-one buffer overflow/underflow in getcwd() | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u4 |
HIGH | CVE-2023-4911 | buffer overflow in ld.so leading to privilege escalation | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u7 |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | libcom-err2 | 1.46.2-2 | |
HIGH | CVE-2021-22946 | Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | CERTINFO never-ending busy-loop | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | TLS and SSH connection too eager reuse | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | HSTS bypass via IDN | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2022-43551 | HSTS bypass via IDN | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2023-27533 | TELNET option IAC injection | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2023-27534 | SFTP path ~ resolving discrepancy | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2021-22946 | Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | CERTINFO never-ending busy-loop | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | TLS and SSH connection too eager reuse | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | HSTS bypass via IDN | libcurl4 | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2022-43551 | HSTS bypass via IDN | libcurl4 | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2023-27533 | TELNET option IAC injection | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2023-27534 | SFTP path ~ resolving discrepancy | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2021-22946 | Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | CERTINFO never-ending busy-loop | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | TLS and SSH connection too eager reuse | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | HSTS bypass via IDN | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2022-43551 | HSTS bypass via IDN | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2023-27533 | TELNET option IAC injection | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2023-27534 | SFTP path ~ resolving discrepancy | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
HIGH | CVE-2020-21598 | libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unw ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2021-36409 | There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2022-47655 | Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_q ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2022-47664 | Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qp ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2022-47665 | Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2023-25221 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vuln ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
HIGH | CVE-2023-27103 | Libde265 v1.0.11 was discovered to contain a heap buffer overflow via ... | libde265-0 | 1.0.8-1 | |
HIGH | CVE-2021-45960 | Large number of prefixed XML attributes on a single tag can crash libexpat | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2021-46143 | Integer overflow in doProlog in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22825 | Integer overflow in lookup in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22826 | Integer overflow in nextScaffoldPart in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22827 | Integer overflow in storeAtts in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-23990 | integer overflow in the doProlog function | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-25314 | Integer overflow in copyString() | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u2 |
HIGH | CVE-2022-40674 | a use-after-free in the doContent function in xmlparse.c | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u4 |
HIGH | CVE-2022-43680 | use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u5 |
HIGH | CVE-2021-45960 | Large number of prefixed XML attributes on a single tag can crash libexpat | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2021-46143 | Integer overflow in doProlog in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22825 | Integer overflow in lookup in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22826 | Integer overflow in nextScaffoldPart in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-22827 | Integer overflow in storeAtts in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-23990 | integer overflow in the doProlog function | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u1 |
HIGH | CVE-2022-25314 | Integer overflow in copyString() | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u2 |
HIGH | CVE-2022-40674 | a use-after-free in the doContent function in xmlparse.c | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u4 |
HIGH | CVE-2022-43680 | use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u5 |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | libext2fs2 | 1.46.2-2 | |
HIGH | CVE-2022-27405 | Segmentation violation via FNT_Size_Request | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Segmentation violation via FT_Request_Size | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27405 | Segmentation violation via FNT_Size_Request | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Segmentation violation via FT_Request_Size | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27405 | Segmentation violation via FNT_Size_Request | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Segmentation violation via FT_Request_Size | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-25308 | fribidi: Stack based buffer overflow | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
HIGH | CVE-2021-33560 | mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack ag | libgcrypt20 | 1.8.7-6 | |
HIGH | CVE-2021-44648 | heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf-2.0-0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf-2.0-0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf-2.0-dev | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf-2.0-dev | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf2.0-bin | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf2.0-bin | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf2.0-common | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf2.0-common | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2023-29499 | GVariant offset table entry size is not checked in is_normal() | libglib2.0-0 | 2.66.8-1 | |
HIGH | CVE-2023-29499 | GVariant offset table entry size is not checked in is_normal() | libglib2.0-bin | 2.66.8-1 | |
HIGH | CVE-2023-29499 | GVariant offset table entry size is not checked in is_normal() | libglib2.0-data | 2.66.8-1 | |
HIGH | CVE-2023-29499 | GVariant offset table entry size is not checked in is_normal() | libglib2.0-dev | 2.66.8-1 | |
HIGH | CVE-2023-29499 | GVariant offset table entry size is not checked in is_normal() | libglib2.0-dev-bin | 2.66.8-1 | |
HIGH | CVE-2022-2509 | Double free during gnutls_pkcs7_verify | libgnutls30 | 3.7.1-5 | 3.7.1-5+deb11u2 |
HIGH | CVE-2023-0361 | timing side-channel in the TLS RSA key exchange code | libgnutls30 | 3.7.1-5 | 3.7.1-5+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libgssrpc4 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2023-25193 | allows attackers to trigger O(n^2) growth via consecutive marks | libharfbuzz0b | 2.7.4-1 | |
HIGH | CVE-2023-0996 | There is a vulnerability in the strided image data parsing code in the ... | libheif1 | 1.11.0-1 | |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libk5crypto3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkdb5-10 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkrb5-3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkrb5-dev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2022-42898 | integer overflow vulnerabilities in PAC parsing | libkrb5support0 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
HIGH | CVE-2023-2953 | null pointer dereference in ber_memalloc_x function | libldap-2.4-2 | 2.4.57+dfsg-3 | |
HIGH | CVE-2022-1271 | arbitrary-file-write vulnerability | liblzma-dev | 5.2.5-2 | 5.2.5-2.1~deb11u1 |
HIGH | CVE-2022-1271 | arbitrary-file-write vulnerability | liblzma5 | 5.2.5-2 | 5.2.5-2.1~deb11u1 |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-3610 | heap-based buffer overflow in ReadTIFFImage() in coders/tiff.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-40211 | Division by zero in ReadEnhMetaFile lead to DoS | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-24048 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixe | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24050 | mariadb: lack of validating the existence of an object prior to performing operations on the object | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24051 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24052 | mariadb: CONNECT storage engine heap-based buffer overflow | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.13-0+deb11u1 |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32081 | use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32082 | assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32084 | segmentation fault via the component sub_select | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32089 | exclude_level | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32091 | free or in copy_fields | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-24048 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixe | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24050 | mariadb: lack of validating the existence of an object prior to performing operations on the object | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24051 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24052 | mariadb: CONNECT storage engine heap-based buffer overflow | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.13-0+deb11u1 |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32081 | use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32082 | assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32084 | segmentation fault via the component sub_select | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32089 | exclude_level | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32091 | free or in copy_fields | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-24048 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixe | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24050 | mariadb: lack of validating the existence of an object prior to performing operations on the object | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24051 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24052 | mariadb: CONNECT storage engine heap-based buffer overflow | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.13-0+deb11u1 |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32081 | use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32082 | assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32084 | segmentation fault via the component sub_select | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32089 | exclude_level | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32091 | free or in copy_fields | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libncurses-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libncurses-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libncurses5-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libncurses5-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libncurses6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libncurses6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libncursesw5-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libncursesw5-dev | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libncursesw6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libncursesw6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2023-44487 | Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | libnghttp2-14 | 1.43.0-1 | |
HIGH | CVE-2021-3575 | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution | libopenjp2-7 | 2.4.0-3 | |
HIGH | CVE-2021-3575 | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution | libopenjp2-7-dev | 2.4.0-3 | |
HIGH | CVE-2020-16156 | Bypass of verification of signatures in CHECKSUMS files | libperl5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2023-31484 | CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS | libperl5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2022-44638 | Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | libpixman-1-0 | 0.40.0-1 | 0.40.0-1.1~deb11u1 |
HIGH | CVE-2022-44638 | Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | libpixman-1-dev | 0.40.0-1 | 0.40.0-1.1~deb11u1 |
HIGH | CVE-2022-1552 | Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | libpq-dev | 13.5-0+deb11u1 | 13.7-0+deb11u1 |
HIGH | CVE-2022-2625 | Extension scripts replace objects not belonging to the extension. | libpq-dev | 13.5-0+deb11u1 | 13.8-0+deb11u1 |
HIGH | CVE-2023-2454 | schema_element defeats protective search_path changes | libpq-dev | 13.5-0+deb11u1 | 13.11-0+deb11u1 |
HIGH | CVE-2023-39417 | extension script @substitutions@ within quoting allow SQL injection | libpq-dev | 13.5-0+deb11u1 | |
HIGH | CVE-2022-1552 | Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | libpq5 | 13.5-0+deb11u1 | 13.7-0+deb11u1 |
HIGH | CVE-2022-2625 | Extension scripts replace objects not belonging to the extension. | libpq5 | 13.5-0+deb11u1 | 13.8-0+deb11u1 |
HIGH | CVE-2023-2454 | schema_element defeats protective search_path changes | libpq5 | 13.5-0+deb11u1 | 13.11-0+deb11u1 |
HIGH | CVE-2023-39417 | extension script @substitutions@ within quoting allow SQL injection | libpq5 | 13.5-0+deb11u1 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2020-10735 | int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2021-3737 | HTTP client possible infinite loop on a 100 Continue response | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-0391 | urllib.parse does not sanitize URLs containing ASCII newline and tabs | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-42919 | local privilege escalation via the multiprocessing forkserver start method | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-45061 | CPU denial of service via inefficient IDNA decoder | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2023-24329 | urllib.parse url blocklisting bypass | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2020-10735 | int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2021-3737 | HTTP client possible infinite loop on a 100 Continue response | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-0391 | urllib.parse does not sanitize URLs containing ASCII newline and tabs | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-42919 | local privilege escalation via the multiprocessing forkserver start method | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-45061 | CPU denial of service via inefficient IDNA decoder | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2023-24329 | urllib.parse url blocklisting bypass | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-24407 | failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands | libsasl2-2 | 2.1.27+dfsg-2.1 | 2.1.27+dfsg-2.1+deb11u1 |
HIGH | CVE-2022-24407 | failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands | libsasl2-modules-db | 2.1.27+dfsg-2.1 | 2.1.27+dfsg-2.1+deb11u1 |
HIGH | CVE-2021-31239 | denial of service via the appendvfs.c function | libsqlite3-0 | 3.34.1-3 | |
HIGH | CVE-2021-31239 | denial of service via the appendvfs.c function | libsqlite3-dev | 3.34.1-3 | |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | libss2 | 1.46.2-2 | |
HIGH | CVE-2020-22218 | use-of-uninitialized-value in _libssh2_transport_read | libssh2-1 | 1.9.0-2 | |
HIGH | CVE-2022-0778 | Infinite loop in BN_mod_sqrt() reachable when parsing certificates | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
HIGH | CVE-2022-4450 | double free after calling PEM_read_bio_ex | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0215 | use-after-free following BIO_new_NDEF | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0286 | X.400 address type confusion in X.509 GeneralName | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0464 | Denial of service by excessive resource usage in verifying X509 policy constraints | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
HIGH | CVE-2022-0778 | Infinite loop in BN_mod_sqrt() reachable when parsing certificates | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
HIGH | CVE-2022-4450 | double free after calling PEM_read_bio_ex | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0215 | use-after-free following BIO_new_NDEF | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0286 | X.400 address type confusion in X.509 GeneralName | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0464 | Denial of service by excessive resource usage in verifying X509 policy constraints | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
HIGH | CVE-2022-24070 | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption | libsvn1 | 1.14.1-3 | 1.14.1-3+deb11u1 |
HIGH | CVE-2022-0891 | libtiff: heap buffer overflow in extractImageSection | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
HIGH | CVE-2022-3970 | integer overflow in function TIFFReadRGBATileExt of the file | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
HIGH | CVE-2023-25434 | heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
HIGH | CVE-2022-0891 | libtiff: heap buffer overflow in extractImageSection | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
HIGH | CVE-2022-3970 | integer overflow in function TIFFReadRGBATileExt of the file | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
HIGH | CVE-2023-25434 | heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
HIGH | CVE-2022-0891 | libtiff: heap buffer overflow in extractImageSection | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
HIGH | CVE-2022-3970 | integer overflow in function TIFFReadRGBATileExt of the file | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
HIGH | CVE-2023-25434 | heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
HIGH | CVE-2022-29458 | segfaulting OOB read | libtinfo6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | libtinfo6 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc-common | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc-dev | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc3 | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2023-1999 | Double-free in libwebp | libwebp-dev | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 |
HIGH | CVE-2023-4863 | Heap buffer overflow in WebP Codec | libwebp-dev | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 |
HIGH | CVE-2023-1999 | Double-free in libwebp | libwebp6 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 |
HIGH | CVE-2023-4863 | Heap buffer overflow in WebP Codec | libwebp6 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 |
HIGH | CVE-2023-1999 | Double-free in libwebp | libwebpdemux2 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 |
HIGH | CVE-2023-4863 | Heap buffer overflow in WebP Codec | libwebpdemux2 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 |
HIGH | CVE-2023-1999 | Double-free in libwebp | libwebpmux3 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 |
HIGH | CVE-2023-4863 | Heap buffer overflow in WebP Codec | libwebpmux3 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 |
HIGH | CVE-2023-3138 | InitExt.c can overwrite unintended portions of the Display structure if the extension request leads | libx11-6 | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 |
HIGH | CVE-2023-43787 | integer overflow in XCreateImage() leading to a heap overflow | libx11-6 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
HIGH | CVE-2023-3138 | InitExt.c can overwrite unintended portions of the Display structure if the extension request leads | libx11-data | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 |
HIGH | CVE-2023-43787 | integer overflow in XCreateImage() leading to a heap overflow | libx11-data | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
HIGH | CVE-2023-3138 | InitExt.c can overwrite unintended portions of the Display structure if the extension request leads | libx11-dev | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 |
HIGH | CVE-2023-43787 | integer overflow in XCreateImage() leading to a heap overflow | libx11-dev | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
HIGH | CVE-2022-2309 | lxml: NULL Pointer Dereference in lxml | libxml2 | 2.9.10+dfsg-6.7 | |
HIGH | CVE-2022-23308 | Use-after-free of ID and IDREF attributes | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u1 |
