-
Notifications
You must be signed in to change notification settings - Fork 0
dockerhub.hi.inet evolved 5g iqb netapp
Alejandro Molina Sanchez edited this page Dec 1, 2022
·
1 revision
Severity | Number of vulnerabilities |
---|---|
CRITICAL | 46 |
HIGH | 443 |
MEDIUM | 385 |
LOW | 614 |
UNKNOWN | 3 |
Severity | ID | Title | PkgName | InstalledVersion | FixedVersion |
---|---|---|---|---|---|
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | curl: Unpreserved file permissions | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2021-30473 | aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that i ... | libaom0 | 1.0.0.errata1-3 | |
CRITICAL | CVE-2021-30474 | aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use ... | libaom0 | 1.0.0.errata1-3 | |
CRITICAL | CVE-2021-30475 | aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buf ... | libaom0 | 1.0.0.errata1-3 | |
CRITICAL | CVE-2021-43400 | bluez: use-after-free in gatt-database.c | libbluetooth-dev | 5.55-3.1 | |
CRITICAL | CVE-2021-43400 | bluez: use-after-free in gatt-database.c | libbluetooth3 | 5.55-3.1 | |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | curl: Unpreserved file permissions | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | curl: Unpreserved file permissions | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2021-22945 | curl: use-after-free and double-free in MQTT sending | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2022-32207 | curl: Unpreserved file permissions | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
CRITICAL | CVE-2019-8457 | sqlite: heap out-of-bound read in function rtreenode() | libdb5.3 | 5.3.28+dfsg1-0.8 | |
CRITICAL | CVE-2019-8457 | sqlite: heap out-of-bound read in function rtreenode() | libdb5.3-dev | 5.3.28+dfsg1-0.8 | |
CRITICAL | CVE-2022-1253 | Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ... | libde265-0 | 1.0.8-1 | |
CRITICAL | CVE-2022-40674 | expat: a use-after-free in the doContent function in xmlparse.c | libexpat1 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u4 |
CRITICAL | CVE-2022-40674 | expat: a use-after-free in the doContent function in xmlparse.c | libexpat1-dev | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u4 |
CRITICAL | CVE-2022-27404 | FreeType: Buffer overflow in sfnt_init_face | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-27404 | FreeType: Buffer overflow in sfnt_init_face | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-27404 | FreeType: Buffer overflow in sfnt_init_face | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
CRITICAL | CVE-2022-1586 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-16-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-16-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-32-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-32-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-8-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-8-0 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-dev | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-dev | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1586 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | libpcre2-posix2 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2022-1587 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c | libpcre2-posix2 | 10.36-2 | 10.36-2+deb11u1 |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | libpython3.9-minimal | 3.9.2-1 | |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | libpython3.9-stdlib | 3.9.2-1 | |
CRITICAL | CVE-2022-2068 | openssl: the c_rehash script allows command injection | libssl-dev | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2022-2068 | openssl: the c_rehash script allows command injection | libssl1.1 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2021-46848 | libtasn1: Out-of-bound access in ETYPE_OK | libtasn1-6 | 4.16.0-2 | |
CRITICAL | CVE-2022-3970 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file | libtiff-dev | 4.2.0-1+deb11u1 | |
CRITICAL | CVE-2022-3970 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file | libtiff5 | 4.2.0-1+deb11u1 | |
CRITICAL | CVE-2022-3970 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file | libtiffxx5 | 4.2.0-1+deb11u1 | |
CRITICAL | CVE-2022-3649 | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
CRITICAL | CVE-2022-2068 | openssl: the c_rehash script allows command injection | openssl | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u3 |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | python3.9 | 3.9.2-1 | |
CRITICAL | CVE-2021-29921 | python-ipaddress: Improper input validation of octal strings | python3.9-minimal | 3.9.2-1 | |
CRITICAL | CVE-2022-37434 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header ext | zlib1g | 1:1.2.11.dfsg-2+deb11u1 | 1:1.2.11.dfsg-2+deb11u2 |
CRITICAL | CVE-2022-37434 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header ext | zlib1g-dev | 1:1.2.11.dfsg-2+deb11u1 | 1:1.2.11.dfsg-2+deb11u2 |
CRITICAL | CVE-2022-24065 | The package cookiecutter before 2.1.1 are vulnerable to Command Inject ... | cookiecutter | 1.7.3 | 2.1.1 |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | comerr-dev | 1.46.2-2 | |
HIGH | CVE-2021-22946 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | curl: CERTINFO never-ending busy-loop | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | curl: TLS and SSH connection too eager reuse | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | curl: HSTS bypass via IDN | curl | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | e2fsprogs | 1.46.2-2 | |
HIGH | CVE-2021-44648 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data | gir1.2-gdkpixbuf-2.0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | gdk-pixbuf: a heap-based buffer overflow when compositing or clearing frames in GIF files | gir1.2-gdkpixbuf-2.0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2022-24765 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree | git | 1:2.30.2-1 | |
HIGH | CVE-2022-29187 | git: Bypass of safe.directory protections | git | 1:2.30.2-1 | |
HIGH | CVE-2022-39260 | git: git shell function that splits command arguments can lead to arbitrary heap writes. | git | 1:2.30.2-1 | |
HIGH | CVE-2022-24765 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree | git-man | 1:2.30.2-1 | |
HIGH | CVE-2022-29187 | git: Bypass of safe.directory protections | git-man | 1:2.30.2-1 | |
HIGH | CVE-2022-39260 | git: git shell function that splits command arguments can lead to arbitrary heap writes. | git-man | 1:2.30.2-1 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2020-0478 | In extend_frame_lowbd of restoration.c, there is a possible out of bou ... | libaom0 | 1.0.0.errata1-3 | |
HIGH | CVE-2020-36131 | AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ... | libaom0 | 1.0.0.errata1-3 | |
HIGH | CVE-2020-36133 | AOM v2.0.1 was discovered to contain a global buffer overflow via the ... | libaom0 | 1.0.0.errata1-3 | |
HIGH | CVE-2020-26557 | kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2020-26559 | kernel: Authvalue leak in Bluetooth Mesh Provisioning | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2020-26560 | kernel: impersonation attack in Bluetooth Mesh Provisioning | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-0204 | bluez: heap-based buffer overflow in the implementation of the gatt protocol | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-39176 | bluez: BlueZ allows physically proximate attackers to obtain sensitive information because profiles/ | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2022-39177 | bluez: BlueZ allows physically proximate attackers to cause a denial of service because malformed an | libbluetooth-dev | 5.55-3.1 | |
HIGH | CVE-2020-26557 | kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2020-26559 | kernel: Authvalue leak in Bluetooth Mesh Provisioning | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2020-26560 | kernel: impersonation attack in Bluetooth Mesh Provisioning | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2022-0204 | bluez: heap-based buffer overflow in the implementation of the gatt protocol | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2022-39176 | bluez: BlueZ allows physically proximate attackers to obtain sensitive information because profiles/ | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2022-39177 | bluez: BlueZ allows physically proximate attackers to cause a denial of service because malformed an | libbluetooth3 | 5.55-3.1 | |
HIGH | CVE-2021-3999 | glibc: Off-by-one buffer overflow/underflow in getcwd() | libc-bin | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
HIGH | CVE-2021-3999 | glibc: Off-by-one buffer overflow/underflow in getcwd() | libc-dev-bin | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
HIGH | CVE-2021-3999 | glibc: Off-by-one buffer overflow/underflow in getcwd() | libc6 | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
HIGH | CVE-2021-3999 | glibc: Off-by-one buffer overflow/underflow in getcwd() | libc6-dev | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | libcom-err2 | 1.46.2-2 | |
HIGH | CVE-2021-22946 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | curl: CERTINFO never-ending busy-loop | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | curl: TLS and SSH connection too eager reuse | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | curl: HSTS bypass via IDN | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2021-22946 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | curl: CERTINFO never-ending busy-loop | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | curl: TLS and SSH connection too eager reuse | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | curl: HSTS bypass via IDN | libcurl4 | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2021-22946 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-22576 | curl: OAUTH2 bearer bypass in connection re-use | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27775 | curl: bad local IPv6 connection reuse | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27781 | curl: CERTINFO never-ending busy-loop | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-27782 | curl: TLS and SSH connection too eager reuse | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
HIGH | CVE-2022-42916 | curl: HSTS bypass via IDN | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
HIGH | CVE-2020-21598 | libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unw ... | libde265-0 | 1.0.8-1 | |
HIGH | CVE-2021-36409 | There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ... | libde265-0 | 1.0.8-1 | |
HIGH | CVE-2022-43680 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCre | libexpat1 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u5 |
HIGH | CVE-2022-43680 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCre | libexpat1-dev | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u5 |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | libext2fs2 | 1.46.2-2 | |
HIGH | CVE-2022-27405 | FreeType: Segmentation violation via FNT_Size_Request | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Freetype: Segmentation violation via FT_Request_Size | libfreetype-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27405 | FreeType: Segmentation violation via FNT_Size_Request | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Freetype: Segmentation violation via FT_Request_Size | libfreetype6 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27405 | FreeType: Segmentation violation via FNT_Size_Request | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-27406 | Freetype: Segmentation violation via FT_Request_Size | libfreetype6-dev | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 |
HIGH | CVE-2022-25308 | fribidi: Stack based buffer overflow | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
