object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(9031)
    ["cve_code"]=>
    string(13) "CVE-2023-5367"
    ["cnnvd"]=>
    string(17) "CNNVD-202310-2162"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(7.8)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(305) "在xorg-x11-服务器中发现了越界写入漏洞。此问题是由于在复制存储在堆中的Xi/xiproperty.c中的XIChangeDeviceProperty函数和randr/rrproperty.c中的RRChangeOutputProperty函数中的数据时,缓冲区偏移量计算不正确,从而可能导致特权升级或拒绝服务。"
    ["date"]=>
    string(10) "2024-08-14"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(15) "xorg-x11-server"
    ["repair_version"]=>
    string(29) "xorg-x11-server-1.20.8-22.up5"
    ["repair"]=>
    string(43) "软件包升级
dnf update xorg-x11-server
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(31) {
      [0]=>
      string(51) "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
      [1]=>
      string(52) "https://access.redhat.com/security/cve/CVE-2023-5367"
      [2]=>
      string(67) "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
      [3]=>
      string(45) "https://www.debian.org/security/2023/dsa-5534"
      [4]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/"
      [5]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/"
      [6]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/"
      [7]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/"
      [8]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:6802"
      [9]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:6808"
      [10]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/"
      [11]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/"
      [12]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/"
      [13]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/"
      [14]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/"
      [15]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7373"
      [16]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7388"
      [17]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7405"
      [18]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7428"
      [19]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7436"
      [20]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7526"
      [21]=>
      string(47) "https://access.redhat.com/errata/RHSA-2023:7533"
      [22]=>
      string(56) "https://security.netapp.com/advisory/ntap-20231130-0004/"
      [23]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:0010"
      [24]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:0128"
      [25]=>
      string(42) "https://security.gentoo.org/glsa/202401-30"
      [26]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:2169"
      [27]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:2170"
      [28]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:2995"
      [29]=>
      string(47) "https://access.redhat.com/errata/RHSA-2024:2996"
      [30]=>
      string(0) ""
    }
    ["createtime"]=>
    int(1700882214)
    ["updatetime"]=>
    int(1700882214)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-09-10"
    ["cve_name"]=>
    string(37) "xorg-x11-server 缓冲区错误漏洞"
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(9031)
    ["cve_code"]=>
    string(13) "CVE-2023-5367"
    ["cnnvd"]=>
    string(17) "CNNVD-202310-2162"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(7.8)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(305) "在xorg-x11-服务器中发现了越界写入漏洞。此问题是由于在复制存储在堆中的Xi/xiproperty.c中的XIChangeDeviceProperty函数和randr/rrproperty.c中的RRChangeOutputProperty函数中的数据时,缓冲区偏移量计算不正确,从而可能导致特权升级或拒绝服务。"
    ["date"]=>
    string(10) "2024-08-14"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(15) "xorg-x11-server"
    ["repair_version"]=>
    string(29) "xorg-x11-server-1.20.8-22.up5"
    ["repair"]=>
    string(43) "软件包升级
dnf update xorg-x11-server
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(2200) "https://bugzilla.redhat.com/show_bug.cgi?id=2243091;https://access.redhat.com/security/cve/CVE-2023-5367;https://lists.x.org/archives/xorg-announce/2023-October/003430.html;https://www.debian.org/security/2023/dsa-5534;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/;https://access.redhat.com/errata/RHSA-2023:6802;https://access.redhat.com/errata/RHSA-2023:6808;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/;https://access.redhat.com/errata/RHSA-2023:7373;https://access.redhat.com/errata/RHSA-2023:7388;https://access.redhat.com/errata/RHSA-2023:7405;https://access.redhat.com/errata/RHSA-2023:7428;https://access.redhat.com/errata/RHSA-2023:7436;https://access.redhat.com/errata/RHSA-2023:7526;https://access.redhat.com/errata/RHSA-2023:7533;https://security.netapp.com/advisory/ntap-20231130-0004/;https://access.redhat.com/errata/RHSA-2024:0010;https://access.redhat.com/errata/RHSA-2024:0128;https://security.gentoo.org/glsa/202401-30;https://access.redhat.com/errata/RHSA-2024:2169;https://access.redhat.com/errata/RHSA-2024:2170;https://access.redhat.com/errata/RHSA-2024:2995;https://access.redhat.com/errata/RHSA-2024:2996;"
    ["createtime"]=>
    int(1700882214)
    ["updatetime"]=>
    int(1700882214)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-09-10"
    ["cve_name"]=>
    string(37) "xorg-x11-server 缓冲区错误漏洞"
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "9031"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}