HIGH | CVE-2022-40303 | integer overflows with XML_PARSE_HUGE | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-40304 | dict corruption caused by entity reference cycles | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-2309 | lxml: NULL Pointer Dereference in lxml | libxml2-dev | 2.9.10+dfsg-6.7 | |
HIGH | CVE-2022-23308 | Use-after-free of ID and IDREF attributes | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u1 |
HIGH | CVE-2022-40303 | integer overflows with XML_PARSE_HUGE | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-40304 | dict corruption caused by entity reference cycles | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2021-30560 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... | libxslt1-dev | 1.1.34-4 | 1.1.34-4+deb11u1 |
HIGH | CVE-2021-30560 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... | libxslt1.1 | 1.1.34-4 | 1.1.34-4+deb11u1 |
HIGH | CVE-2022-4899 | buffer overrun in util.c | libzstd1 | 1.4.8+dfsg-2.1 | |
HIGH | CVE-2013-7445 | kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2019-19449 | kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_ | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2019-19814 | kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2020-12362 | Integer overflow in Intel(R) Graphics Drivers | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2021-22600 | double free in packet_set_ring() in net/packet/af_packet.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2021-3847 | low-privileged user privileges escalation | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2021-3864 | descendant's dumpable setting with certain SUID binaries | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2021-39685 | kernel: USB gadget buffer overflow | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2021-39686 | kernel: race condition in the Android binder driver could lead to incorrect security checks | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2021-39698 | use-after-free in the file polling implementation | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2021-4037 | kernel: security regression for CVE-2018-13405 | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2021-4197 | kernel: cgroup: Use open-time creds and namespace for migration perm checks | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2021-4204 | improper input validation may lead to privilege escalation | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2021-44733 | kernel: use-after-free in the TEE subsystem | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2021-45469 | kernel: out-of-bounds memory access in __f2fs_setxattr() in fs/f2fs/xattr.c when an inode has an inv | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2022-0185 | heap overflow in legacy parameter handling | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2022-0330 | kernel: possible privileges escalation due to missing TLB flush | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
HIGH | CVE-2022-0435 | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
HIGH | CVE-2022-0492 | cgroups v1 release_agent feature may allow privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-0500 | Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2022-0516 | kernel: missing check in ioctl allows kernel memory read/write | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
HIGH | CVE-2022-0847 | improper initialization of the "flags" member of the new pipe_buffer | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
HIGH | CVE-2022-0995 | kernel: kernel bug in the watch_queue subsystem | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-1011 | kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-1012 | Small table perturb size in the TCP source port generation algorithm can lead to information leak | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
HIGH | CVE-2022-1048 | race condition in snd_pcm_hw_free leading to use-after-free | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-1055 | use-after-free in tc_new_tfilter() in net/sched/cls_api.c | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-1158 | cmpxchg_gpte can write to pfns outside the userspace region | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-1199 | Null pointer dereference and use after free in ax25_release() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-1353 | kernel info leak issue in pfkey_register | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-1652 | kernel: A concurrency use-after-free in floppy disk device driver. | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-1679 | use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-1729 | kernel: race condition in perf_event_open leads to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-1786 | kernel: invalid-free in io_uring that can lead to LPE | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-1998 | fanotify misuses fd_install() which could lead to use-after-free | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-20368 | kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-20421 | kernel: use after free in binder_inc_ref_for_node in drivers/android/binder.c due | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-20422 | In emulation_proc_handler of armv8_deprecated.c, there is a possible w ... | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-20566 | possible use after free due to improper locking in l2cap_chan_put of l2cap_core | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
HIGH | CVE-2022-20568 | In (TBD) of (TBD), there is a possible way to corrupt kernel memory du ... | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-2196 | missing IBPB when exiting from nested guest can lead to Spectre v2 attacks | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2022-22942 | kernel: failing usercopy allows for use-after-free exploitation | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
HIGH | CVE-2022-23036 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23037 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23038 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23039 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23040 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23041 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23042 | Linux PV device frontends vulnerable to attacks by backends T[his CNA ... | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-23222 | local privileges escalation in kernel/bpf/verifier.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
HIGH | CVE-2022-2327 | io_uring use work_flags to determine which identity need to grab from ... | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
HIGH | CVE-2022-24958 | kernel: use-after-free in dev->buf release in drivers/usb/gadget/legacy/inode.c | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
HIGH | CVE-2022-25636 | kernel: heap out of bounds write in nf_dup_netdev.c | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-2585 | kernel: posix cpu timer use-after-free may lead to local privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
HIGH | CVE-2022-2588 | a use-after-free in cls_route filter implementation may lead to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
HIGH | CVE-2022-2602 | kernel: use-after-free when an io_uring request is being processed | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-26365 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-2639 | integer underflow leads to out-of-bounds write in reserve_sfa_size() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-26490 | kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-27223 | kernel: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index is not validated | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-27666 | kernel: buffer overflow in IPsec ESP transformation code | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-28390 | kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-28893 | use after free in SUNRPC subsystem | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-29156 | kernel: rtrs-clt.c rtrs_clt_dev_release double free | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-2938 | kernel: use-after-free when psi trigger is destroyed while being polled | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-29581 | use-after-free due to improper update of reference count in net/sched/cls_u32.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-29582 | kernel: Race condition that allows container escape to system root | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-2959 | watch queue race condition can lead to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-2964 | memory corruption in AX88179_178A based USB ethernet device. | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
HIGH | CVE-2022-2977 | kernel: use-after-free Read in put_device (/dev/vtpmx) | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-2978 | kernel: use-after-free in nilfs_mdt_destroy | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
HIGH | CVE-2022-3028 | race condition in xfrm_probe_algs can lead to OOB read/write | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-30594 | Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-3176 | use-after-free in io_uring for POLLFREE notification with Signalfd_poll() and binder_poll() | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-3202 | Kernel: jfs: Null Pointer Deference in jfs_evict_inode leads to Denial of Service | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-32250 | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2022-3239 | initialize refcount before kref_get | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-33740 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-33741 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-33742 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-33743 | network backend may cause Linux netfront to use freed SKBs (XSA-405) | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-34918 | kernel: heap overflow in nft_set_elem_init() | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
HIGH | CVE-2022-3545 | A flaw leading to a use-after-free in area_cache_get() | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2022-3564 | use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-3565 | use-after-free in l1oip timer handlers | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-3566 | data races around icsk->icsk_af_ops in do_ipv6_setsockopt | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2022-3577 | kernel: HID: bigben: slab-out-of-bounds Write in bigben_probe | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
HIGH | CVE-2022-3623 | denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2022-3625 | use-after-free after failed devlink reload in devlink_param_get | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-3635 | kernel: use after in tst_timer in drivers/atm/idt77252.c | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-3640 | use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-3649 | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
HIGH | CVE-2022-36946 | DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
HIGH | CVE-2022-39189 | TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2022-4095 | kernel: Use-after-Free/Double-Free bug in read_bbreg_hdl in drivers/staging/rtl8712/rtl8712_cmd.c | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
HIGH | CVE-2022-41222 | mm/mremap.c use-after-free vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
HIGH | CVE-2022-4139 | Incorrect GPU TLB flush can lead to random memory access | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-41674 | u8 overflow problem in cfg80211_update_notlisted_nontrans() | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-41858 | null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2022-42719 | kernel: A use-after-free problem observed in multi-BSSID element when parsing | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-42720 | use-after-free in bss_ref_get in net/wireless/scan.c | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
HIGH | CVE-2022-42896 | use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-4378 | stack overflow in do_proc_dointvec and proc_skip_spaces | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-4379 | use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2022-43945 | nfsd buffer overflow by RPC message over TCP with garbage data | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2022-45934 | integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2022-4696 | kernel: user-after-free during IORING_OP_SPLICE operation | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2022-4744 | avoid double free in tun_free_netdev | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
HIGH | CVE-2022-47518 | a heap-based buffer overflow in drivers/net/wireless/microchip/wilc1000/cfg80211.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-47519 | an out-of-bounds write in drivers/net/wireless/microchip/wilc1000/cfg80211.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-47520 | an out-of-bounds read in drivers/net/wireless/microchip/wilc1000/hif.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2022-47521 | a heap-based buffer overflow in drivers/net/wireless/microchip/wilc1000/cfg80211.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2023-0045 | Bypassing Spectre-BTI User Space Mitigations | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-0179 | Netfilter integer overflow vulnerability in nft_payload_copy_vlan | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2023-0240 | kernel: io_uring: reference counting issue in io_prep_async_work leads to use-after-free | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2023-0266 | Move rwsem lock inside snd_ctl_elem_read to prevent UAF | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2023-0386 | FUSE filesystem low-privileged user privileges escalation | linux-libc-dev | 5.10.84-1 | 5.10.179-1 |
HIGH | CVE-2023-0461 | use-after-free in listening ULP sockets | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1077 | Type confusion in pick_next_rt_entity() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1078 | Heap OOB Write in rds_rm_zerocopy_callback() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1118 | use-after-free in drivers/media/rc/ene_ir.c due to race condition | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1281 | use-after-free vulnerability in traffic control index filter allows privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1295 | TOCTOU vulnerability in IORING_OP_CLOSE operation | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
HIGH | CVE-2023-1380 | a USB-accessible slab-out-of-bounds read in brcmfmac | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-1670 | use after free bug in xirc2ps_detach | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1829 | Use-after-free vulnerability in the Linux Kernel traffic control index filter | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1838 | Possible use-after-free since the two fdget() during vhost_net_set_backend() | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2023-1872 | use-after-free vulnerability in io_file_get_fixed | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-1989 | Use after free bug in btsdio_remove due to race condition | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-2006 | race condition between connection bundle lookup and removal | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2023-2007 | DPT I2O controller TOCTOU information disclosure vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-2008 | improper validation of array index leading to local privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
HIGH | CVE-2023-20928 | In binder_vma_close of binder.c, there is a possible use after free du ... | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2023-20938 | In binder_transaction_buffer_release of binder.c, there is a possible ... | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2023-21102 | bypass of shadow stack protection due to a logic error | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-2124 | OOB access in the Linux kernel's XFS subsystem | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-21255 | In multiple functions of binder.c, there is a possible memory corrupti ... | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-2156 | IPv6 RPL protocol reachable assertion leads to DoS | linux-libc-dev | 5.10.84-1 | 5.10.179-2 |
HIGH | CVE-2023-2163 | Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe | linux-libc-dev | 5.10.84-1 | 5.10.179-1 |
HIGH | CVE-2023-23559 | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-28410 | Improper restriction in memory buffer in graphics drivers cause escalation of privilege | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2023-28466 | race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-3090 | out-of-bounds write caused by unclear skb->cb | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3111 | Use after free in prepare_to_relocate in fs/btrfs/relocation.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-31248 | use-after-free in nft_chain_lookup_byid() | linux-libc-dev | 5.10.84-1 | 5.10.179-2 |
HIGH | CVE-2023-31436 | out-of-bounds write in qfq_change_class function | linux-libc-dev | 5.10.84-1 | 5.10.179-1 |
HIGH | CVE-2023-32233 | use-after-free in nf_tables when processing batch requests can lead to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.179-1 |
HIGH | CVE-2023-3268 | out-of-bounds access in relay_file_read | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3389 | Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3390 | UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batc | linux-libc-dev | 5.10.84-1 | 5.10.179-3 |
HIGH | CVE-2023-3397 | slab-use-after-free Write in txEnd due to race condition | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2023-34319 | buffer overrun in netback due to unusual packet (XSA-432) | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-35001 | stack-out-of-bounds-read in nft_byteorder_eval() | linux-libc-dev | 5.10.84-1 | 5.10.179-2 |
HIGH | CVE-2023-3567 | use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-35788 | out-of-bounds write in fl_set_geneve_opt() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-35827 | race condition leading to use-after-free in ravb_remove() | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2023-3609 | cls_u32 component reference counter leak if tcf_change_indev() fails | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3610 | fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE | linux-libc-dev | 5.10.84-1 | 5.10.179-3 |
HIGH | CVE-2023-3611 | sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3640 | a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2023-3776 | cls_fw component can be exploited as result of failure in tcf_change_indev function | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3777 | nf_tables | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-3812 | bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
HIGH | CVE-2023-4004 | use-after-free due to improper element removal in nft_pipapo_remove() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-40283 | use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4128 | cls_fw, cls_u32 and cls_route | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4147 | nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4206 | cls_route component can be exploited to achieve local privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4207 | A use-after-free vulnerability in the Linux kernel's cls_fw component that can be exploited to achie | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4208 | cls_u32 UAF | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
HIGH | CVE-2023-4244 | Use-after-free in nft_verdict_dump due to a race between set GC and transaction | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-42753 | potential slab-out-of-bound access due to integer underflow | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-4387 | use-after-free in vmxnet3_rq_alloc_rx_buf() | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
HIGH | CVE-2023-4389 | double free in btrfs_get_root_ref() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
HIGH | CVE-2023-45862 | drivers/usb/storage/ene_ub6250.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
HIGH | CVE-2023-4622 | use after free in unix_stream_sendpage | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-4623 | sch_hfsc UAF | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-46813 | SEV-ES local priv escalation | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2023-4921 | use-after-free in sch_qfq network scheduler | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