HIGH | CVE-2021-33560 | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channe | libgcrypt20 | 1.8.7-6 | |
HIGH | CVE-2021-44648 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf-2.0-0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | gdk-pixbuf: a heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf-2.0-0 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf-2.0-dev | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | gdk-pixbuf: a heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf-2.0-dev | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf2.0-bin | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | gdk-pixbuf: a heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf2.0-bin | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-44648 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data | libgdk-pixbuf2.0-common | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2021-46829 | gdk-pixbuf: a heap-based buffer overflow when compositing or clearing frames in GIF files | libgdk-pixbuf2.0-common | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 |
HIGH | CVE-2022-2509 | gnutls: Double free during gnutls_pkcs7_verify | libgnutls30 | 3.7.1-5 | 3.7.1-5+deb11u2 |
HIGH | CVE-2020-23109 | Buffer overflow vulnerability in function convert_colorspace in heif_c ... | libheif1 | 1.11.0-1 | |
HIGH | CVE-2022-3515 | libksba: integer overflow may lead to remote code execution | libksba8 | 1.5.0-3 | 1.5.0-3+deb11u1 |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20309 | ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20312 | ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-20313 | ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-1114 | ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-28463 | ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32545 | ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32546 | ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2022-32547 | ImageMagick: load of misaligned address at MagickCore/property.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32081 | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32082 | mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32084 | mariadb: segmentation fault via the component sub_select | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32089 | mariadb: server crash in st_select_lex_unit::exclude_level | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32091 | mariadb: server crash in JOIN_CACHE::free or in copy_fields | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32081 | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32082 | mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32084 | mariadb: segmentation fault via the component sub_select | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32089 | mariadb: server crash in st_select_lex_unit::exclude_level | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32091 | mariadb: server crash in JOIN_CACHE::free or in copy_fields | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32081 | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32082 | mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32084 | mariadb: segmentation fault via the component sub_select | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32089 | mariadb: server crash in st_select_lex_unit::exclude_level | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32091 | mariadb: server crash in JOIN_CACHE::free or in copy_fields | libmariadb3 | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libncurses-dev | 6.2+20201114-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libncurses5-dev | 6.2+20201114-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libncurses6 | 6.2+20201114-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libncursesw5-dev | 6.2+20201114-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libncursesw6 | 6.2+20201114-2 | |
HIGH | CVE-2021-3575 | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution | libopenjp2-7 | 2.4.0-3 | |
HIGH | CVE-2021-3575 | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution | libopenjp2-7-dev | 2.4.0-3 | |
HIGH | CVE-2020-16156 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files | libperl5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2022-44638 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | libpixman-1-0 | 0.40.0-1 | 0.40.0-1.1~deb11u1 |
HIGH | CVE-2022-44638 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | libpixman-1-dev | 0.40.0-1 | 0.40.0-1.1~deb11u1 |
HIGH | CVE-2022-2625 | postgresql: Extension scripts replace objects not belonging to the extension. | libpq-dev | 13.7-0+deb11u1 | 13.8-0+deb11u1 |
HIGH | CVE-2022-2625 | postgresql: Extension scripts replace objects not belonging to the extension. | libpq5 | 13.7-0+deb11u1 | 13.8-0+deb11u1 |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2020-10735 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int lea | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2021-3737 | python: urllib: HTTP client possible infinite loop on a 100 Continue response | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-0391 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-42919 | python: local privilege escalation via the multiprocessing forkserver start method | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-45061 | Python: CPU denial of service via inefficient IDNA decoder | libpython3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2020-10735 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int lea | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2021-3737 | python: urllib: HTTP client possible infinite loop on a 100 Continue response | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-0391 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-42919 | python: local privilege escalation via the multiprocessing forkserver start method | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-45061 | Python: CPU denial of service via inefficient IDNA decoder | libpython3.9-stdlib | 3.9.2-1 | |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | libss2 | 1.46.2-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | libtinfo6 | 6.2+20201114-2 | |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc-common | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc-dev | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2021-46828 | libtirpc: DoS vulnerability with lots of connections | libtirpc3 | 1.3.1-1 | 1.3.1-1+deb11u1 |
HIGH | CVE-2022-40303 | libxml2: integer overflows with XML_PARSE_HUGE | libxml2 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-40304 | libxml2: dict corruption caused by entity reference cycles | libxml2 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-40303 | libxml2: integer overflows with XML_PARSE_HUGE | libxml2-dev | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2022-40304 | libxml2: dict corruption caused by entity reference cycles | libxml2-dev | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 |
HIGH | CVE-2021-30560 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... | libxslt1-dev | 1.1.34-4 | 1.1.34-4+deb11u1 |
HIGH | CVE-2021-30560 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... | libxslt1.1 | 1.1.34-4 | 1.1.34-4+deb11u1 |
HIGH | CVE-2013-7445 | kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2019-19378 | kernel: out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2019-19449 | kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_ | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2019-19814 | kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2020-12362 | kernel: Integer overflow in Intel(R) Graphics Drivers | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2021-3714 | kernel: Remote Page Deduplication Attacks | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2021-3847 | kernel: low-privileged user privileges escalation | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2021-3864 | kernel: descendant's dumpable setting with certain SUID binaries | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2021-39686 | kernel: race condition in the Android binder driver could lead to incorrect security checks | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2021-4037 | kernel: security regression for CVE-2018-13405 | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2021-4204 | kernel: improper input validation may lead to privilege escalation | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-0400 | kernel: Out of bounds read in the smc protocol stack | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-0500 | kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileg | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-1012 | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
HIGH | CVE-2022-1247 | kernel: A race condition bug in rose_connect() | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-1652 | kernel: A concurrency use-after-free in floppy disk device driver. | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-1679 | kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-1729 | kernel: race condition in perf_event_open leads to privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-1786 | kernel: invalid-free in io_uring that can lead to LPE | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-20421 | kernel: use after free in binder_inc_ref_for_node in drivers/android/binder.c due | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-20422 | In emulation_proc_handler of armv8_deprecated.c, there is a possible w ... | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-2327 | io_uring use work_flags to determine which identity need to grab from ... | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
HIGH | CVE-2022-2585 | kernel: posix cpu timer use-after-free may lead to local privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
HIGH | CVE-2022-2588 | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
HIGH | CVE-2022-2602 | kernel: use-after-free when an io_uring request is being processed | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-26365 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-28893 | kernel: use after free in SUNRPC subsystem | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-2959 | kernel: watch queue race condition can lead to privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-2961 | kernel: race condition in rose_bind() | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-2978 | kernel: use-after-free in nilfs_mdt_destroy | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
HIGH | CVE-2022-3028 | kernel: race condition in xfrm_probe_algs can lead to out-of-bounds read/write | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-3176 | kernel: use-after-free in io_uring for POLLFREE notification with Signalfd_poll() and binder_poll() | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-32250 | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
HIGH | CVE-2022-33740 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-33741 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-33742 | Linux disk/nic frontends data leaks T[his CNA information record relat ... | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-33743 | kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405) | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-3424 | kernel: Use after Free in gru_set_context_option leading to kernel panic | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-34918 | kernel: heap overflow in nft_set_elem_init() | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