HIGH | CVE-2023-5178 | use after free in nvmet_tcp_free_crypto in NVMe | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2023-5717 | A heap out-of-bounds write | linux-libc-dev | 5.10.84-1 | |
HIGH | CVE-2022-1304 | out-of-bounds read/write via crafted filesystem | logsave | 1.46.2-2 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-24048 | mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixe | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24050 | mariadb: lack of validating the existence of an object prior to performing operations on the object | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24051 | mariadb: lack of proper validation of a user-supplied string before using it as a format specifier | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-24052 | mariadb: CONNECT storage engine heap-based buffer overflow | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.13-0+deb11u1 |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32081 | use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32082 | assertion failure at table->get_ref_count() == 0 in dict0dict.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32084 | segmentation fault via the component sub_select | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32089 | exclude_level | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-32091 | free or in copy_fields | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
HIGH | CVE-2022-29458 | segfaulting OOB read | ncurses-base | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | ncurses-base | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2022-29458 | segfaulting OOB read | ncurses-bin | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
HIGH | CVE-2023-29491 | Local users can trigger security-relevant memory corruption via malformed data | ncurses-bin | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
HIGH | CVE-2021-41617 | privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured | openssh-client | 1:8.4p1-5 | |
HIGH | CVE-2022-0778 | Infinite loop in BN_mod_sqrt() reachable when parsing certificates | openssl | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
HIGH | CVE-2022-4450 | double free after calling PEM_read_bio_ex | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0215 | use-after-free following BIO_new_NDEF | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0286 | X.400 address type confusion in X.509 GeneralName | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
HIGH | CVE-2023-0464 | Denial of service by excessive resource usage in verifying X509 policy constraints | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
HIGH | CVE-2020-16156 | Bypass of verification of signatures in CHECKSUMS files | perl | 5.32.1-4+deb11u2 | |
HIGH | CVE-2023-31484 | CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS | perl | 5.32.1-4+deb11u2 | |
HIGH | CVE-2020-16156 | Bypass of verification of signatures in CHECKSUMS files | perl-base | 5.32.1-4+deb11u2 | |
HIGH | CVE-2023-31484 | CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS | perl-base | 5.32.1-4+deb11u2 | |
HIGH | CVE-2020-16156 | Bypass of verification of signatures in CHECKSUMS files | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2023-31484 | CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | python3.9 | 3.9.2-1 | |
HIGH | CVE-2020-10735 | int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to | python3.9 | 3.9.2-1 | |
HIGH | CVE-2021-3737 | HTTP client possible infinite loop on a 100 Continue response | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-0391 | urllib.parse does not sanitize URLs containing ASCII newline and tabs | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-42919 | local privilege escalation via the multiprocessing forkserver start method | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-45061 | CPU denial of service via inefficient IDNA decoder | python3.9 | 3.9.2-1 | |
HIGH | CVE-2023-24329 | urllib.parse url blocklisting bypass | python3.9 | 3.9.2-1 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2020-10735 | int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2021-3737 | HTTP client possible infinite loop on a 100 Continue response | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-0391 | urllib.parse does not sanitize URLs containing ASCII newline and tabs | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-42919 | local privilege escalation via the multiprocessing forkserver start method | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-45061 | CPU denial of service via inefficient IDNA decoder | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2023-24329 | urllib.parse url blocklisting bypass | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-24070 | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption | subversion | 1.14.1-3 | 1.14.1-3+deb11u1 |
HIGH | CVE-2022-1271 | arbitrary-file-write vulnerability | xz-utils | 5.2.5-2 | 5.2.5-2.1~deb11u1 |
HIGH | CVE-2018-25032 | A flaw found in zlib when compressing (not decompressing) certain inputs | zlib1g | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
HIGH | CVE-2018-25032 | A flaw found in zlib when compressing (not decompressing) certain inputs | zlib1g-dev | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
HIGH | CVE-2023-37920 | Removal of e-Tugra root certificate | certifi | 2021.10.8 | 2023.7.22 |
HIGH | CVE-2023-0286 | X.400 address type confusion in X.509 GeneralName | cryptography | 38.0.4 | 39.0.1 |
HIGH | CVE-2022-40897 | Regular Expression Denial of Service (ReDoS) in package_index.py | setuptools | 57.5.0 | 65.5.1 |
HIGH | CVE-2023-30798 | There MultipartParser usage in Encode's Starlette python framework bef ... | starlette | 0.14.2 | 0.25.0 |
HIGH | CVE-2022-40898 | remote attackers can cause denial of service via attacker controlled input to wheel cli | wheel | 0.36.2 | 0.38.1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | bsdutils | 1:2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | bsdutils | 1:2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | cpp-10 | 10.2.1-6 | |
MEDIUM | CVE-2021-22947 | Server responses received before STARTTLS processed after TLS handshake | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | Set-Cookie denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | HTTP compression denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | FTP-KRB bad message verification | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-43552 | Use-after-free triggered by an HTTP proxy deny response | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
MEDIUM | CVE-2023-23915 | HSTS amnesia with --parallel | curl | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2023-23916 | HTTP multi-header compression denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 |
MEDIUM | CVE-2023-27535 | FTP too eager connection reuse | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27536 | GSS delegation too eager connection re-use | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27538 | SSH connection too eager reuse still | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-28321 | IDN wildcard match may lead to Improper Cerificate Validation | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | dirmngr | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-48554 | stack-based buffer over-read in file_copystr in funcs.c | file | 1:5.39-3 | 1:5.39-3+deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | g++-10 | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | gcc-10 | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | gcc-10-base | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | gcc-9-base | 9.3.0-22 | |
MEDIUM | CVE-2023-38633 | Arbitrary file read when xinclude href has special characters | gir1.2-rsvg-2.0 | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 |
MEDIUM | CVE-2022-39253 | exposure of sensitive information to a malicious actor | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
MEDIUM | CVE-2023-22490 | data exfiltration with maliciously crafted repository | git | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 |
MEDIUM | CVE-2022-39253 | exposure of sensitive information to a malicious actor | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 |
MEDIUM | CVE-2023-22490 | data exfiltration with maliciously crafted repository | git-man | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gnupg | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gnupg-l10n | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gnupg-utils | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpg | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpg-agent | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpg-wks-client | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpg-wks-server | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpgconf | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpgsm | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | Signature spoofing via status line injection | gpgv | 2.2.27-2 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | imagemagick | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | imagemagick | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | krb5-multidev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2020-36130 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
MEDIUM | CVE-2020-36135 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... | libaom0 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 |
MEDIUM | CVE-2022-25147 | out-of-bounds writes in the apr_base64 | libaprutil1 | 1.6.1-5 | 1.6.1-5+deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libasan6 | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libatomic1 | 10.2.1-6 | |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libblkid-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libblkid-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libblkid1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libblkid1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3658 | adapter incorrectly restores Discoverable state after powered down | libbluetooth-dev | 5.55-3.1 | |
MEDIUM | CVE-2021-41229 | bluez: memory leak in the SDP protocol | libbluetooth-dev | 5.55-3.1 | |
MEDIUM | CVE-2021-3658 | adapter incorrectly restores Discoverable state after powered down | libbluetooth3 | 5.55-3.1 | |
MEDIUM | CVE-2021-41229 | bluez: memory leak in the SDP protocol | libbluetooth3 | 5.55-3.1 | |
MEDIUM | CVE-2023-4806 | potential use-after-free in getaddrinfo() | libc-bin | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4813 | potential use-after-free in gaih_inet() | libc-bin | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4806 | potential use-after-free in getaddrinfo() | libc-dev-bin | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4813 | potential use-after-free in gaih_inet() | libc-dev-bin | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4806 | potential use-after-free in getaddrinfo() | libc6 | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4813 | potential use-after-free in gaih_inet() | libc6 | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4806 | potential use-after-free in getaddrinfo() | libc6-dev | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4813 | potential use-after-free in gaih_inet() | libc6-dev | 2.31-13+deb11u2 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libcc1-0 | 10.2.1-6 | |
MEDIUM | CVE-2021-22947 | Server responses received before STARTTLS processed after TLS handshake | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | Set-Cookie denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | HTTP compression denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | FTP-KRB bad message verification | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-43552 | Use-after-free triggered by an HTTP proxy deny response | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
MEDIUM | CVE-2023-23915 | HSTS amnesia with --parallel | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2023-23916 | HTTP multi-header compression denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 |
MEDIUM | CVE-2023-27535 | FTP too eager connection reuse | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27536 | GSS delegation too eager connection re-use | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27538 | SSH connection too eager reuse still | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-28321 | IDN wildcard match may lead to Improper Cerificate Validation | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
MEDIUM | CVE-2021-22947 | Server responses received before STARTTLS processed after TLS handshake | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | Set-Cookie denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | HTTP compression denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | FTP-KRB bad message verification | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-43552 | Use-after-free triggered by an HTTP proxy deny response | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
MEDIUM | CVE-2023-23915 | HSTS amnesia with --parallel | libcurl4 | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2023-23916 | HTTP multi-header compression denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 |
MEDIUM | CVE-2023-27535 | FTP too eager connection reuse | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27536 | GSS delegation too eager connection re-use | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27538 | SSH connection too eager reuse still | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-28321 | IDN wildcard match may lead to Improper Cerificate Validation | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
MEDIUM | CVE-2021-22947 | Server responses received before STARTTLS processed after TLS handshake | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | Set-Cookie denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | HTTP compression denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | FTP-KRB bad message verification | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-43552 | Use-after-free triggered by an HTTP proxy deny response | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 |
MEDIUM | CVE-2023-23915 | HSTS amnesia with --parallel | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2023-23916 | HTTP multi-header compression denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 |
MEDIUM | CVE-2023-27535 | FTP too eager connection reuse | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27536 | GSS delegation too eager connection re-use | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-27538 | SSH connection too eager reuse still | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 |
MEDIUM | CVE-2023-28321 | IDN wildcard match may lead to Improper Cerificate Validation | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
MEDIUM | CVE-2023-32570 | VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that ca ... | libdav1d4 | 0.7.1-3 | |
MEDIUM | CVE-2020-21594 | libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fal ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21595 | libde265 v1.0.4 contains a heap buffer overflow in the mc_luma functio ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21596 | libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_ ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21597 | libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma funct ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21599 | libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21600 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pr ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21601 | libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallb ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21602 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bi ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21603 | libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fa ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21604 | libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21605 | libde265 v1.0.4 contains a segmentation fault in the apply_sao_interna ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2020-21606 | libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_ ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2021-35452 | An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2021-36408 | An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2021-36410 | A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2021-36411 | An issue has been found in libde265 v1.0.8 due to incorrect access con ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43235 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43236 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43237 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43238 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43239 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43240 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43241 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43242 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43243 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43244 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43245 | Libde265 v1.0.8 was discovered to contain a segmentation violation via ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43248 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43249 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43250 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43252 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2022-43253 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24751 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24752 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24754 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24755 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24756 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24757 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-24758 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference ... | libde265-0 | 1.0.8-1 | 1.0.11-0+deb11u1 |
MEDIUM | CVE-2023-27102 | Libde265 v1.0.11 was discovered to contain a segmentation violation vi ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2021-46310 | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... | libdjvulibre-dev | 3.5.28-2 | |
MEDIUM | CVE-2021-46312 | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... | libdjvulibre-dev | 3.5.28-2 | |
MEDIUM | CVE-2021-46310 | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... | libdjvulibre-text | 3.5.28-2 | |
MEDIUM | CVE-2021-46312 | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... | libdjvulibre-text | 3.5.28-2 | |
MEDIUM | CVE-2021-46310 | An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ... | libdjvulibre21 | 3.5.28-2 | |
MEDIUM | CVE-2021-46312 | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ... | libdjvulibre21 | 3.5.28-2 | |
MEDIUM | CVE-2022-25313 | Stack exhaustion in doctype parsing | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u2 |
MEDIUM | CVE-2022-25313 | Stack exhaustion in doctype parsing | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u2 |
MEDIUM | CVE-2022-25309 | fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
MEDIUM | CVE-2022-25310 | fribidi: SEGV in fribidi_remove_bidi_marks | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libgcc-10-dev | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libgcc-s1 | 10.2.1-6 | |
MEDIUM | CVE-2023-32611 | g_variant_byteswap() can take a long time with some non-normal inputs | libglib2.0-0 | 2.66.8-1 | |
MEDIUM | CVE-2023-32665 | GVariant deserialisation does not match spec for non-normal data | libglib2.0-0 | 2.66.8-1 | |
MEDIUM | CVE-2023-32611 | g_variant_byteswap() can take a long time with some non-normal inputs | libglib2.0-bin | 2.66.8-1 | |
MEDIUM | CVE-2023-32665 | GVariant deserialisation does not match spec for non-normal data | libglib2.0-bin | 2.66.8-1 | |
MEDIUM | CVE-2023-32611 | g_variant_byteswap() can take a long time with some non-normal inputs | libglib2.0-data | 2.66.8-1 | |
MEDIUM | CVE-2023-32665 | GVariant deserialisation does not match spec for non-normal data | libglib2.0-data | 2.66.8-1 | |
MEDIUM | CVE-2023-32611 | g_variant_byteswap() can take a long time with some non-normal inputs | libglib2.0-dev | 2.66.8-1 | |
MEDIUM | CVE-2023-32665 | GVariant deserialisation does not match spec for non-normal data | libglib2.0-dev | 2.66.8-1 | |
MEDIUM | CVE-2023-32611 | g_variant_byteswap() can take a long time with some non-normal inputs | libglib2.0-dev-bin | 2.66.8-1 | |