HIGH | CVE-2022-3524 | A vulnerability was found in Linux Kernel. It has been declared as pro ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3545 | A vulnerability has been found in Linux Kernel and classified as criti ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3564 | A vulnerability classified as critical was found in Linux Kernel. Affe ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3565 | A vulnerability, which was classified as critical, has been found in L ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3566 | kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3567 | kernel: data races around sk->sk_prot | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3577 | kernel: HID: bigben: slab-out-of-bounds Write in bigben_probe | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
HIGH | CVE-2022-3594 | A vulnerability was found in Linux Kernel. It has been declared as pro ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3621 | kernel: nilfs2: null pointer dereference in nilfs_bmap_lookup_at_level() of fs/nilfs2/inode.c | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
HIGH | CVE-2022-3623 | A vulnerability was found in Linux Kernel. It has been declared as pro ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-3625 | kernel:a use-after-free after a failed devlink reload in devlink_param_get | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-3635 | kernel: use after in tst_timer in drivers/atm/idt77252.c | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-3640 | kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-36946 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
HIGH | CVE-2022-39189 | Kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfuncti | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-41222 | kernel: mm/mremap.c use-after-free vulnerability | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
HIGH | CVE-2022-4139 | kernel: i915: Incorrect GPU TLB flush can lead to random memory access | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-41674 | kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-42719 | kernel: A use-after-free problem observed in multi-BSSID element when parsing | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-42720 | kernel: A use-after-free problem was observed in bss_ref_get in net/wireless/scan.c | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
HIGH | CVE-2022-42896 | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-43750 | drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 ... | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
HIGH | CVE-2022-43945 | kernel: nfsd buffer overflow by RPC message over TCP with garbage data | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-45884 | kernel: use-after-free due to race condition occurring in dvb_register_device() | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-45885 | kernel: use-after-free due to race condition occurring in dvb_frontend.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-45886 | kernel: use-after-free due to race condition occurring in dvb_net.c | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-45919 | An issue was discovered in the Linux kernel through 6.0.10. In drivers ... | linux-libc-dev | 5.10.113-1 | |
HIGH | CVE-2022-1304 | e2fsprogs: out-of-bounds read/write via crafted filesystem | logsave | 1.46.2-2 | |
HIGH | CVE-2021-46669 | mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27376 | mariadb: assertion failure in Item_args::walk_arg | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27377 | mariadb: use-after-poison when complex conversion is involved in blob | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27378 | mariadb: server crash in create_tmp_table::finalize | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27379 | mariadb: server crash in component arg_comparator::compare_real_fixed | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27380 | mariadb: server crash at my_decimal::operator= | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27381 | mariadb: server crash at Field::set_default via specially crafted SQL statements | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27382 | mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27383 | mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27384 | mariadb: crash via component Item_subselect::init_expr_cache_tracker | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27385 | mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27386 | mariadb: server crashes in query_arena::set_query_arena upon SELECT from view | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27387 | mariadb: assertion failures in decimal_bin_size | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27444 | mariadb: crash when using HAVING with NOT EXIST predicate in an equality | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27445 | mariadb: assertion failure in compare_order_elements | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27446 | mariadb: crash when using HAVING with IS NULL predicate in an equality | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27447 | mariadb: use-after-poison in Binary_string::free_buffer | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27448 | mariadb: crash in multi-update and implicit grouping | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27449 | mariadb: assertion failure in sql/item_func.cc | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27451 | mariadb: crash via window function in expression in ORDER BY | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27452 | mariadb: assertion failure in sql/item_cmpfunc.cc | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27455 | mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27456 | mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27457 | mariadb: incorrect key in "dup value" error after long unique | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-27458 | mariadb: use-after-poison in Binary_string::free_buffer | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32081 | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32082 | mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32083 | mariadb: server crash at Item_subselect::init_expr_cache_tracker | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32084 | mariadb: segmentation fault via the component sub_select | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32085 | mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32086 | mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32087 | mariadb: server crash in Item_args::walk_args | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32088 | mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32089 | mariadb: server crash in st_select_lex_unit::exclude_level | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-32091 | mariadb: server crash in JOIN_CACHE::free or in copy_fields | mariadb-common | 1:10.5.15-0+deb11u1 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | ncurses-base | 6.2+20201114-2 | |
HIGH | CVE-2022-29458 | ncurses: segfaulting OOB read | ncurses-bin | 6.2+20201114-2 | |
HIGH | CVE-2021-41617 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configur | openssh-client | 1:8.4p1-5 | |
HIGH | CVE-2020-16156 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files | perl | 5.32.1-4+deb11u2 | |
HIGH | CVE-2020-16156 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files | perl-base | 5.32.1-4+deb11u2 | |
HIGH | CVE-2020-16156 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | python3.9 | 3.9.2-1 | |
HIGH | CVE-2020-10735 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int lea | python3.9 | 3.9.2-1 | |
HIGH | CVE-2021-3737 | python: urllib: HTTP client possible infinite loop on a 100 Continue response | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-0391 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-42919 | python: local privilege escalation via the multiprocessing forkserver start method | python3.9 | 3.9.2-1 | |
HIGH | CVE-2022-45061 | Python: CPU denial of service via inefficient IDNA decoder | python3.9 | 3.9.2-1 | |
HIGH | CVE-2015-20107 | python: mailcap: findmatch() function does not sanitize the second argument | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2020-10735 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int lea | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2021-3737 | python: urllib: HTTP client possible infinite loop on a 100 Continue response | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-0391 | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-42919 | python: local privilege escalation via the multiprocessing forkserver start method | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-45061 | Python: CPU denial of service via inefficient IDNA decoder | python3.9-minimal | 3.9.2-1 | |
HIGH | CVE-2022-42969 | The py library through 1.11.0 for Python allows remote attackers to co ... | py | 1.11.0 | |
MEDIUM | CVE-2022-3715 | bash: a heap-buffer-overflow in valid_parameter_transform | bash | 5.1-2 | |
MEDIUM | CVE-2021-22947 | curl: Server responses received before STARTTLS processed after TLS handshake | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | curl: Set-Cookie denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | curl: HTTP compression denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | curl: FTP-KRB bad message verification | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32221 | curl: POST following PUT confusion | curl | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | dirmngr | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-39253 | git: exposure of sensitive information to a malicious actor | git | 1:2.30.2-1 | |
MEDIUM | CVE-2022-39253 | git: exposure of sensitive information to a malicious actor | git-man | 1:2.30.2-1 | |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gnupg | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gnupg-l10n | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gnupg-utils | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpg | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpg-agent | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpg-wks-client | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpg-wks-server | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpgconf | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpgsm | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2022-34903 | gpg: Signature spoofing via status line injection | gpgv | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | krb5-multidev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2020-36130 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... | libaom0 | 1.0.0.errata1-3 | |
MEDIUM | CVE-2020-36135 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... | libaom0 | 1.0.0.errata1-3 | |
MEDIUM | CVE-2021-3658 | bluez: adapter incorrectly restores Discoverable state after powered down | libbluetooth-dev | 5.55-3.1 | |
MEDIUM | CVE-2021-41229 | bluez: memory leak in the SDP protocol | libbluetooth-dev | 5.55-3.1 | |
MEDIUM | CVE-2021-3658 | bluez: adapter incorrectly restores Discoverable state after powered down | libbluetooth3 | 5.55-3.1 | |
MEDIUM | CVE-2021-41229 | bluez: memory leak in the SDP protocol | libbluetooth3 | 5.55-3.1 | |
MEDIUM | CVE-2021-22947 | curl: Server responses received before STARTTLS processed after TLS handshake | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | curl: Set-Cookie denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | curl: HTTP compression denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | curl: FTP-KRB bad message verification | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32221 | curl: POST following PUT confusion | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2021-22947 | curl: Server responses received before STARTTLS processed after TLS handshake | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | curl: Set-Cookie denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | curl: HTTP compression denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | curl: FTP-KRB bad message verification | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32221 | curl: POST following PUT confusion | libcurl4 | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2021-22947 | curl: Server responses received before STARTTLS processed after TLS handshake | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27774 | curl: credential leak on redirect | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-27776 | curl: auth/cookie leak on redirect | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32205 | curl: Set-Cookie denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32206 | curl: HTTP compression denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32208 | curl: FTP-KRB bad message verification | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
MEDIUM | CVE-2022-32221 | curl: POST following PUT confusion | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
MEDIUM | CVE-2020-21594 | libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fal ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21595 | libde265 v1.0.4 contains a heap buffer overflow in the mc_luma functio ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21596 | libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_ ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21597 | libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma funct ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21599 | libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21600 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pr ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21601 | libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallb ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21602 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bi ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21603 | libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fa ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21604 | libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21605 | libde265 v1.0.4 contains a segmentation fault in the apply_sao_interna ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2020-21606 | libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_ ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2021-35452 | An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2021-36408 | An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2021-36410 | A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2021-36411 | An issue has been found in libde265 v1.0.8 due to incorrect access con ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43235 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43236 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43237 | Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vuln ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43238 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43239 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43240 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43241 | Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43242 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43243 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43244 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43245 | Libde265 v1.0.8 was discovered to contain a segmentation violation via ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43248 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43249 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43250 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43252 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-43253 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulne ... | libde265-0 | 1.0.8-1 | |
MEDIUM | CVE-2022-25309 | fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
MEDIUM | CVE-2022-25310 | fribidi: SEGV in fribidi_remove_bidi_marks | libfribidi0 | 1.0.8-2 | 1.0.8-2+deb11u1 |
MEDIUM | CVE-2021-4209 | GnuTLS: Null pointer dereference in MD_UPDATE | libgnutls30 | 3.7.1-5 | 3.7.1-5+deb11u1 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libgssrpc4 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-33068 | harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc | libharfbuzz0b | 2.7.4-1 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg-dev | 1:2.0.6-4 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg62-turbo | 1:2.0.6-4 | |
MEDIUM | CVE-2021-46822 | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c | libjpeg62-turbo-dev | 1:2.0.6-4 | |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libk5crypto3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkdb5-10 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkrb5-3 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkrb5-dev | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2022-42898 | krb5: integer overflow vulnerabilities in PAC parsing | libkrb5support0 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20241 | ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20243 | ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20244 | ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20245 | ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-20246 | ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2021-4219 | imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-1115 | ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-3213 | ImageMagick: heap buffer overflow while processing a malformed TIFF file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
MEDIUM | CVE-2022-38791 | mariadb: compress_write() fails to release mutex on failure | libmariadb-dev | 1:10.5.15-0+deb11u1 | |
MEDIUM | CVE-2022-38791 | mariadb: compress_write() fails to release mutex on failure | libmariadb-dev-compat | 1:10.5.15-0+deb11u1 | |
MEDIUM | CVE-2022-38791 | mariadb: compress_write() fails to release mutex on failure | libmariadb3 | 1:10.5.15-0+deb11u1 | |
MEDIUM | CVE-2021-23215 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-26260 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-3598 | OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-3605 | OpenEXR: Heap buffer overflow in the rleUncompress function | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-3933 | openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-3941 | openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-45942 | OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute | libopenexr-dev | 2.5.4-2 | |
MEDIUM | CVE-2021-23215 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-26260 | OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-3598 | OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-3605 | OpenEXR: Heap buffer overflow in the rleUncompress function | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-3933 | openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-3941 | openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-45942 | OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute | libopenexr25 | 2.5.4-2 | |
MEDIUM | CVE-2021-29338 | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c | libopenjp2-7 | 2.4.0-3 | |
MEDIUM | CVE-2022-1122 | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | libopenjp2-7 | 2.4.0-3 | |
MEDIUM | CVE-2021-29338 | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c | libopenjp2-7-dev | 2.4.0-3 | |
MEDIUM | CVE-2022-1122 | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | libopenjp2-7-dev | 2.4.0-3 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | python: ftplib should not use the host from the PASV response | libpython3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | python: ftplib should not use the host from the PASV response | libpython3.9-stdlib | 3.9.2-1 | |
MEDIUM | CVE-2021-45346 | sqlite: crafted SQL query allows a malicious user to obtain sensitive information | libsqlite3-0 | 3.34.1-3 | |
MEDIUM | CVE-2021-45346 | sqlite: crafted SQL query allows a malicious user to obtain sensitive information | libsqlite3-dev | 3.34.1-3 | |
MEDIUM | CVE-2022-2097 | openssl: AES OCB fails to encrypt some bytes | libssl-dev | 1.1.1n-0+deb11u2 | |
MEDIUM | CVE-2022-2097 | openssl: AES OCB fails to encrypt some bytes | libssl1.1 | 1.1.1n-0+deb11u2 | |
MEDIUM | CVE-2022-3821 | systemd: buffer overrun in format_timespan() function. | libsystemd0 | 247.3-7 | |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1355 | libtiff: stack-buffer-overflow in tiffcp.c in main() | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2056 | LibTiff: DoS from Divide By Zero Error | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2057 | LibTiff: DoS from Divide By Zero Error | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2058 | LibTiff: DoS from Divide By Zero Error | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2867 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2868 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16 | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2869 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractCon | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-34526 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3570 | libtiff: heap Buffer overflows in tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3597 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3598 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3599 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3626 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3627 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiff-dev | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1355 | libtiff: stack-buffer-overflow in tiffcp.c in main() | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2056 | LibTiff: DoS from Divide By Zero Error | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2057 | LibTiff: DoS from Divide By Zero Error | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2058 | LibTiff: DoS from Divide By Zero Error | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2867 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2868 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16 | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2869 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractCon | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-34526 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3570 | libtiff: heap Buffer overflows in tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3597 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3598 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3599 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3626 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3627 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiff5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1354 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1355 | libtiff: stack-buffer-overflow in tiffcp.c in main() | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1622 | libtiff: out-of-bounds read in LZWDecode | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-1623 | libtiff: out-of-bounds read in LZWDecode | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2056 | LibTiff: DoS from Divide By Zero Error | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2057 | LibTiff: DoS from Divide By Zero Error | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2058 | LibTiff: DoS from Divide By Zero Error | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2867 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2868 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16 | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-2869 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractCon | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-34526 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3570 | libtiff: heap Buffer overflows in tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3597 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3598 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3599 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3626 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3627 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