MEDIUM | CVE-2023-32665 | GVariant deserialisation does not match spec for non-normal data | libglib2.0-dev-bin | 2.66.8-1 | |
MEDIUM | CVE-2021-4209 | Null pointer dereference in MD_UPDATE | libgnutls30 | 3.7.1-5 | 3.7.1-5+deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libgomp1 | 10.2.1-6 | |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libgssrpc4 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2022-33068 | integer overflow in the component hb-ot-shape-fallback.cc | libharfbuzz0b | 2.7.4-1 | |
MEDIUM | CVE-2023-29659 | A Segmentation fault caused by a floating point exception exists in li ... | libheif1 | 1.11.0-1 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libitm1 | 10.2.1-6 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg-dev | 1:2.0.6-4 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg62-turbo | 1:2.0.6-4 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg62-turbo-dev | 1:2.0.6-4 | |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libk5crypto3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkdb5-10 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkrb5-3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkrb5-dev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-36054 | Denial of service through freeing uninitialized pointer | libkrb5support0 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | liblsan0 | 10.2.1-6 | |
MEDIUM | CVE-2022-48554 | stack-based buffer over-read in file_copystr in funcs.c | libmagic-mgc | 1:5.39-3 | 1:5.39-3+deb11u1 |
MEDIUM | CVE-2022-48554 | stack-based buffer over-read in file_copystr in funcs.c | libmagic1 | 1:5.39-3 | 1:5.39-3+deb11u1 |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-44267 | Denial of Service when it parses a PNG image | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2022-44268 | vulnerable to Information Disclosure when it parses a PNG image | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | 8:6.9.11.60+dfsg-1.3+deb11u1 |
MEDIUM | CVE-2023-1289 | ImageMagick: Specially crafted SVG leads to segmentation fault and generate trash files in "/tmp", p | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-1906 | heap-based buffer overflow in ImportMultiSpectralQuantum() in MagickCore/quantum-import.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-2157 | heap overflow vulnerability | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3195 | stack overflow in coders/tiff.c while parsing malicious tiff file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-34151 | Undefined behaviors of casting double to size_t in svg, mvg and other coders | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2023-3428 | heap-buffer-overflow in coders/tiff.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-35604 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46659 | mariadb: Crash executing query with VIEW, aggregate and subquery | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46661 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an u | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46662 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46663 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT state | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46664 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL v | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46665 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_ta | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46667 | mariadb: Integer overflow in sql_lex.cc integer leading to crash | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46668 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT stateme | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31621 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31622 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31623 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31624 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-38791 | compress_write() fails to release mutex on failure | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
MEDIUM | CVE-2022-47015 | print_warnings() | libmariadb-dev | 1:10.5.12-0+deb11u1 | 1:10.5.20-0+deb11u1 |
MEDIUM | CVE-2021-35604 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46659 | mariadb: Crash executing query with VIEW, aggregate and subquery | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46661 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an u | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46662 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46663 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT state | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46664 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL v | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46665 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_ta | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46667 | mariadb: Integer overflow in sql_lex.cc integer leading to crash | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46668 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT stateme | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31621 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31622 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31623 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31624 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-38791 | compress_write() fails to release mutex on failure | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
MEDIUM | CVE-2022-47015 | print_warnings() | libmariadb-dev-compat | 1:10.5.12-0+deb11u1 | 1:10.5.20-0+deb11u1 |
MEDIUM | CVE-2021-35604 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46659 | mariadb: Crash executing query with VIEW, aggregate and subquery | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46661 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an u | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46662 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46663 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT state | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46664 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL v | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46665 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_ta | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46667 | mariadb: Integer overflow in sql_lex.cc integer leading to crash | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46668 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT stateme | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31621 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31622 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31623 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31624 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-38791 | compress_write() fails to release mutex on failure | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
MEDIUM | CVE-2022-47015 | print_warnings() | libmariadb3 | 1:10.5.12-0+deb11u1 | 1:10.5.20-0+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libmount-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libmount-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libmount1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libmount1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-23215 | initializeBuffers | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-26260 | initializeBuffers | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3598 | readChars | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3605 | Heap buffer overflow in the rleUncompress function | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3933 | bytesPerDeepLineTable | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3941 | RGBtoXYZ | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-45942 | execute | libopenexr-dev | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-23215 | initializeBuffers | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-26260 | initializeBuffers | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3598 | readChars | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3605 | Heap buffer overflow in the rleUncompress function | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3933 | bytesPerDeepLineTable | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-3941 | RGBtoXYZ | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-45942 | execute | libopenexr25 | 2.5.4-2 | 2.5.4-2+deb11u1 |
MEDIUM | CVE-2021-29338 | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c | libopenjp2-7 | 2.4.0-3 | |
MEDIUM | CVE-2022-1122 | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | libopenjp2-7 | 2.4.0-3 | |
MEDIUM | CVE-2021-29338 | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c | libopenjp2-7-dev | 2.4.0-3 | |
MEDIUM | CVE-2022-1122 | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | libopenjp2-7-dev | 2.4.0-3 | |
MEDIUM | CVE-2023-37769 | stress-test master commit e4c878 was discovered to contain a FPE vulne ... | libpixman-1-0 | 0.40.0-1 | |
MEDIUM | CVE-2023-37769 | stress-test master commit e4c878 was discovered to contain a FPE vulne ... | libpixman-1-dev | 0.40.0-1 | |
MEDIUM | CVE-2023-2455 | row security policies disregard user ID changes after inlining. | libpq-dev | 13.5-0+deb11u1 | 13.11-0+deb11u1 |
MEDIUM | CVE-2023-2455 | row security policies disregard user ID changes after inlining. | libpq5 | 13.5-0+deb11u1 | 13.11-0+deb11u1 |
MEDIUM | CVE-2023-4016 | ps buffer overflow | libprocps8 | 2:3.3.17-5 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | ftplib should not use the host from the PASV response | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2023-27043 | Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2023-40217 | TLS handshake bypass | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | ftplib should not use the host from the PASV response | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2023-27043 | Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2023-40217 | TLS handshake bypass | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libquadmath0 | 10.2.1-6 | |
MEDIUM | CVE-2023-38633 | Arbitrary file read when xinclude href has special characters | librsvg2-2 | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 |
MEDIUM | CVE-2023-38633 | Arbitrary file read when xinclude href has special characters | librsvg2-common | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 |
MEDIUM | CVE-2023-38633 | Arbitrary file read when xinclude href has special characters | librsvg2-dev | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libsmartcols1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libsmartcols1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-4160 | openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
MEDIUM | CVE-2022-2097 | AES OCB fails to encrypt some bytes | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2022-4304 | timing attack in RSA Decryption implementation | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2023-0465 | Invalid certificate policies in leaf certificates are silently ignored | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-0466 | Certificate policy check not enabled | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-2650 | Possible DoS translating ASN.1 object identifiers | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-3446 | Excessive time spent checking DH keys and parameters | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2023-3817 | Excessive time spent checking DH q parameter value | libssl-dev | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2021-4160 | openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
MEDIUM | CVE-2022-2097 | AES OCB fails to encrypt some bytes | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2022-4304 | timing attack in RSA Decryption implementation | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2023-0465 | Invalid certificate policies in leaf certificates are silently ignored | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-0466 | Certificate policy check not enabled | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-2650 | Possible DoS translating ASN.1 object identifiers | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-3446 | Excessive time spent checking DH keys and parameters | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2023-3817 | Excessive time spent checking DH q parameter value | libssl1.1 | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libstdc++-10-dev | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libstdc++6 | 10.2.1-6 | |
MEDIUM | CVE-2021-28544 | SVN authz protected copyfrom paths regression | libsvn1 | 1.14.1-3 | 1.14.1-3+deb11u1 |
MEDIUM | CVE-2021-3997 | Uncontrolled recursion in systemd-tmpfiles when removing files | libsystemd0 | 247.3-6 | 247.3-7 |
MEDIUM | CVE-2022-3821 | buffer overrun in format_timespan() function | libsystemd0 | 247.3-6 | 247.3-7+deb11u2 |
MEDIUM | CVE-2022-4415 | local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting | libsystemd0 | 247.3-6 | 247.3-7+deb11u2 |
MEDIUM | CVE-2022-0561 | libtiff: Denial of Service via crafted TIFF file | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0562 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0865 | libtiff: reachable assertion | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0907 | tiff: NULL Pointer Dereference in tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0908 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0909 | tiff: Divide By Zero error in tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0924 | libtiff: Out-of-bounds Read error in tiffcp | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1355 | stack-buffer-overflow in tiffcp.c in main() | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2056 | division by zero issues in tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2057 | division by zero issues in tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2058 | division by zero issues in tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-22844 | out-of-bounds read in _TIFFmemcpy() in tif_unix.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-2519 | Double free or corruption in rotateImage() function at tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2520 | Assertion fail in rotateImage() function at tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2521 | Invalid pointer free operation in TIFFClose() at tif_close.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2867 | uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2868 | Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2869 | tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSample | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2953 | heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-34526 | A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3570 | heap Buffer overflows in tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3597 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3598 | out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3599 | out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3626 | out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3627 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-40090 | infinite loop via a crafted TIFF file | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2022-4645 | out-of-bounds read in tiffcp in tools/tiffcp.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-48281 | heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-0795 | out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0796 | out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0797 | out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0798 | out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0799 | use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0800 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0801 | out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcro | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0802 | out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0803 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0804 | out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-25433 | Buffer Overflow via /libtiff/tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-25435 | heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-26965 | heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-26966 | Buffer Overflow in uv_encode() | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-2908 | null pointer dereference in tif_dir.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-30086 | Heap buffer overflow in tiffcp() at tiffcp.c | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-30774 | heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value | libtiff-dev | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-3316 | null pointer dereference in TIFFClose() | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-3576 | memory leak in tiffcrop.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-3618 | segmentation fault in Fax3Encode in libtiff/tif_fax3.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-40745 | integer overflow in tiffcp.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2023-41175 | potential integer overflow in raw2tiff.c | libtiff-dev | 4.2.0-1 | |
MEDIUM | CVE-2022-0561 | libtiff: Denial of Service via crafted TIFF file | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0562 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0865 | libtiff: reachable assertion | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0907 | tiff: NULL Pointer Dereference in tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0908 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0909 | tiff: Divide By Zero error in tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0924 | libtiff: Out-of-bounds Read error in tiffcp | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1355 | stack-buffer-overflow in tiffcp.c in main() | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2056 | division by zero issues in tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2057 | division by zero issues in tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2058 | division by zero issues in tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-22844 | out-of-bounds read in _TIFFmemcpy() in tif_unix.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-2519 | Double free or corruption in rotateImage() function at tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2520 | Assertion fail in rotateImage() function at tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2521 | Invalid pointer free operation in TIFFClose() at tif_close.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2867 | uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2868 | Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2869 | tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSample | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2953 | heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-34526 | A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3570 | heap Buffer overflows in tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3597 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3598 | out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3599 | out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3626 | out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3627 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-40090 | infinite loop via a crafted TIFF file | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2022-4645 | out-of-bounds read in tiffcp in tools/tiffcp.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-48281 | heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-0795 | out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0796 | out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0797 | out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0798 | out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0799 | use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0800 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0801 | out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcro | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0802 | out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0803 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0804 | out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-25433 | Buffer Overflow via /libtiff/tools/tiffcrop.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-25435 | heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-26965 | heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-26966 | Buffer Overflow in uv_encode() | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-2908 | null pointer dereference in tif_dir.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-30086 | Heap buffer overflow in tiffcp() at tiffcp.c | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-30774 | heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value | libtiff5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-3316 | null pointer dereference in TIFFClose() | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-3576 | memory leak in tiffcrop.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-3618 | segmentation fault in Fax3Encode in libtiff/tif_fax3.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-40745 | integer overflow in tiffcp.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2023-41175 | potential integer overflow in raw2tiff.c | libtiff5 | 4.2.0-1 | |