MEDIUM | CVE-2022-3821 | systemd: buffer overrun in format_timespan() function. | libudev1 | 247.3-7 | |
MEDIUM | CVE-2016-3709 | libxml2: Incorrect server side include parsing can lead to XSS | libxml2 | 2.9.10+dfsg-6.7+deb11u2 | |
MEDIUM | CVE-2016-3709 | libxml2: Incorrect server side include parsing can lead to XSS | libxml2-dev | 2.9.10+dfsg-6.7+deb11u2 | |
MEDIUM | CVE-2019-15213 | kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2019-15794 | kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2019-16089 | kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2019-20794 | kernel: task processes not being properly ended could lead to resource exhaustion | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-12363 | kernel: Improper input validation in some Intel(R) Graphics Drivers | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-12364 | kernel: Null pointer dereference in some Intel(R) Graphics Drivers | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-14304 | kernel: ethtool when reading eeprom of device could lead to memory leak | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-15802 | hardware: BLURtooth: "Dual mode" hardware using CTKD are vulnerable to key overwrite | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-24504 | kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-26555 | kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2020-36516 | kernel: off-path attacker may inject data or terminate victim's TCP session | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-33061 | kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapter | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-33655 | kernel: sending malicous data to kernel by ioctl FBIOPUT_VSCREENINFO may cause out of bounds write m | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
MEDIUM | CVE-2021-33656 | kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bou | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
MEDIUM | CVE-2021-3669 | kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-3759 | kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-4023 | kernel: Improper IO-uring request cancellation operation allows local users to cause a crash | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-4149 | kernel: Improper lock operation in btrfs | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2021-44879 | kernel: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-0171 | kernel: KVM: cache incoherence issue in SEV API may lead to kernel crash | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-0480 | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-0494 | kernel: information leak in scsi_ioctl() | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-0854 | kernel: swiotlb information leak with DMA_FROM_DEVICE | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1184 | kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-1280 | kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-1462 | kernel: possible race condition in drivers/tty/tty_buffers.c | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-1508 | kernel: out-of-bounds read in iov_iter_revert() in lib/iov_iter.c | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1789 | kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1852 | kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1974 | kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-spa | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-1975 | kernel: sleep in atomic bug when firmware download timeout | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-20409 | In io_identity_cow of io_uring.c, there is a possible way to corrupt m ... | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-2078 | kernel: buffer overflow in nft_set_desc_concat_parse() | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-21123 | hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21125 | hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21166 | hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
MEDIUM | CVE-2022-21499 | kernel: possible to use the debugger to write zero into a location of choice | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-21505 | kernel: lockdown bypass using IMA | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-2153 | kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
MEDIUM | CVE-2022-2318 | Kernel: A use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
MEDIUM | CVE-2022-23816 | CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-23825 | hw: cpu: AMD: Branch Type Confusion (non-retbleed) | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-2503 | Dm-verity is used for extending root-of-trust to root filesystems. Loa ... | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
MEDIUM | CVE-2022-2586 | kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-26373 | hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-2663 | kernel/netfilter: nf_conntrack_irc message handling issue | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-2873 | kernel: an out-of-bounds vulnerability in i2c-ismt driver | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-2905 | kernel: slab-out-of-bound read in bpf | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
MEDIUM | CVE-2022-29900 | CVE-2022-23816 CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Retur | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-29901 | hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-3061 | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-3169 | Kernel: Request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET may cause a DOS. | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3303 | kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-3344 | kernel: KVM: SVM: nested shutdown interception could lead to host crash | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-33744 | Arm guests can cause Dom0 DoS via PV devices When mapping pages of gue ... | linux-libc-dev | 5.10.113-1 | 5.10.127-2 |
MEDIUM | CVE-2022-3435 | kernel: an out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3523 | Kernel: race when faulting a device private page in memory manager | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3542 | A vulnerability classified as problematic was found in Linux Kernel. T ... | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3586 | kernel: net scheduler use-after-free information disclosure vulnerability | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
MEDIUM | CVE-2022-36280 | kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3646 | A vulnerability, which was classified as problematic, has been found i ... | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
MEDIUM | CVE-2022-36879 | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
MEDIUM | CVE-2022-3707 | kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-38096 | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-38457 | kernel: vmwgfx: use-after-free in vmw_cmd_res_check | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-3903 | kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
MEDIUM | CVE-2022-39188 | Kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-39190 | kernel: nf_tables disallow binding to already bound chain | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
MEDIUM | CVE-2022-39842 | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-40133 | kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-40307 | kernel: use-after-free in efi_capsule_write in capsule-loader.c | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-40768 | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in driver | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
MEDIUM | CVE-2022-4095 | kernel: Use-after-Free/Double-Free bug in read_bbreg_hdl in drivers/staging/rtl8712/rtl8712_cmd.c | linux-libc-dev | 5.10.113-1 | 5.10.148-1 |
MEDIUM | CVE-2022-41218 | kernel: Report vmalloc UAF in dvb-core/dmxdev | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-4129 | kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-41848 | kernel: Race condition between mgslpc_ioctl and mgslpc_detach | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-41849 | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-41850 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-42703 | kernel: use-after-free related to leaf anon_vma double reuse | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
MEDIUM | CVE-2022-42721 | kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-42722 | Kernel: Denial of service in beacon protection for P2P-device | linux-libc-dev | 5.10.113-1 | 5.10.149-1 |
MEDIUM | CVE-2022-42895 | kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-44032 | An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ... | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-44033 | An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ... | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-44034 | An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ... | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-45887 | kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-45888 | kernel: use-after-free due to race condition in drivers/char/xillybus/xillyusb.c | linux-libc-dev | 5.10.113-1 | |
MEDIUM | CVE-2022-38791 | mariadb: compress_write() fails to release mutex on failure | mariadb-common | 1:10.5.15-0+deb11u1 | |
MEDIUM | CVE-2022-2097 | openssl: AES OCB fails to encrypt some bytes | openssl | 1.1.1n-0+deb11u2 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | python: ftplib should not use the host from the PASV response | python3.9 | 3.9.2-1 | |
MEDIUM | CVE-2021-3426 | python: Information disclosure via pydoc | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-3733 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2021-4189 | python: ftplib should not use the host from the PASV response | python3.9-minimal | 3.9.2-1 | |
MEDIUM | CVE-2022-0529 | unzip: Heap out-of-bound writes and reads during conversion of wide string to local string | unzip | 6.0-26 | 6.0-26+deb11u1 |
MEDIUM | CVE-2022-0530 | unzip: SIGSEGV during the conversion of an utf-8 string to a local string | unzip | 6.0-26 | 6.0-26+deb11u1 |
MEDIUM | CVE-2021-31879 | wget: authorization header disclosure on redirect | wget | 1.21-1+deb11u1 | |
LOW | CVE-2011-3374 | It was found that apt-key in apt, all versions, do not correctly valid ... | apt | 2.2.4 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | binutils | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | binutils | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | binutils | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | binutils | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | binutils | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | binutils | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | binutils | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils-common | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils-common | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | binutils-common | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | binutils-common | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | binutils-common | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | binutils-x86-64-linux-gnu | 2.35.2-2 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | bsdutils | 2.36.1-8+deb11u1 | |
LOW | CVE-2016-2781 | coreutils: Non-privileged session can escape to the parent session in chroot | coreutils | 8.32-4 | |
LOW | CVE-2017-18018 | coreutils: race condition vulnerability in chown and chgrp | coreutils | 8.32-4 | |
LOW | CVE-2021-22898 | curl: TELNET stack contents disclosure | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | curl: Content not matching hash in Metalink is not being discarded | curl | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | curl: Metalink download sends credentials | curl | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | curl: Bad connection reuse due to flawed path name checks | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | curl: control code in cookie denial of service | curl | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2018-1000021 | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages t | git | 1:2.30.2-1 | |
LOW | CVE-2022-24975 | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" | git | 1:2.30.2-1 | |
LOW | CVE-2018-1000021 | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages t | git-man | 1:2.30.2-1 | |
LOW | CVE-2022-24975 | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" | git-man | 1:2.30.2-1 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick-6-common | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | imagemagick-6.q16 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2004-0971 | security flaw | krb5-multidev | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | krb5-multidev | 1.18.3-6+deb11u1 | |
LOW | CVE-2011-3374 | It was found that apt-key in apt, all versions, do not correctly valid ... | libapt-pkg6.0 | 2.2.4 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libbinutils | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libbinutils | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | libbinutils | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | libbinutils | 2.35.2-2 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libblkid-dev | 2.36.1-8+deb11u1 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libblkid1 | 2.36.1-8+deb11u1 | |
LOW | CVE-2016-9797 | bluez: buffer over-read in l2cap_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9798 | bluez: use-after-free in conf_opt() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9799 | bluez: buffer overflow in pklg_read_hci() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9800 | bluez: buffer overflow in pin_code_reply_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9801 | bluez: buffer overflow in set_ext_ctrl() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9802 | bluez: buffer over-read in l2cap_packet() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9803 | bluez: out-of-bounds read in le_meta_ev_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9804 | bluez: buffer overflow in commands_dump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9917 | bluez: Heap-based buffer overflow vulnerability in read_n() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9918 | bluez: Out of bounds stack read in packet_hexdump() | libbluetooth-dev | 5.55-3.1 | |
LOW | CVE-2016-9797 | bluez: buffer over-read in l2cap_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9798 | bluez: use-after-free in conf_opt() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9799 | bluez: buffer overflow in pklg_read_hci() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9800 | bluez: buffer overflow in pin_code_reply_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9801 | bluez: buffer overflow in set_ext_ctrl() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9802 | bluez: buffer over-read in l2cap_packet() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9803 | bluez: out-of-bounds read in le_meta_ev_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9804 | bluez: buffer overflow in commands_dump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9917 | bluez: Heap-based buffer overflow vulnerability in read_n() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2016-9918 | bluez: Out of bounds stack read in packet_hexdump() | libbluetooth3 | 5.55-3.1 | |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-bin | 2.31-13+deb11u3 | |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc-dev-bin | 2.31-13+deb11u3 | |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6 | 2.31-13+deb11u3 | |
LOW | CVE-2010-4756 | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2018-20796 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010022 | glibc: stack guard protection bypass | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010023 | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010024 | glibc: ASLR bypass using cache of thread stack and heap | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2019-1010025 | glibc: information disclosure of heap addresses of pthread_created thread | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2019-9192 | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c | libc6-dev | 2.31-13+deb11u3 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo-gobject2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo-script-interpreter2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo2 | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo2 | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo2 | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo2 | 1.16.0-5 | |
LOW | CVE-2017-7475 | cairo: NULL pointer dereference with a crafted font file | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2018-18064 | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2019-6461 | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2019-6462 | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c | libcairo2-dev | 1.16.0-5 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | libctf-nobfd0 | 2.35.2-2 | |
LOW | CVE-2017-13716 | binutils: Memory leak with the C++ symbol demangler routine in libiberty | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-12934 | binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-18483 | binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-20623 | binutils: Use-after-free in the error function | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-20673 | libiberty: Integer overflow in demangle_template() function | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-20712 | libiberty: heap-based buffer over-read in d_expression_1 | libctf0 | 2.35.2-2 | |
LOW | CVE-2018-9996 | binutils: Stack-overflow in libiberty/cplus-dem.c causes crash | libctf0 | 2.35.2-2 | |
LOW | CVE-2019-1010204 | binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread | libctf0 | 2.35.2-2 | |
LOW | CVE-2020-35448 | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-20197 | binutils: Race window allows users to own arbitrary files | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-20284 | binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3487 | binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3530 | binutils: stack memory exhaustion in demangle_path() in rust-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3549 | binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-3826 | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-45078 | binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-46195 | gcc: uncontrolled recursion in libiberty/rust-demangle.c | libctf0 | 2.35.2-2 | |
LOW | CVE-2022-38533 | binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a | libctf0 | 2.35.2-2 | |
LOW | CVE-2021-22898 | curl: TELNET stack contents disclosure | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | curl: Content not matching hash in Metalink is not being discarded | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | curl: Metalink download sends credentials | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | curl: Bad connection reuse due to flawed path name checks | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | curl: control code in cookie denial of service | libcurl3-gnutls | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2021-22898 | curl: TELNET stack contents disclosure | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | curl: Content not matching hash in Metalink is not being discarded | libcurl4 | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | curl: Metalink download sends credentials | libcurl4 | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | curl: Bad connection reuse due to flawed path name checks | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | curl: control code in cookie denial of service | libcurl4 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2021-22898 | curl: TELNET stack contents disclosure | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2021-22922 | curl: Content not matching hash in Metalink is not being discarded | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22923 | curl: Metalink download sends credentials | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | |
LOW | CVE-2021-22924 | curl: Bad connection reuse due to flawed path name checks | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 |
LOW | CVE-2022-35252 | curl: control code in cookie denial of service | libcurl4-openssl-dev | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 |
LOW | CVE-2013-0340 | expat: internal entity expansion | libexpat1 | 2.2.10-2+deb11u3 | |
LOW | CVE-2013-0340 | expat: internal entity expansion | libexpat1-dev | 2.2.10-2+deb11u3 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype-dev | 2.10.4+dfsg-1 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype6 | 2.10.4+dfsg-1 | |
LOW | CVE-2022-31782 | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... | libfreetype6-dev | 2.10.4+dfsg-1 | |
LOW | CVE-2018-6829 | libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintex | libgcrypt20 | 1.8.7-6 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-0 | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-bin | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-data | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-dev | 2.66.8-1 | |
LOW | CVE-2012-0039 | glib2: hash table collisions CPU usage DoS | libglib2.0-dev-bin | 2.66.8-1 | |
LOW | CVE-2011-3389 | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) | libgnutls30 | 3.7.1-5 | |
LOW | CVE-2004-0971 | security flaw | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libgssapi-krb5-2 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libgssrpc4 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libgssrpc4 | 1.18.3-6+deb11u1 | |
LOW | CVE-2017-9937 | libtiff: memory malloc failure in tif_jbig.c could cause DOS. | libjbig-dev | 2.1-3.1 | |
LOW | CVE-2017-9937 | libtiff: memory malloc failure in tif_jbig.c could cause DOS. | libjbig0 | 2.1-3.1 | |
LOW | CVE-2004-0971 | security flaw | libk5crypto3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libk5crypto3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkadm5clnt-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkadm5srv-mit12 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkdb5-10 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkdb5-10 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkrb5-3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5-3 | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkrb5-dev | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5-dev | 1.18.3-6+deb11u1 | |
LOW | CVE-2004-0971 | security flaw | libkrb5support0 | 1.18.3-6+deb11u1 | |
LOW | CVE-2018-5709 | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c | libkrb5support0 | 1.18.3-6+deb11u1 | |
LOW | CVE-2015-3276 | openldap: incorrect multi-keyword mode cipherstring parsing | libldap-2.4-2 | 2.4.57+dfsg-3+deb11u1 | |
LOW | CVE-2017-14159 | openldap: Privilege escalation via PID file manipulation | libldap-2.4-2 | 2.4.57+dfsg-3+deb11u1 | |
LOW | CVE-2017-17740 | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers | libldap-2.4-2 | 2.4.57+dfsg-3+deb11u1 | |