MEDIUM | CVE-2022-0561 | libtiff: Denial of Service via crafted TIFF file | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0562 | libtiff: Null source pointer lead to Denial of Service via crafted TIFF file | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0865 | libtiff: reachable assertion | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0907 | tiff: NULL Pointer Dereference in tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0908 | tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0909 | tiff: Divide By Zero error in tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-0924 | libtiff: Out-of-bounds Read error in tiffcp | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1355 | stack-buffer-overflow in tiffcp.c in main() | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2056 | division by zero issues in tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2057 | division by zero issues in tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2058 | division by zero issues in tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-22844 | out-of-bounds read in _TIFFmemcpy() in tif_unix.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u1 |
MEDIUM | CVE-2022-2519 | Double free or corruption in rotateImage() function at tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2520 | Assertion fail in rotateImage() function at tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2521 | Invalid pointer free operation in TIFFClose() at tif_close.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2867 | uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2868 | Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2869 | tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSample | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-2953 | heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-34526 | A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3570 | heap Buffer overflows in tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3597 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3598 | out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3599 | out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3626 | out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-3627 | out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-40090 | infinite loop via a crafted TIFF file | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2022-4645 | out-of-bounds read in tiffcp in tools/tiffcp.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2022-48281 | heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-0795 | out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0796 | out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0797 | out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0798 | out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0799 | use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0800 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0801 | out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcro | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0802 | out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0803 | out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-0804 | out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-25433 | Buffer Overflow via /libtiff/tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-25435 | heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u4 |
MEDIUM | CVE-2023-26965 | heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-26966 | Buffer Overflow in uv_encode() | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-2908 | null pointer dereference in tif_dir.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-30086 | Heap buffer overflow in tiffcp() at tiffcp.c | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-30774 | heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value | libtiffxx5 | 4.2.0-1 | 4.2.0-1+deb11u3 |
MEDIUM | CVE-2023-3316 | null pointer dereference in TIFFClose() | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-3576 | memory leak in tiffcrop.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-3618 | segmentation fault in Fax3Encode in libtiff/tif_fax3.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-40745 | integer overflow in tiffcp.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-41175 | potential integer overflow in raw2tiff.c | libtiffxx5 | 4.2.0-1 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libtsan0 | 10.2.1-6 | |
MEDIUM | CVE-2023-4039 | -fstack-protector fails to guard dynamic stack allocations on ARM64 | libubsan1 | 10.2.1-6 | |
MEDIUM | CVE-2021-3997 | Uncontrolled recursion in systemd-tmpfiles when removing files | libudev1 | 247.3-6 | 247.3-7 |
MEDIUM | CVE-2022-3821 | buffer overrun in format_timespan() function | libudev1 | 247.3-6 | 247.3-7+deb11u2 |
MEDIUM | CVE-2022-4415 | local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting | libudev1 | 247.3-6 | 247.3-7+deb11u2 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | libuuid1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | libuuid1 | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2023-43785 | out-of-bounds memory access in _XkbReadKeySyms() | libx11-6 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2023-43786 | stack exhaustion from infinite recursion in PutSubImage() | libx11-6 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2023-43785 | out-of-bounds memory access in _XkbReadKeySyms() | libx11-data | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2023-43786 | stack exhaustion from infinite recursion in PutSubImage() | libx11-data | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2023-43785 | out-of-bounds memory access in _XkbReadKeySyms() | libx11-dev | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2023-43786 | stack exhaustion from infinite recursion in PutSubImage() | libx11-dev | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 |
MEDIUM | CVE-2016-3709 | Incorrect server side include parsing can lead to XSS | libxml2 | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2022-29824 | integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u2 |
MEDIUM | CVE-2023-28484 | NULL dereference in xmlSchemaFixupComplexType | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u4 |
MEDIUM | CVE-2023-29469 | Hashing of empty dict strings isn't deterministic | libxml2 | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u4 |
MEDIUM | CVE-2023-39615 | crafted xml can cause global buffer overflow | libxml2 | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2023-45322 | use-after-free in xmlUnlinkNode() in tree.c | libxml2 | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2016-3709 | Incorrect server side include parsing can lead to XSS | libxml2-dev | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2022-29824 | integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u2 |
MEDIUM | CVE-2023-28484 | NULL dereference in xmlSchemaFixupComplexType | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u4 |
MEDIUM | CVE-2023-29469 | Hashing of empty dict strings isn't deterministic | libxml2-dev | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u4 |
MEDIUM | CVE-2023-39615 | crafted xml can cause global buffer overflow | libxml2-dev | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2023-45322 | use-after-free in xmlUnlinkNode() in tree.c | libxml2-dev | 2.9.10+dfsg-6.7 | |
MEDIUM | CVE-2019-15213 | kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2019-15794 | Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcou | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2019-16089 | Improper return check in nbd_genl_status function in drivers/block/nbd.c | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2019-20794 | task processes not being properly ended could lead to resource exhaustion | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2020-12363 | kernel: Improper input validation in some Intel(R) Graphics Drivers | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2020-12364 | kernel: Null pointer dereference in some Intel(R) Graphics Drivers | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2020-14304 | ethtool when reading eeprom of device could lead to memory leak | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2020-24504 | kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2020-36310 | kernel: infinite loop in set_memory_region_test in arch/x86/kvm/svm/svm.c for certain nested page fa | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2020-36516 | kernel: off-path attacker may inject data or terminate victim's TCP session | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2020-36694 | use-after-free in the packet processing context | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-26401 | hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2021-28711 | rogue backends can cause DoS of guests via high frequency events | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-28712 | rogue backends can cause DoS of guests via high frequency events | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-28713 | rogue backends can cause DoS of guests via high frequency events | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-28714 | Guest can force Linux netback driver to hog large amounts of kernel me ... | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-28715 | Guest can force Linux netback driver to hog large amounts of kernel me ... | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-33061 | kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapter | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-33655 | malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
MEDIUM | CVE-2021-33656 | when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2021-3669 | reading /proc/sysvipc/shm does not scale with large shared memory segment counts | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-3759 | unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2021-4023 | kernel: Improper IO-uring request cancellation operation allows local users to cause a crash | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-4149 | kernel: Improper lock operation in btrfs | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-4155 | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-43976 | kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
MEDIUM | CVE-2021-44879 | NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2021-45095 | kernel: refcount leak in pep_sock_accept() in net/phonet/pep.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-45402 | pointer leak in check_alu_op() of kernel/bpf/verifier.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2021-45480 | kernel: memory leak in the __rds_conn_create() in net/rds/connection.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2022-0001 | Branch History Injection (BHI) | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-0002 | Intra-Mode BTI | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-0168 | smb2_ioctl_query_info NULL pointer dereference | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-0171 | cache incoherence issue in SEV API may lead to kernel crash | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-0480 | memcg does not limit the number of POSIX file locks allowing memory exhaustion | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-0487 | use after free in moxart_remove | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-0494 | information leak in scsi_ioctl() | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-0617 | NULL pointer dereference in udf_expand_file_adinicbdue() during writeback | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-0854 | swiotlb information leak with DMA_FROM_DEVICE | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1016 | uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1184 | use-after-free and memory errors in ext4 when mounting and operating on a corrupted image | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-1195 | A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1198 | use-after-free in drivers/net/hamradio/6pack.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1204 | kernel: Use after free in net/ax25/af_ax25.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1205 | kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1280 | concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-1462 | possible race condition in drivers/tty/tty_buffers.c | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-1508 | kernel: out-of-bounds read in iov_iter_revert() in lib/iov_iter.c | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1516 | null-ptr-deref caused by x25_disconnect | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-1789 | NULL pointer dereference in kvm_mmu_invpcid_gva | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1852 | NULL pointer dereference in x86_emulate_insn may lead to DoS | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1974 | use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1975 | kernel: sleep in atomic bug when firmware download timeout | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-20008 | In mmc_blk_read_single of block.c, there is a possible way to read ker ... | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-20132 | kernel: Out of bounds read in lg_probe and related functions of hid-lg.c | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2022-20153 | possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-20154 | possible use after free in lock_sock_nested of sock.c for the SCTP protocol | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2022-20369 | kernel: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-20409 | In io_identity_cow of io_uring.c, there is a possible way to corrupt m ... | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-20423 | In rndis_set_response of rndis.c, there is a possible out of bounds wr ... | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-20572 | missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-2078 | buffer overflow in nft_set_desc_concat_parse() | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-21123 | incomplete clean-up of multi-core shared buffers (aka SBDR) | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21125 | incomplete clean-up of microarchitectural fill buffers (aka SBDS) | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21166 | incomplete clean-up in specific special register write operations (aka DRPW) | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21499 | possible to use the debugger to write zero into a location of choice | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-21505 | lockdown bypass using IMA | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-2153 | NULL pointer dereference in kvm_irq_delivery_to_apic_fast() | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2022-2318 | Kernel: A use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
MEDIUM | CVE-2022-2380 | kernel: vulnerability in sm712fb driver | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-23960 | Spectre-BHB | linux-libc-dev | 5.10.84-1 | 5.10.106-1 |
MEDIUM | CVE-2022-24959 | memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
MEDIUM | CVE-2022-2503 | LoadPin bypass via dm-verity table reload | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2022-25258 | kernel: security issues in the OS descriptor handling section of composite_setup function (composite | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
MEDIUM | CVE-2022-25375 | kernel: information disclosure in drivers/usb/gadget/function/rndis.c | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
MEDIUM | CVE-2022-2586 | nf_tables cross-table potential use-after-free may lead to local privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-26373 | Post-barrier Return Stack Buffer Predictions | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-2663 | nf_conntrack_irc message handling issue | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-26966 | heap memory leak in drivers/net/usb/sr9700.c | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2022-27672 | Cross-Thread Return Address Predictions | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-28356 | kernel: refcount leak in llc_ui_bind and llc_ui_autobind | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-28388 | double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-28389 | kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-2873 | an out-of-bounds vulnerability in i2c-ismt driver | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2022-2905 | slab-out-of-bound read in bpf | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2022-29900 | RetBleed Arbitrary Speculative Code Execution with Return Instructions | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-29901 | RetBleed Arbitrary Speculative Code Execution with Return Instructions | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-3061 | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-3078 | kernel: NULL pointer dereference in drivers/media/test-drivers/vidtv/vidtv_s302m.c | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-3104 | NULL pointer dereference in lkdtm_ARRAY_BOUNDS | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2022-3105 | NULL pointer dereference in uapi_finalize() | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2022-3106 | NULL pointer dereference in ef100_update_stats() | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2022-3107 | NULL pointer dereference in netvsc_get_ethtool_stats() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-3108 | NULL pointer dereference in kfd_parse_subtype_iolink() | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-3111 | memory leak in free_charger_irq() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-3112 | NULL pointer dereference in amvdec_add_ts() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-3113 | NULL pointer dereference in mtk_vcodec_fw_vpu_init() | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2022-3114 | NULL pointer dereference in imx_register_uart_clocks() | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-3115 | NULL pointer dereference in malidp_crtc_reset() | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2022-3169 | Kernel: Request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET may cause a DOS. | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-3303 | race condition in snd_pcm_oss_sync leads to NULL pointer dereference | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-3344 | nested shutdown interception could lead to host crash | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-33744 | Arm guests can cause Dom0 DoS via PV devices When mapping pages of gue ... | linux-libc-dev | 5.10.84-1 | 5.10.127-2 |
MEDIUM | CVE-2022-3435 | out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-3523 | race when faulting a device private page in memory manager | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-3524 | memory leak in ipv6_renew_options() | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-3567 | data races around sk->sk_prot | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-3586 | net scheduler use-after-free information disclosure vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-3594 | Rate limit overflow messages in r8152 in intr_callback | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-3621 | kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-3628 | USB-accessible buffer overflow in brcmfmac | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-36280 | out-of-bounds write in vmw_kms_cursor_snoop | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2022-3643 | Xen Security Advisory 423 v1: Guests can trigger NIC interface reset/abort/crash via netback | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-3646 | kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-36879 | xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2022-3707 | Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2022-38457 | use-after-free in vmw_cmd_res_check | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-3903 | An invalid pipe direction in the mceusb driver cause the kernel to DOS | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-39188 | unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-39190 | nf_tables disallow binding to already bound chain | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2022-39842 | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-40133 | use-after-free in vmw_execbuf_tie_context | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-40307 | kernel: use-after-free in efi_capsule_write in capsule-loader.c | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-40768 | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in driver | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-40982 | Gather Data Sampling (GDS) side channel vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.179-5 |