LOW | CVE-2020-15719 | openldap: Certificate validation incorrectly matches name against CN-ID | libldap-2.4-2 | 2.4.57+dfsg-3+deb11u1 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6-arch-config | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-6-extra | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickcore-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6-headers | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6.q16-6 | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-6.q16-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2005-0406 | A design flaw in image processing software that modifies JPEG images m ... | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2008-3134 | GraphicsMagick/ImageMagick: multiple crash or DoS issues | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2016-8678 | ImageMagick: Heap-buffer overflow in IsPixelMonochrome | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11754 | ImageMagick: Memory leak in WritePICONImage function | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-11755 | ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2017-7275 | ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2018-15607 | ImageMagick: CPU Exhaustion via crafted input file | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-20311 | ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-3574 | ImageMagick: memory leaks with convert command | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2021-39212 | ImageMagick: possible read or write in postscript files | libmagickwand-dev | 8:6.9.11.60+dfsg-1.3 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libmount-dev | 2.36.1-8+deb11u1 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libmount1 | 2.36.1-8+deb11u1 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libncurses-dev | 6.2+20201114-2 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libncurses5-dev | 6.2+20201114-2 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libncurses6 | 6.2+20201114-2 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libncursesw5-dev | 6.2+20201114-2 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libncursesw6 | 6.2+20201114-2 | |
LOW | CVE-2017-14988 | OpenEXR: Excessive memory allocation in Header::readfrom | libopenexr-dev | 2.5.4-2 | |
LOW | CVE-2021-26945 | OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> | libopenexr-dev | 2.5.4-2 | |
LOW | CVE-2017-14988 | OpenEXR: Excessive memory allocation in Header::readfrom | libopenexr25 | 2.5.4-2 | |
LOW | CVE-2021-26945 | OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> | libopenexr25 | 2.5.4-2 | |
LOW | CVE-2016-10505 | openjpeg: NULL pointer dereference in imagetopnm function in convert.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-10506 | openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9113 | CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9114 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9115 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9116 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9117 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9580 | openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-9581 | openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2017-17479 | openjpeg: Stack-buffer overflow in the pgxtoimage function | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-16375 | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-16376 | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2018-20846 | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2019-6988 | openjpeg: DoS via memory exhaustion in opj_decompress | libopenjp2-7 | 2.4.0-3 | |
LOW | CVE-2016-10505 | openjpeg: NULL pointer dereference in imagetopnm function in convert.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-10506 | openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9113 | CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9114 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9115 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9116 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9117 | CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9580 | openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2016-9581 | openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2017-17479 | openjpeg: Stack-buffer overflow in the pgxtoimage function | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-16375 | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-16376 | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2018-20846 | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2019-6988 | openjpeg: DoS via memory exhaustion in opj_decompress | libopenjp2-7-dev | 2.4.0-3 | |
LOW | CVE-2017-11164 | pcre: OP_KETRMAX feature in the match function in pcre_exec.c | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre16-3 | 2:8.39-13 | |
LOW | CVE-2017-11164 | pcre: OP_KETRMAX feature in the match function in pcre_exec.c | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre3 | 2:8.39-13 | |
LOW | CVE-2017-11164 | pcre: OP_KETRMAX feature in the match function in pcre_exec.c | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-7245 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-7246 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre3-dev | 2:8.39-13 | |
LOW | CVE-2017-11164 | pcre: OP_KETRMAX feature in the match function in pcre_exec.c | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-7245 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-7246 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcre32-3 | 2:8.39-13 | |
LOW | CVE-2017-11164 | pcre: OP_KETRMAX feature in the match function in pcre_exec.c | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-16231 | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-7245 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2017-7246 | pcre: stack-based buffer overflow write in pcre32_copy_substring | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2019-20838 | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 | libpcrecpp0v5 | 2:8.39-13 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | libperl5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2019-6129 | libpng: memory leak of png_info struct in pngcp.c | libpng-dev | 1.6.37-3 | |
LOW | CVE-2021-4214 | libpng: hardcoded value leads to heap-overflow | libpng-dev | 1.6.37-3 | |
LOW | CVE-2019-6129 | libpng: memory leak of png_info struct in pngcp.c | libpng16-16 | 1.6.37-3 | |
LOW | CVE-2021-4214 | libpng: hardcoded value leads to heap-overflow | libpng16-16 | 1.6.37-3 | |
LOW | CVE-2020-27619 | python: Unsafe use of eval() on data retrieved via HTTP in the test suite | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2021-28861 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2022-37454 | XKCP: buffer overflow in the SHA-3 reference implementation | libpython3.9-minimal | 3.9.2-1 | |
LOW | CVE-2020-27619 | python: Unsafe use of eval() on data retrieved via HTTP in the test suite | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2021-28861 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2022-37454 | XKCP: buffer overflow in the SHA-3 reference implementation | libpython3.9-stdlib | 3.9.2-1 | |
LOW | CVE-2021-36084 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36085 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36086 | libsepol: use-after-free in cil_reset_classpermission() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36087 | libsepol: heap-based buffer overflow in ebitmap_match_any() | libsepol1 | 3.1-1 | |
LOW | CVE-2021-36084 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36085 | libsepol: use-after-free in __cil_verify_classperms() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36086 | libsepol: use-after-free in cil_reset_classpermission() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2021-36087 | libsepol: heap-based buffer overflow in ebitmap_match_any() | libsepol1-dev | 3.1-1 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libsmartcols1 | 2.36.1-8+deb11u1 | |
LOW | CVE-2021-36690 | ** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ... | libsqlite3-0 | 3.34.1-3 | |
LOW | CVE-2022-35737 | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API | libsqlite3-0 | 3.34.1-3 | |
LOW | CVE-2021-36690 | ** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ... | libsqlite3-dev | 3.34.1-3 | |
LOW | CVE-2022-35737 | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API | libsqlite3-dev | 3.34.1-3 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | libssl-dev | 1.1.1n-0+deb11u2 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | libssl-dev | 1.1.1n-0+deb11u2 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | libssl1.1 | 1.1.1n-0+deb11u2 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | libssl1.1 | 1.1.1n-0+deb11u2 | |
LOW | CVE-2013-4392 | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts | libsystemd0 | 247.3-7 | |
LOW | CVE-2020-13529 | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t | libsystemd0 | 247.3-7 | |
LOW | CVE-2021-35331 | ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... | libtcl8.6 | 8.6.11+dfsg-1 | |
LOW | CVE-2014-8130 | libtiff: divide by zero in the tiffdither tool | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1056 | Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2519 | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2520 | libtiff: Assertion fail in rotateImage() function at tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2521 | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2953 | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiff-dev | 4.2.0-1+deb11u1 | |
LOW | CVE-2014-8130 | libtiff: divide by zero in the tiffdither tool | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1056 | Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2519 | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2520 | libtiff: Assertion fail in rotateImage() function at tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2521 | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2953 | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiff5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2014-8130 | libtiff: divide by zero in the tiffdither tool | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-16232 | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-17973 | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-5563 | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2017-9117 | libtiff: Heap-based buffer over-read in bmp2tiff | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2018-10126 | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1056 | Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-1210 | tiff: Malicious file leads to a denial of service in TIFF File Handler | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2519 | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2520 | libtiff: Assertion fail in rotateImage() function at tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2521 | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2022-2953 | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c | libtiffxx5 | 4.2.0-1+deb11u1 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | libtinfo6 | 6.2+20201114-2 | |
LOW | CVE-2013-4392 | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts | libudev1 | 247.3-7 | |
LOW | CVE-2020-13529 | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t | libudev1 | 247.3-7 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | libuuid1 | 2.36.1-8+deb11u1 | |
LOW | CVE-2016-9085 | libwebp: Several integer overflows | libwebp-dev | 0.6.1-2.1 | |
LOW | CVE-2016-9085 | libwebp: Several integer overflows | libwebp6 | 0.6.1-2.1 | |
LOW | CVE-2016-9085 | libwebp: Several integer overflows | libwebpdemux2 | 0.6.1-2.1 | |
LOW | CVE-2016-9085 | libwebp: Several integer overflows | libwebpmux3 | 0.6.1-2.1 | |
LOW | CVE-2007-3476 | libgd Denial of service by corrupted GIF images | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3477 | gd: arc drawing functions can consume large amount of CPU time | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3996 | php multiple integer overflows in gd | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2009-3546 | gd: insufficient input validation in _gdGetColors() | libwmf-dev | 0.2.8.4-17 | |