MEDIUM | CVE-2022-41218 | Report vmalloc UAF in dvb-core/dmxdev | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2022-4129 | missing lock when clearing sk_user_data can lead to NULL pointer dereference | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2022-41849 | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-41850 | Race condition in roccat_report_event in drivers/hid/hid-roccat.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-42328 | CVE-2022-42329 kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in Linux netback dr | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-42329 | CVE-2022-42328 CVE-2022-42329 kernel: Xen Security Advisory 424 v1: guests can trigger deadlock in L | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-42432 | uninitialized variable information disclosure vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-4269 | CPU soft lockup in TC mirred egress-to-ingress action | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2022-42703 | use-after-free related to leaf anon_vma double reuse | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2022-42721 | BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-42722 | Denial of service in beacon protection for P2P-device | linux-libc-dev | 5.10.84-1 | 5.10.149-1 |
MEDIUM | CVE-2022-42895 | Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2022-43750 | memory corruption in usbmon driver | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-4382 | kernel: usb: use-after-free write in put_dev | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2022-4543 | KASLR Prefetch Bypass Breaks KPTI | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2022-4662 | Recursive locking violation in usb-storage that can cause the kernel to deadlock | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2022-47929 | NULL pointer dereference in traffic control subsystem | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2022-47946 | Linux kernel: use-after-free in io_sqpoll_wait_sq | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2023-0160 | possibility of deadlock in libbpf function sock_hash_delete_elem | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-0394 | NULL pointer dereference in rawv6_push_pending_frames | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-0458 | speculative pointer dereference in do_prlimit() in kernel/sys.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-0459 | Copy_from_user on 64-bit versions may leak kernel information | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-0590 | use-after-free due to race condition in qdisc_graft() | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2023-0597 | Randomize per-cpu entry area | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-0615 | multiple issues for the Video for Linux version 2 test driver | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2023-1073 | check empty report_list in hid_validate_values() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1074 | fail if no bound addresses can be used for a given scope | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1076 | correctly initialize socket uid | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1079 | Use After Free in asus_remove() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1095 | NULL pointer dereference in nf_tables due to zeroed list head | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2023-1192 | use-after-free in smb2_is_status_io_timeout() | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-1206 | hash collisions in the IPv6 connection lookup table | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-1249 | missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump co | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2023-1382 | denial of service in tipc_conn_close | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2023-1582 | Soft lockup occurred during __page_mapcount | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2023-1611 | Kernel: race between quota disable and quota assign ioctls in fs/btrfs/ioctl.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1637 | save/restore speculative MSRs during S3 suspend/resume | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
MEDIUM | CVE-2023-1855 | use-after-free bug in remove function xgene_hwmon_remove | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1859 | kernel: Use after free in xen_9pfs_front_remove due to race condition | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1990 | Use after free bug in ndlc_remove due to race condition | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-1998 | Spectre v2 SMT mitigations problem | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-2002 | Unauthorized management command execution | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-20569 | Return Address Predictor velunerability leading to information disclosure | linux-libc-dev | 5.10.84-1 | 5.10.179-5 |
MEDIUM | CVE-2023-20588 | division-by-zero may resulting in loss of confidentiality | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-20593 | Cross-Process Information Leak | linux-libc-dev | 5.10.84-1 | 5.10.179-3 |
MEDIUM | CVE-2023-21400 | io_defer_entry object double free vulnerability | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-2162 | UAF during login when accessing the shost ipaddress | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-2166 | NULL pointer dereference in can_rcv_filter | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-2177 | NULL pointer dereference problem in sctp_sched_dequeue_common | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
MEDIUM | CVE-2023-2194 | out-of-bounds write in xgene_slimpro_i2c_xfer() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-2269 | A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-22998 | improper return value check in virtio_gpu_object_shmem_init() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-22999 | kernel: usb: dwc3: qcom: improper return value check in dwc3_qcom_probe() | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2023-23002 | kernel: incorrect check for error case in the qca_serdev_probe | linux-libc-dev | 5.10.84-1 | 5.10.103-1 |
MEDIUM | CVE-2023-23004 | kernel: incorrect check for error case in the malidp_check_pages_threshold | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-23006 | kernel: incorrect check for error case in the mlx5_get_uars_page | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
MEDIUM | CVE-2023-23454 | slab-out-of-bounds read vulnerabilities in cbq_classify | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-23455 | denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-23586 | kernel: io_uring: read use-after-free can lead to kernel memory leak | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-25012 | kernel: hid: use-after-free in bigben_set_led() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-2513 | use-after-free in ext4_xattr_set_entry() | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
MEDIUM | CVE-2023-26545 | double free on sysctl allocation failure | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-28327 | denial of service problem in net/unix/diag.c | linux-libc-dev | 5.10.84-1 | 5.10.162-1 |
MEDIUM | CVE-2023-28328 | A denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-2860 | out-of-bounds read when setting HMAC data | linux-libc-dev | 5.10.84-1 | 5.10.148-1 |
MEDIUM | CVE-2023-2898 | A null-ptr-deref bug in f2fs_write_end_io in fs/f2fs/data.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-2985 | use-after-free issue in hfsplus_release_folio in fs/hfsplus/super.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-3006 | Add Spectre-BHB mitigation for AmpereOne | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
MEDIUM | CVE-2023-30456 | missing consistency checks for CR0 and CR4 | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-31082 | sleeping function called from an invalid context in gsmld_write | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-31083 | race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-31084 | blocking operation in dvb_frontend_get_event and wait_event_interruptible | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-3159 | use after free issue in driver/firewire in outbound_phy_packet_callback | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2023-3161 | shift-out-of-bounds in fbcon_set_font() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-3212 | NULL pointer dereference in gfs2_evict_inode() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-3220 | NULL pointer dereference in dpu_crtc_atomic_check() in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-32269 | user after free in nr_listen in net/netrom/af_netrom.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-33203 | race condition leading to use-after-free in emac_remove() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-33288 | use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-3338 | crash due to a NULL pointer dereference in the dn_nsp_send function | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-3358 | shtp_cl_get_dma_send_buf in drivers/hid/intel-ish-hid/ishtp/dma-if.c lacks check of the return value | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
MEDIUM | CVE-2023-34324 | [linux/xen: Possible deadlock in Linux kernel event handling] | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-37453 | out-of-bounds read in read_descriptors | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-37454 | use-after-free write in udf_close_lvid | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-3772 | NULL pointer dereference in xfrm_update_ae_params() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-3773 | out-of-bounds read of XFRMA_MTIMER_THRESH nlattr | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-3863 | use-after-free in nfc_llcp_find_loca in net/nfc/llcp_core.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-39189 | nftables out-of-bounds read in nf_osf_match_one() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-39192 | xtables out-of-bounds read in u32_match_it() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-39193 | xtables sctp out-of-bounds read in match_flags() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-39194 | out-of-bounds read in __xfrm_state_filter_match() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-4010 | malformed USB descriptor leads to infinite loop in usb_giveback_urb() | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-4132 | use-after-free caused by do_submit_urb() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-4133 | use-after-free in ch_flower_stats_cb() | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-4194 | correctly initialize socket uid next fix of i_uid to current_fsuid | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-4273 | stack overflow in exfat_get_uniname_from_ext_entry | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
MEDIUM | CVE-2023-42754 | NULL pointer dereference in ipv4_send_dest_unreach() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-42755 | out-of-bounds read in rsvp_classify() | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-42756 | race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP | linux-libc-dev | 5.10.84-1 | 5.10.197-1 |
MEDIUM | CVE-2023-4385 | NULL pointer dereference in dbFree() | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
MEDIUM | CVE-2023-4459 | NULL pointer dereference in vmxnet3_rq_cleanup() | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
MEDIUM | CVE-2023-4569 | information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-45863 | lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-46862 | NULL pointer dereference vulnerability in io_uring_show_fdinfo | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-5197 | use-after-free due to addition and removal of rules from chain bindings within the same transaction | linux-libc-dev | 5.10.84-1 | |
MEDIUM | CVE-2023-4641 | possible password leak during passwd(1) change | login | 1:4.8.1-1 | |
MEDIUM | CVE-2021-35604 | mysql: InnoDB unspecified vulnerability (CPU Oct 2021) | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46659 | mariadb: Crash executing query with VIEW, aggregate and subquery | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46661 | mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an u | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46662 | mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46663 | mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT state | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46664 | mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL v | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46665 | mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_ta | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46667 | mariadb: Integer overflow in sql_lex.cc integer leading to crash | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2021-46668 | mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT stateme | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31621 | mariadb: improper locking due to unreleased lock in the ds_xbstream.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31622 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31623 | mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-31624 | mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.15-0+deb11u1 |
MEDIUM | CVE-2022-38791 | compress_write() fails to release mutex on failure | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.18-0+deb11u1 |
MEDIUM | CVE-2022-47015 | print_warnings() | mariadb-common | 1:10.5.12-0+deb11u1 | 1:10.5.20-0+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | mount | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | mount | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-4160 | openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure | openssl | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
MEDIUM | CVE-2022-2097 | AES OCB fails to encrypt some bytes | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2022-4304 | timing attack in RSA Decryption implementation | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u4 |
MEDIUM | CVE-2023-0465 | Invalid certificate policies in leaf certificates are silently ignored | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-0466 | Certificate policy check not enabled | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-2650 | Possible DoS translating ASN.1 object identifiers | openssl | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u5 |
MEDIUM | CVE-2023-3446 | Excessive time spent checking DH keys and parameters | openssl | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2023-3817 | Excessive time spent checking DH q parameter value | openssl | 1.1.1k-1+deb11u1 | 1.1.1v-0~deb11u1 |
MEDIUM | CVE-2023-4641 | possible password leak during passwd(1) change | passwd | 1:4.8.1-1 | |
MEDIUM | CVE-2023-4016 | ps buffer overflow | procps | 2:3.3.17-5 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | ftplib should not use the host from the PASV response | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2023-27043 | Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2023-40217 | TLS handshake bypass | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | ftplib should not use the host from the PASV response | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2023-27043 | Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2023-40217 | TLS handshake bypass | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-28544 | SVN authz protected copyfrom paths regression | subversion | 1.14.1-3 | 1.14.1-3+deb11u1 |
MEDIUM | CVE-2022-0529 | Heap out-of-bound writes and reads during conversion of wide string to local string | unzip | 6.0-26 | 6.0-26+deb11u1 |
MEDIUM | CVE-2022-0530 | SIGSEGV during the conversion of an utf-8 string to a local string | unzip | 6.0-26 | 6.0-26+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | util-linux | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | util-linux | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3995 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid | uuid-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-3996 | Unauthorized unmount of filesystems in libmount | uuid-dev | 2.36.1-8 | 2.36.1-8+deb11u1 |
MEDIUM | CVE-2021-31879 | authorization header disclosure on redirect | wget | 1.21-1+deb11u1 | |
MEDIUM | CVE-2022-23491 | untrusted root certificates | certifi | 2021.10.8 | 2022.12.07 |
MEDIUM | CVE-2023-23931 | memory corruption via immutable objects | cryptography | 38.0.4 | 39.0.1 |
MEDIUM | CVE-2023-5752 | When installing a package from a Mercurial VCS URL (ie "pip install ... | pip | 21.2.4 | 23.3 |
MEDIUM | CVE-2023-32681 | Unintended leak of Proxy-Authorization header | requests | 2.26.0 | 2.31.0 |
MEDIUM | GHSA-74m5-2c7w-9w3x | MultipartParser denial of service with too many fields or files | starlette | 0.14.2 | 0.25.0 |
LOW | CVE-2011-3374 | It was found that apt-key in apt, all versions, do not correctly valid ... | apt | 2.2.4 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | binutils | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | binutils | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | binutils | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | binutils | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | binutils | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | binutils | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | binutils | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | binutils | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | binutils | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | binutils | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | binutils | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | binutils | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | binutils | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
binutils | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
binutils | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
binutils | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils-common | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | binutils-common | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | binutils-common | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | binutils-common | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
binutils-common | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
binutils-common | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
binutils-common | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | bsdutils | 1:2.36.1-8 | |
LOW | CVE-2016-2781 | coreutils: Non-privileged session can escape to the parent session in chroot | coreutils | 8.32-4+b1 | |
LOW | CVE-2017-18018 | coreutils: race condition vulnerability in chown and chgrp | coreutils | 8.32-4+b1 | |
LOW | CVE-2021-22898 | TELNET stack contents disclosure | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | Content not matching hash in Metalink is not being discarded | curl | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | Metalink download sends credentials | curl | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | Bad connection reuse due to flawed path name checks | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | Incorrect handling of control code characters in cookies | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2023-28320 | siglongjmp race condition may lead to crash | curl | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2023-28322 | more POST-after-PUT confusion | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
LOW | CVE-2023-38546 | cookie injection with none file | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | dirmngr | 2.2.27-2 | |