LOW | CVE-2007-3476 | libgd Denial of service by corrupted GIF images | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2007-3477 | gd: arc drawing functions can consume large amount of CPU time | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2007-3996 | php multiple integer overflows in gd | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2009-3546 | gd: insufficient input validation in _gdGetColors() | libwmf0.2-7 | 0.2.8.4-17 | |
LOW | CVE-2015-9019 | libxslt: math.random() in xslt uses unseeded randomness | libxslt1-dev | 1.1.34-4 | |
LOW | CVE-2015-9019 | libxslt: math.random() in xslt uses unseeded randomness | libxslt1.1 | 1.1.34-4 | |
LOW | CVE-2004-0230 | TCP, when using a large Window Size, makes it easier for remote attack ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2005-3660 | Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2007-3719 | kernel: secretly Monopolizing the CPU Without Superuser Privileges | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2008-2544 | kernel: mounting proc readonly on a different mount point silently mounts it rw if the /proc mount i | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2008-4609 | kernel: TCP protocol vulnerabilities from Outpost24 | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2010-4563 | kernel: ipv6: sniffer detection | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2010-5321 | kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2011-4915 | fs/proc/base.c in the Linux kernel through 3.1 allows local users to o ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2011-4916 | Linux kernel through 3.1 allows local users to obtain sensitive keystr ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2011-4917 | In the Linux kernel through 3.1 there is an information disclosure iss ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2012-4542 | kernel: block: default SCSI command filter does not accomodate commands overlap across device classe | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2014-9892 | The snd_compr_tstamp function in sound/core/compress_offload.c in the ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2014-9900 | kernel: Info leak in uninitialized structure ethtool_wolinfo in ethtool_get_wol() | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2015-2877 | Kernel: Cross-VM ASL INtrospection (CAIN) | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2016-10723 | ** DISPUTED ** An issue was discovered in the Linux kernel through 4.1 ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2016-8660 | kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2017-0630 | kernel: Information disclosure vulnerability in kernel trace subsystem | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2017-13693 | kernel: ACPI operand cache leak in dsutils.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2017-13694 | kernel: ACPI node and node_ext cache leak | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2018-1121 | procps-ng, procps: process hiding through race condition enumerating /proc | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2018-12928 | kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2018-17977 | kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP pack | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-11191 | kernel: race condition in load_aout_binary() allows local users to bypass ASLR on setuid a.out progr | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12378 | kernel: unchecked kmalloc of new_ra in ip6_ra_control leads to denial of service | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12379 | kernel: memory leak in con_insert_unipair in drivers/tty/vt/consolemap.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12380 | kernel: memory allocation failure in the efi subsystem leads to denial of service | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12381 | kernel: unchecked kmalloc of new_ra in ip_ra_control leads to denial of service | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12382 | kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12455 | kernel: null pointer dereference in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c causing de | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-12456 | kernel: double fetch in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl. | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16229 | kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16230 | kernel: null pointer dereference in drivers/gpu/drm/radeon/radeon_display.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16231 | kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16232 | kernel: null-pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16233 | kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-16234 | kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2019-19070 | kernel: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c allows for a DoS | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2020-11725 | kernel: improper handling of private_size*count multiplication due to count=info->owner typo | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2020-35501 | kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH cap | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2021-26934 | An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2021-32078 | kernel: out-of-bounds read in arch/arm/mach-footbridge/personal-pci.c due to improper input validati | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-1734 | kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from u | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
LOW | CVE-2022-1882 | kernel: Use-After-Free in free_pipe_info() could cause an escalation of privileges | linux-libc-dev | 5.10.113-1 | 5.10.136-1 |
LOW | CVE-2022-25265 | kernel: Executable Space Protection Bypass | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-2991 | kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation | linux-libc-dev | 5.10.113-1 | 5.10.120-1 |
LOW | CVE-2022-32296 | kernel: insufficient TCP source port randomness leads to client identification | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
LOW | CVE-2022-32981 | kernel: Linux kernel for powerpc 32-bit buffer overflow in ptrace PEEKUSER/POKEUSER | linux-libc-dev | 5.10.113-1 | 5.10.127-1 |
LOW | CVE-2022-3521 | A vulnerability has been found in Linux Kernel and classified as probl ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-3531 | A vulnerability was found in Linux Kernel. It has been classified as p ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-3532 | A vulnerability was found in Linux Kernel. It has been declared as pro ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-3535 | A vulnerability classified as problematic was found in Linux Kernel. A ... | linux-libc-dev | 5.10.113-1 | |
LOW | CVE-2022-3629 | A vulnerability was found in Linux Kernel. It has been declared as pro ... | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
LOW | CVE-2022-3633 | A vulnerability classified as problematic has been found in Linux Kern ... | linux-libc-dev | 5.10.113-1 | 5.10.140-1 |
LOW | CVE-2007-5686 | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... | login | 1:4.8.1-1 | |
LOW | CVE-2013-4235 | shadow-utils: TOCTOU race conditions by copying and removing directory trees | login | 1:4.8.1-1 | |
LOW | CVE-2019-19882 | shadow-utils: local users can obtain root access because setuid programs are misconfigured | login | 1:4.8.1-1 | |
LOW | CVE-2008-1687 | m4: unquoted output of maketemp and mkstemp | m4 | 1.4.18-5 | |
LOW | CVE-2008-1688 | m4: code execution via -F argument | m4 | 1.4.18-5 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | mount | 2.36.1-8+deb11u1 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | ncurses-base | 6.2+20201114-2 | |
LOW | CVE-2021-39537 | ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c | ncurses-bin | 6.2+20201114-2 | |
LOW | CVE-2007-2243 | OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2007-2768 | OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2008-3234 | sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ... | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2016-20012 | openssh: Public key information leak | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2018-15919 | openssh: User enumeration via malformed packets in authentication requests | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2019-6110 | openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2020-14145 | openssh: Observable discrepancy leading to an information leak in the algorithm negotiation | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2020-15778 | openssh: scp allows command injection when using backtick characters in the destination argument | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2021-36368 | openssh: possible bypass of fido 2 devices and ssh-askpass | openssh-client | 1:8.4p1-5 | |
LOW | CVE-2007-6755 | Dual_EC_DRBG: weak pseudo random number generator | openssl | 1.1.1n-0+deb11u2 | |
LOW | CVE-2010-0928 | openssl: RSA authentication weakness | openssl | 1.1.1n-0+deb11u2 | |
LOW | CVE-2007-5686 | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... | passwd | 1:4.8.1-1 | |
LOW | CVE-2013-4235 | shadow-utils: TOCTOU race conditions by copying and removing directory trees | passwd | 1:4.8.1-1 | |
LOW | CVE-2019-19882 | shadow-utils: local users can obtain root access because setuid programs are misconfigured | passwd | 1:4.8.1-1 | |
LOW | CVE-2010-4651 | patch: directory traversal flaw allows for arbitrary file creation | patch | 2.7.6-7 | |
LOW | CVE-2018-6951 | patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash | patch | 2.7.6-7 | |
LOW | CVE-2018-6952 | patch: Double free of memory in pch.c:another_hunk() causes a crash | patch | 2.7.6-7 | |
LOW | CVE-2021-45261 | patch: Invalid Pointer via another_hunk function | patch | 2.7.6-7 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl | 5.32.1-4+deb11u2 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl-base | 5.32.1-4+deb11u2 | |
LOW | CVE-2011-4116 | perl: File::Temp insecure temporary file handling | perl-modules-5.32 | 5.32.1-4+deb11u2 | |
LOW | CVE-2020-27619 | python: Unsafe use of eval() on data retrieved via HTTP in the test suite | python3.9 | 3.9.2-1 | |
LOW | CVE-2021-28861 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure | python3.9 | 3.9.2-1 | |
LOW | CVE-2022-37454 | XKCP: buffer overflow in the SHA-3 reference implementation | python3.9 | 3.9.2-1 | |
LOW | CVE-2020-27619 | python: Unsafe use of eval() on data retrieved via HTTP in the test suite | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2021-28861 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2022-37454 | XKCP: buffer overflow in the SHA-3 reference implementation | python3.9-minimal | 3.9.2-1 | |
LOW | CVE-2005-2541 | tar: does not properly warn the user when extracting setuid or setgid files | tar | 1.34+dfsg-1 | |
LOW | CVE-2021-35331 | ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... | tcl8.6 | 8.6.11+dfsg-1 | |
LOW | CVE-2021-35331 | ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... | tcl8.6-dev | 8.6.11+dfsg-1 | |
LOW | CVE-2021-4217 | unzip: Null pointer dereference in Unicode strings code | unzip | 6.0-26 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | util-linux | 2.36.1-8+deb11u1 | |
LOW | CVE-2022-0563 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline | uuid-dev | 2.36.1-8+deb11u1 | |
UNKNOWN | CVE-2022-3628 | linux-libc-dev | 5.10.113-1 | ||
UNKNOWN | CVE-2022-45934 | An issue was discovered in the Linux kernel through 6.0.10. l2cap_conf ... | linux-libc-dev | 5.10.113-1 | |
UNKNOWN | DSA-5257-2 | linux - regression update | linux-libc-dev | 5.10.113-1 | 5.10.149-2 |
Date: 2022-12-01