LOW | CVE-2018-1000021 | client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to pot | git | 1:2.30.2-1 | |
LOW | CVE-2022-24975 | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" | git | 1:2.30.2-1 | |
LOW | CVE-2023-25815 | malicious placement of crafted messages when git was compiled with runtime prefix | git | 1:2.30.2-1 | |
LOW | CVE-2018-1000021 | client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to pot | git-man | 1:2.30.2-1 | |
LOW | CVE-2022-24975 | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" | git-man | 1:2.30.2-1 | |
LOW | CVE-2023-25815 | malicious placement of crafted messages when git was compiled with runtime prefix | git-man | 1:2.30.2-1 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gnupg | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gnupg-l10n | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gnupg-utils | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpg | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpg-agent | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpg-wks-client | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpg-wks-server | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpgconf | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpgsm | 2.2.27-2 | |
LOW | CVE-2022-3219 | denial of service issue (resource consumption) using compressed packets | gpgv | 2.2.27-2 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | krb5-multidev | 1.18.3-6+deb11u1 | |
LOW | CVE-2011-3374 | It was found that apt-key in apt, all versions, do not correctly valid ... | libapt-pkg6.0 | 2.2.4 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libbinutils | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | libbinutils | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | libbinutils | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | libbinutils | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
libbinutils | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
libbinutils | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
libbinutils | 2.35.2-2 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libblkid-dev | 2.36.1-8 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libblkid1 | 2.36.1-8 | |
LOW | CVE-2016-9797 | buffer over-read in l2cap_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9798 | use-after-free in conf_opt() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9799 | bluez: buffer overflow in pklg_read_hci() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9800 | buffer overflow in pin_code_reply_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9801 | buffer overflow in set_ext_ctrl() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9802 | bluez: buffer over-read in l2cap_packet() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9803 | bluez: out-of-bounds read in le_meta_ev_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9804 | bluez: buffer overflow in commands_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9917 | Heap-based buffer overflow vulnerability in read_n() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9918 | Out of bounds stack read in packet_hexdump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9797 | buffer over-read in l2cap_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9798 | use-after-free in conf_opt() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9799 | bluez: buffer overflow in pklg_read_hci() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9800 | buffer overflow in pin_code_reply_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9801 | buffer overflow in set_ext_ctrl() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9802 | bluez: buffer over-read in l2cap_packet() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9803 | bluez: out-of-bounds read in le_meta_ev_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9804 | bluez: buffer overflow in commands_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9917 | Heap-based buffer overflow vulnerability in read_n() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9918 | Out of bounds stack read in packet_hexdump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-bin | 2.31-13+deb11u2 | |
LOW | CVE-2021-43396 | glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset | libc-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-dev-bin | 2.31-13+deb11u2 | |
LOW | CVE-2021-43396 | glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset | libc-dev-bin | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6 | 2.31-13+deb11u2 | |
LOW | CVE-2021-43396 | glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset | libc6 | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6-dev | 2.31-13+deb11u2 | |
LOW | CVE-2021-43396 | glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset | libc6-dev | 2.31-13+deb11u2 | 2.31-13+deb11u3 |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libctf0 | 2.35.2-2 | |
LOW | CVE-2019-1010204 | Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and el | libctf0 | 2.35.2-2 | |
LOW | CVE-2020-19726 | heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-20197 | Race window allows users to own arbitrary files | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-32256 | stack-overflow issue in demangle_type in rust-demangle.c. | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3487 | Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-45078 | out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-46174 | heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-46195 | uncontrolled recursion in libiberty/rust-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-35205 | reachable assertion in display_debug_names() in dwarf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-35206 | NULL pointer dereference in read_and_display_attr_value() in dwarf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-38533 | heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted fi | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-4285 | NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-44840 | heap-based buffer overflow in find_section_in_set() in readelf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-45703 | heap-based buffer overflow in display_debug_section() in readelf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47007 | memory leak in stab_demangle_v3_arg() in stabs.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47008 | memory leak in make_tempdir() and make_tempname() in bucomm.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47010 | memory leak in pr_function_type() in prdbg.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47011 | memory leak in parse_stab_struct_fields() in stabs.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47673 | out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47695 | uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-47696 | segmentation fault in compare_symbols() in objdump.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-48063 | excessive memory consumption in load_separate_debug_files() in dwarf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-48064 | excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-48065 | memory leak in find_abstract_instance() in dwarf2.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2023-1579 | Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 | libctf0 | 2.35.2-2 | |
LOW | CVE-2023-1972 | Illegal memory access when accessing a zer0-lengthverdef table | libctf0 | 2.35.2-2 | |
LOW | CVE-2023-25584 | Out of bounds read in parse_module function in bfd/vms-alpha.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2023-25585 | Field file_table of struct module *module is uninitialized |
libctf0 | 2.35.2-2 | |
LOW | CVE-2023-25586 | Local variable ch_type in function bfd_init_section_decompress_status can be uninitialized |
libctf0 | 2.35.2-2 | |
LOW | CVE-2023-25588 | Field the_bfd of asymbol is uninitialized in function bfd_mach_o_get_synthetic_symtab
|
libctf0 | 2.35.2-2 | |
LOW | CVE-2021-22898 | TELNET stack contents disclosure | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | Content not matching hash in Metalink is not being discarded | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | Metalink download sends credentials | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | Bad connection reuse due to flawed path name checks | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | Incorrect handling of control code characters in cookies | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2023-28320 | siglongjmp race condition may lead to crash | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2023-28322 | more POST-after-PUT confusion | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
LOW | CVE-2023-38546 | cookie injection with none file | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
LOW | CVE-2021-22898 | TELNET stack contents disclosure | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | Content not matching hash in Metalink is not being discarded | libcurl4 | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | Metalink download sends credentials | libcurl4 | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | Bad connection reuse due to flawed path name checks | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | Incorrect handling of control code characters in cookies | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2023-28320 | siglongjmp race condition may lead to crash | libcurl4 | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2023-28322 | more POST-after-PUT confusion | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
LOW | CVE-2023-38546 | cookie injection with none file | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
LOW | CVE-2021-22898 | TELNET stack contents disclosure | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | Content not matching hash in Metalink is not being discarded | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | Metalink download sends credentials | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | Bad connection reuse due to flawed path name checks | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | Incorrect handling of control code characters in cookies | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2023-28320 | siglongjmp race condition may lead to crash | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2023-28322 | more POST-after-PUT confusion | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 |
LOW | CVE-2023-38546 | cookie injection with none file | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 |
LOW | CVE-2021-33294 | an infinite loop was found in the function handle_symtab in readelf.c which causes denial of service | libelf1 | 0.183-1 | |
LOW | CVE-2013-0340 | expat: internal entity expansion | libexpat1 | 2.2.10-2 | |
LOW | CVE-2013-0340 | expat: internal entity expansion | libexpat1-dev | 2.2.10-2 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype-dev | 2.10.4+dfsg-1 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype6 | 2.10.4+dfsg-1 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype6-dev | 2.10.4+dfsg-1 | |
LOW | CVE-2018-6829 | libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintex | libgcrypt20 | 1.8.7-6 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-0 | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-bin | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-data | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-dev | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-dev-bin | 2.66.8-1 | |
LOW | CVE-2011-3389 | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) | libgnutls30 | 3.7.1-5 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libgssrpc4 | 1.18.3-6+deb11u1 | |
LOW | CVE-2017-9937 | libtiff: memory malloc failure in tif_jbig.c could cause DOS. | libjbig-dev | 2.1-3.1+b2 | |
LOW | CVE-2017-9937 | libtiff: memory malloc failure in tif_jbig.c could cause DOS. | libjbig0 | 2.1-3.1+b2 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libk5crypto3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkdb5-10 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5-3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5-dev | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5support0 | 1.18.3-6+deb11u1 | |
LOW | CVE-2015-3276 | incorrect multi-keyword mode cipherstring parsing | libldap-2.4-2 | 2.4.57+dfsg-3 | |
LOW | CVE-2017-14159 | openldap: Privilege escalation via PID file manipulation | libldap-2.4-2 | 2.4.57+dfsg-3 | |
LOW | CVE-2017-17740 | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers | libldap-2.4-2 | 2.4.57+dfsg-3 | |
LOW | CVE-2020-15719 | openldap: Certificate validation incorrectly matches name against CN-ID | libldap-2.4-2 | 2.4.57+dfsg-3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2023-34152 | RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libmount-dev | 2.36.1-8 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libmount1 | 2.36.1-8 | |
LOW | CVE-2017-14988 | OpenEXR: Excessive memory allocation in Header::readfrom | libopenexr-dev | 2.5.4-2 | |
LOW | CVE-2021-26945 | DeepTiledInputPart> | libopenexr-dev | 2.5.4-2 | |
LOW | CVE-2017-14988 | OpenEXR: Excessive memory allocation in Header::readfrom | libopenexr25 | 2.5.4-2 | |
LOW | CVE-2021-26945 | DeepTiledInputPart> | libopenexr25 | 2.5.4-2 | |
LOW | CVE-2016-10505 | NULL pointer dereference in imagetopnm function in convert.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-10506 | Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9113 | CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9114 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9115 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9116 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9117 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9580 | Integer overflow in tiftoimage causes heap buffer overflow | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9581 | Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2017-17479 | openjpeg: Stack-buffer overflow in the pgxtoimage function | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-16375 | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-16376 | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-20846 | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2019-6988 | openjpeg: DoS via memory exhaustion in opj_decompress | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-10505 | NULL pointer dereference in imagetopnm function in convert.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-10506 | Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9113 | CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9114 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9115 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9116 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9117 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9580 | Integer overflow in tiftoimage causes heap buffer overflow | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9581 | Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2017-17479 | openjpeg: Stack-buffer overflow in the pgxtoimage function | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-16375 | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-16376 | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-20846 | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2019-6988 | openjpeg: DoS via memory exhaustion in opj_decompress | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2017-11164 | OP_KETRMAX feature in the match function in pcre_exec.c | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | stack-based buffer overflow write in pcre32_copy_substring | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | stack-based buffer overflow write in pcre32_copy_substring | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2022-41409 | Integer overflow vulnerability in pcre2test before 10.41 allows attack ... | libpcre2-16-0 | 10.36-2 | |
LOW | CVE-2022-41409 | Integer overflow vulnerability in pcre2test before 10.41 allows attack ... | libpcre2-32-0 | 10.36-2 | |
LOW | CVE-2022-41409 | Integer overflow vulnerability in pcre2test before 10.41 allows attack ... | libpcre2-8-0 | 10.36-2 | |
LOW | CVE-2022-41409 | Integer overflow vulnerability in pcre2test before 10.41 allows attack ... | libpcre2-dev | 10.36-2 | |
LOW | CVE-2022-41409 | Integer overflow vulnerability in pcre2test before 10.41 allows attack ... | libpcre2-posix2 | 10.36-2 | |
LOW | CVE-2017-11164 | OP_KETRMAX feature in the match function in pcre_exec.c | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | stack-based buffer overflow write in pcre32_copy_substring | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | stack-based buffer overflow write in pcre32_copy_substring | libpcre3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-11164 | OP_KETRMAX feature in the match function in pcre_exec.c | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-7245 | stack-based buffer overflow write in pcre32_copy_substring | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-7246 | stack-based buffer overflow write in pcre32_copy_substring | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-11164 | OP_KETRMAX feature in the match function in pcre_exec.c | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | stack-based buffer overflow write in pcre32_copy_substring | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | stack-based buffer overflow write in pcre32_copy_substring | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-11164 | OP_KETRMAX feature in the match function in pcre_exec.c | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-7245 | stack-based buffer overflow write in pcre32_copy_substring | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-7246 | stack-based buffer overflow write in pcre32_copy_substring | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | libperl5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2023-31486 | insecure TLS cert default | libperl5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2019-6129 | libpng: memory leak of png_info struct in pngcp.c | libpng-dev | 1.6.37-3 | |
LOW | CVE-2021-4214 | libpng: hardcoded value leads to heap-overflow | libpng-dev | 1.6.37-3 | |
LOW | CVE-2019-6129 | libpng: memory leak of png_info struct in pngcp.c | libpng16-16 | 1.6.37-3 | |
LOW | CVE-2021-4214 | libpng: hardcoded value leads to heap-overflow | libpng16-16 | 1.6.37-3 | |
LOW | CVE-2022-41862 | Client memory disclosure when connecting with Kerberos to modified server | libpq-dev | 13.5-0+deb11u1 | |
LOW | CVE-2022-41862 | Client memory disclosure when connecting with Kerberos to modified server | libpq5 | 13.5-0+deb11u1 | |
LOW | CVE-2020-27619 | Unsafe use of eval() on data retrieved via HTTP in the test suite | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2021-28861 | open redirection vulnerability in lib/http/server.py may lead to information disclosure | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2022-37454 | buffer overflow in the SHA-3 reference implementation | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2023-24535 | panic when parsing an incomplete number | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2020-27619 | Unsafe use of eval() on data retrieved via HTTP in the test suite | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2021-28861 | open redirection vulnerability in lib/http/server.py may lead to information disclosure | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2022-37454 | buffer overflow in the SHA-3 reference implementation | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2023-24535 | panic when parsing an incomplete number | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2021-36084 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36085 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36086 | use-after-free in cil_reset_classpermission() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36087 | libsepol: heap-based buffer overflow in ebitmap_match_any() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36084 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36085 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36086 | use-after-free in cil_reset_classpermission() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36087 | libsepol: heap-based buffer overflow in ebitmap_match_any() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libsmartcols1 | 2.36.1-8 | |
LOW | CVE-2021-36690 | A segmentation fault can occur in the sqlite3.exe command-line compone ... | libsqlite3-0 | 3.34.1-3 | |
LOW | CVE-2021-45346 | sqlite: crafted SQL query allows a malicious user to obtain sensitive information | libsqlite3-0 | 3.34.1-3 | |
LOW | CVE-2022-35737 | an array-bounds overflow if billions of bytes are used in a string argument to a C API | libsqlite3-0 | 3.34.1-3 | |
LOW | CVE-2021-36690 | A segmentation fault can occur in the sqlite3.exe command-line compone ... | libsqlite3-dev | 3.34.1-3 | |
LOW | CVE-2021-45346 | sqlite: crafted SQL query allows a malicious user to obtain sensitive information | libsqlite3-dev | 3.34.1-3 | |
LOW | CVE-2022-35737 | an array-bounds overflow if billions of bytes are used in a string argument to a C API | libsqlite3-dev | 3.34.1-3 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | libssl-dev | 1.1.1k-1+deb11u1 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | libssl-dev | 1.1.1k-1+deb11u1 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | libssl1.1 | 1.1.1k-1+deb11u1 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | libssl1.1 | 1.1.1k-1+deb11u1 | |
LOW | CVE-2013-4392 | TOCTOU race condition when updating file permissions and SELinux security contexts | libsystemd0 | 247.3-6 | |
LOW | CVE-2020-13529 | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t | libsystemd0 | 247.3-6 | |
LOW | CVE-2023-31437 | An issue was discovered in systemd 253. An attacker can modify a seale ... | libsystemd0 | 247.3-6 | |
LOW | CVE-2023-31438 | An issue was discovered in systemd 253. An attacker can truncate a sea ... | libsystemd0 | 247.3-6 | |
LOW | CVE-2023-31439 | An issue was discovered in systemd 253. An attacker can modify the con ... | libsystemd0 | 247.3-6 | |
LOW | CVE-2021-35331 | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... | libtcl8.6 | 8.6.11+dfsg-1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2022-1056 | heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2023-1916 | out-of-bounds read in extractImageSection() in tools/tiffcrop.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2023-30775 | Heap buffer overflow in extractContigSamples32bits, tiffcrop.c | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2023-3164 | heap-buffer-overflow in extractImageSection() | libtiff-dev | 4.2.0-1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiff5 | 4.2.0-1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiff5 | 4.2.0-1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2022-1056 | heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiff5 | 4.2.0-1 | |
LOW | CVE-2023-1916 | out-of-bounds read in extractImageSection() in tools/tiffcrop.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2023-30775 | Heap buffer overflow in extractContigSamples32bits, tiffcrop.c | libtiff5 | 4.2.0-1 | |
LOW | CVE-2023-3164 | heap-buffer-overflow in extractImageSection() | libtiff5 | 4.2.0-1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2022-1056 | heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2023-1916 | out-of-bounds read in extractImageSection() in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2023-30775 | Heap buffer overflow in extractContigSamples32bits, tiffcrop.c | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2023-3164 | heap-buffer-overflow in extractImageSection() | libtiffxx5 | 4.2.0-1 | |
LOW | CVE-2013-4392 | TOCTOU race condition when updating file permissions and SELinux security contexts | libudev1 | 247.3-6 | |
LOW | CVE-2020-13529 | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t | libudev1 | 247.3-6 | |
LOW | CVE-2023-31437 | An issue was discovered in systemd 253. An attacker can modify a seale ... | libudev1 | 247.3-6 | |
LOW | CVE-2023-31438 | An issue was discovered in systemd 253. An attacker can truncate a sea ... | libudev1 | 247.3-6 | |
LOW | CVE-2023-31439 | An issue was discovered in systemd 253. An attacker can modify the con ... | libudev1 | 247.3-6 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libuuid1 | 2.36.1-8 | |
LOW | CVE-2007-3476 | libgd Denial of service by corrupted GIF images | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3477 | gd: arc drawing functions can consume large amount of CPU time | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3996 | php multiple integer overflows in gd | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2009-3546 | gd: insufficient input validation in _gdGetColors() | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3476 | libgd Denial of service by corrupted GIF images | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2007-3477 | gd: arc drawing functions can consume large amount of CPU time | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2007-3996 | php multiple integer overflows in gd | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2009-3546 | gd: insufficient input validation in _gdGetColors() | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2015-9019 | libxslt: math.random() in xslt uses unseeded randomness | libxslt1-dev | 1.1.34-4 | |
LOW | CVE-2015-9019 | libxslt: math.random() in xslt uses unseeded randomness | libxslt1.1 | 1.1.34-4 | |
LOW | CVE-2004-0230 | TCP, when using a large Window Size, makes it easier for remote attack ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2005-3660 | Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2007-3719 | kernel: secretly Monopolizing the CPU Without Superuser Privileges | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2008-2544 | kernel: mounting proc readonly on a different mount point silently mounts it rw if the /proc mount i | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2008-4609 | kernel: TCP protocol vulnerabilities from Outpost24 | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2010-4563 | kernel: ipv6: sniffer detection | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2010-5321 | kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2011-4915 | fs/proc/base.c in the Linux kernel through 3.1 allows local users to o ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2011-4916 | Linux kernel through 3.1 allows local users to obtain sensitive keystr ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2011-4917 | In the Linux kernel through 3.1 there is an information disclosure iss ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2012-4542 | default SCSI command filter does not accomodate commands overlap across device classes | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2014-9892 | The snd_compr_tstamp function in sound/core/compress_offload.c in the ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2014-9900 | kernel: Info leak in uninitialized structure ethtool_wolinfo in ethtool_get_wol() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2015-2877 | Kernel: Cross-VM ASL INtrospection (CAIN) | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2016-10723 | An issue was discovered in the Linux kernel through 4.17.2. Since the ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2016-8660 | kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2017-0630 | kernel: Information disclosure vulnerability in kernel trace subsystem | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2017-13693 | kernel: ACPI operand cache leak in dsutils.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2017-13694 | kernel: ACPI node and node_ext cache leak | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2018-1121 | procps-ng, procps: process hiding through race condition enumerating /proc | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2018-12928 | kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2018-17977 | kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP pack | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-11191 | kernel: race condition in load_aout_binary() allows local users to bypass ASLR on setuid a.out progr | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12378 | kernel: unchecked kmalloc of new_ra in ip6_ra_control leads to denial of service | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12379 | kernel: memory leak in con_insert_unipair in drivers/tty/vt/consolemap.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12380 | memory allocation failure in the efi subsystem leads to denial of service | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12381 | kernel: unchecked kmalloc of new_ra in ip_ra_control leads to denial of service | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12382 | unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12455 | null pointer dereference in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c causing denial of | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-12456 | kernel: double fetch in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl. | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16229 | null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16230 | null pointer dereference in drivers/gpu/drm/radeon/radeon_display.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16231 | null-pointer dereference in drivers/net/fjes/fjes_main.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16232 | null-pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16233 | null pointer dereference in drivers/scsi/qla2xxx/qla_os.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-16234 | null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-19070 | kernel: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c allows for a DoS | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2019-19378 | out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2020-11725 | kernel: improper handling of private_size*count multiplication due to count=info->owner typo | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2020-35501 | audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2021-26934 | An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2021-32078 | kernel: out-of-bounds read in arch/arm/mach-footbridge/personal-pci.c due to improper input validati | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2021-3714 | Remote Page Deduplication Attacks | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2021-3923 | stack information leak in infiniband RDMA | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
LOW | CVE-2021-4135 | Heap information leak in map_lookup_elem function | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
LOW | CVE-2022-0400 | Out of bounds read in the smc protocol stack | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-0998 | kernel: an integer overflow in the vhost_vdpa_config_validate() can lead to out-of-bounds access on | linux-libc-dev | 5.10.84-1 | 5.10.92-1 |
LOW | CVE-2022-1247 | A race condition bug in rose_connect() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-1734 | kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from u | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
LOW | CVE-2022-1882 | use-after-free in free_pipe_info() could lead to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.136-1 |
LOW | CVE-2022-24448 | nfs_atomic_open() returns uninitialized data instead of ENOTDIR | linux-libc-dev | 5.10.84-1 | 5.10.92-2 |
LOW | CVE-2022-25265 | Executable Space Protection Bypass | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-2961 | race condition in rose_bind() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-2991 | kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation | linux-libc-dev | 5.10.84-1 | 5.10.120-1 |
LOW | CVE-2022-32296 | kernel: insufficient TCP source port randomness leads to client identification | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
LOW | CVE-2022-32981 | kernel: Linux kernel for powerpc 32-bit buffer overflow in ptrace PEEKUSER/POKEUSER | linux-libc-dev | 5.10.84-1 | 5.10.127-1 |
LOW | CVE-2022-33981 | use-after-free in floppy driver may lead to a DoS | linux-libc-dev | 5.10.84-1 | 5.10.113-1 |
LOW | CVE-2022-3424 | Use after Free in gru_set_context_option leading to kernel panic | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
LOW | CVE-2022-3521 | kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c | linux-libc-dev | 5.10.84-1 | 5.10.158-1 |
LOW | CVE-2022-3629 | memory leak in the function vsock_connect of Virtual Socket Protocol | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
LOW | CVE-2022-3633 | memory leak in the function j1939_session_destroy for j1939 socket | linux-libc-dev | 5.10.84-1 | 5.10.140-1 |
LOW | CVE-2022-41848 | Race condition between mgslpc_ioctl and mgslpc_detach | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-44032 | Race between cmm_open() and cm4000_detach() result in UAF | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-44033 | A race condition between cm4040_open() and reader_detach() may result in UAF | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-44034 | A use-after-free due to race between scr24x_open() and scr24x_remove() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-45884 | use-after-free due to race condition occurring in dvb_register_device() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-45885 | use-after-free due to race condition occurring in dvb_frontend.c | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2022-45886 | use-after-free due to race condition occurring in dvb_net.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2022-45887 | memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2022-45919 | use-after-free due to race condition occurring in dvb_ca_en50221.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-1075 | tls_is_tx_ready() checked list_entry | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-1513 | information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
LOW | CVE-2023-22995 | kernel: missing platform_device_put() and kfree() calls in an error path in dwc3_qcom_acpi_register_ | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-23000 | kernel: incorrect return value for the error case in the tegra_xusb_find_port_node | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-23003 | kernel: missing check for return value of hashmap__new() in the function expr__ctx_new | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-23039 | kernel: tty: vcc: race condition leading to use-after-free in vcc_open() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-26242 | afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-30772 | race condition leading to use-after-free in da9150_charger_remove() | linux-libc-dev | 5.10.84-1 | 5.10.178-1 |
LOW | CVE-2023-31081 | An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_brid ... | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-31085 | divide-by-zero error in ctrl_cdev_ioctl when do_div happens and erasesize is 0 | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2023-3141 | Use after free bug in r592_remove | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-34256 | Out of bounds read in crc16 in lib/crc16.c | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-35823 | race condition leading to use-after-free in saa7134_finidev() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-35824 | race condition leading to use-after-free in dm1105_remove.c() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-35828 | race condition leading to use-after-free in renesas_usb3_remove() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-35829 | race condition leading to use-after-free in rkvdec_remove() | linux-libc-dev | 5.10.84-1 | 5.10.191-1 |
LOW | CVE-2023-4134 | use-after-free in cyttsp4_watchdog_work() | linux-libc-dev | 5.10.84-1 | |
LOW | CVE-2007-5686 | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... | login | 1:4.8.1-1 | |
LOW | CVE-2013-4235 | shadow-utils: TOCTOU race conditions by copying and removing directory trees | login | 1:4.8.1-1 | |
LOW | CVE-2019-19882 | shadow-utils: local users can obtain root access because setuid programs are misconfigured | login | 1:4.8.1-1 | |
LOW | CVE-2023-29383 | Improper input validation in shadow-utils package utility chfn | login | 1:4.8.1-1 | |
LOW | CVE-2008-1687 | m4: unquoted output of maketemp and mkstemp | m4 | 1.4.18-5 | |
LOW | CVE-2008-1688 | m4: code execution via -F argument | m4 | 1.4.18-5 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | mount | 2.36.1-8 | |
LOW | CVE-2007-2243 | OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2007-2768 | OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2008-3234 | sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2016-20012 | openssh: Public key information leak | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2018-15919 | User enumeration via malformed packets in authentication requests | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2019-6110 | openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2020-14145 | openssh: Observable discrepancy leading to an information leak in the algorithm negotiation | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2020-15778 | scp allows command injection when using backtick characters in the destination argument | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2021-36368 | openssh: possible bypass of fido 2 devices and ssh-askpass | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | openssl | 1.1.1k-1+deb11u1 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | openssl | 1.1.1k-1+deb11u1 | |
LOW | CVE-2007-5686 | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... | passwd | 1:4.8.1-1 | |
LOW | CVE-2013-4235 | shadow-utils: TOCTOU race conditions by copying and removing directory trees | passwd | 1:4.8.1-1 | |
LOW | CVE-2019-19882 | shadow-utils: local users can obtain root access because setuid programs are misconfigured | passwd | 1:4.8.1-1 | |
LOW | CVE-2023-29383 | Improper input validation in shadow-utils package utility chfn | passwd | 1:4.8.1-1 | |
LOW | CVE-2010-4651 | patch: directory traversal flaw allows for arbitrary file creation | patch | 2.7.6-7 | |
LOW | CVE-2018-6951 | patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash | patch | 2.7.6-7 | |
LOW | CVE-2018-6952 | patch: Double free of memory in pch.c:another_hunk() causes a crash | patch | 2.7.6-7 | |
LOW | CVE-2021-45261 | Invalid Pointer via another_hunk function | patch | 2.7.6-7 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl | 5.32.1-4+deb11u2 | |
LOW | CVE-2023-31486 | insecure TLS cert default | perl | 5.32.1-4+deb11u2 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl-base | 5.32.1-4+deb11u2 | |
LOW | CVE-2023-31486 | insecure TLS cert default | perl-base | 5.32.1-4+deb11u2 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2023-31486 | insecure TLS cert default | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2020-27619 | Unsafe use of eval() on data retrieved via HTTP in the test suite | python3.9 | 3.9.2-1 | |
LOW | CVE-2021-28861 | open redirection vulnerability in lib/http/server.py may lead to information disclosure | python3.9 | 3.9.2-1 | |
LOW | CVE-2022-37454 | buffer overflow in the SHA-3 reference implementation | python3.9 | 3.9.2-1 | |
LOW | CVE-2023-24535 | panic when parsing an incomplete number | python3.9 | 3.9.2-1 | |
LOW | CVE-2020-27619 | Unsafe use of eval() on data retrieved via HTTP in the test suite | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2021-28861 | open redirection vulnerability in lib/http/server.py may lead to information disclosure | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2022-37454 | buffer overflow in the SHA-3 reference implementation | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2023-24535 | panic when parsing an incomplete number | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2005-2541 | tar: does not properly warn the user when extracting setuid or setgid files | tar | 1.34+dfsg-1 | |
LOW | CVE-2022-48303 | heap buffer overflow at from_header() in list.c via specially crafted checksum | tar | 1.34+dfsg-1 | |
LOW | CVE-2021-35331 | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... | tcl8.6 | 8.6.11+dfsg-1 | |
LOW | CVE-2021-35331 | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... | tcl8.6-dev | 8.6.11+dfsg-1 | |
LOW | CVE-2021-4217 | Null pointer dereference in Unicode strings code | unzip | 6.0-26 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | util-linux | 2.36.1-8 | |
LOW | CVE-2022-0563 | partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | uuid-dev | 2.36.1-8 | |
LOW | GHSA-5cpq-8wj7-hf2v | Vulnerable OpenSSL included in cryptography wheels | cryptography | 38.0.4 | 41.0.0 |
LOW | GHSA-jm77-qphf-c4w8 | pyca/cryptography's wheels include vulnerable OpenSSL | cryptography | 38.0.4 | 41.0.3 |
LOW | GHSA-v8gr-m533-ghj9 | Vulnerable OpenSSL included in cryptography wheels | cryptography | 38.0.4 | 41.0.4 |
LOW | CVE-2023-29159 | Starlette has Path Traversal vulnerability in StaticFiles | starlette | 0.14.2 | 0.27.0 |
UNKNOWN | DSA-5085-2 | expat - regression update | libexpat1 | 2.2.10-2 | 2.2.10-2+deb11u3 |
UNKNOWN | DSA-5085-2 | expat - regression update | libexpat1-dev | 2.2.10-2 | 2.2.10-2+deb11u3 |
UNKNOWN | DSA-5257-2 | linux - regression update | linux-libc-dev | 5.10.84-1 | 5.10.149-2 |
Date: 2023-10-31