kernel-devel |
CVE-2024-39494 |
高危 |
4.14.352-267.564.amzn2 |
4.14.352-268.568.amzn2 |
kernel: ima: Fix use-after-free on a dentry's dname.name
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39494
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-07-12 13:15 修改: 2024-07-24 19:17
|
kernel-devel |
CVE-2024-46738 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35
|
kernel-devel |
CVE-2024-46743 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32
|
kernel-devel |
CVE-2024-46744 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Squashfs: sanity check symbolic link size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36
|
kernel-devel |
CVE-2024-46745 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Input: uinput - reject requests with unreasonable number of slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30
|
kernel-devel |
CVE-2024-46750 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: PCI: Add missing bridge lock to pci_bus_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27
|
kernel-devel |
CVE-2024-46800 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: sch/netem: fix use after free in netem_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18
|
kernel-devel |
CVE-2024-46829 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27
|
kernel-devel |
CVE-2024-46840 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: btrfs: clean up our handling of refs == 0 in snapshot delete
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15
|
kernel-headers |
CVE-2024-39494 |
高危 |
4.14.352-267.564.amzn2 |
4.14.352-268.568.amzn2 |
kernel: ima: Fix use-after-free on a dentry's dname.name
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39494
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-07-12 13:15 修改: 2024-07-24 19:17
|
kernel-headers |
CVE-2024-46738 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35
|
kernel-headers |
CVE-2024-46743 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32
|
kernel-headers |
CVE-2024-46744 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Squashfs: sanity check symbolic link size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36
|
kernel-headers |
CVE-2024-46745 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Input: uinput - reject requests with unreasonable number of slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30
|
kernel-headers |
CVE-2024-46750 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: PCI: Add missing bridge lock to pci_bus_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27
|
kernel-headers |
CVE-2024-46800 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: sch/netem: fix use after free in netem_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18
|
kernel-headers |
CVE-2024-46829 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27
|
kernel-headers |
CVE-2024-46840 |
高危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: btrfs: clean up our handling of refs == 0 in snapshot delete
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15
|
kernel-devel |
CVE-2024-46781 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: fix missing cleanup on rollforward recovery error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37
|
kernel-devel |
CVE-2024-43871 |
中危 |
4.14.352-267.564.amzn2 |
4.14.353-270.569.amzn2 |
kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43871
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:39
|
kernel-devel |
CVE-2024-44944 |
中危 |
4.14.352-267.564.amzn2 |
4.14.353-270.569.amzn2 |
kernel: netfilter: ctnetlink: use helper function to calculate expect ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44944
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-08-30 08:15 修改: 2024-09-10 08:15
|
kernel-devel |
CVE-2024-44987 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: ipv6: prevent UAF in ip6_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53
|
kernel-devel |
CVE-2024-46756 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46757 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46758 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46759 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28
|
kernel-devel |
CVE-2024-46763 |
中危 |
4.14.352-267.564.amzn2 |
4.14.352-268.569.amzn2 |
kernel: fou: Fix null-ptr-deref in GRO.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46763
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:14
|
kernel-devel |
CVE-2024-46780 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: protect references to superblock parameters exposed in sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31
|
kernel-headers |
CVE-2024-43871 |
中危 |
4.14.352-267.564.amzn2 |
4.14.353-270.569.amzn2 |
kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43871
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:39
|
kernel-headers |
CVE-2024-44944 |
中危 |
4.14.352-267.564.amzn2 |
4.14.353-270.569.amzn2 |
kernel: netfilter: ctnetlink: use helper function to calculate expect ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44944
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-08-30 08:15 修改: 2024-09-10 08:15
|
kernel-headers |
CVE-2024-44987 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: ipv6: prevent UAF in ip6_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53
|
kernel-headers |
CVE-2024-46756 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46757 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46758 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46759 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28
|
kernel-headers |
CVE-2024-46763 |
中危 |
4.14.352-267.564.amzn2 |
4.14.352-268.569.amzn2 |
kernel: fou: Fix null-ptr-deref in GRO.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46763
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:14
|
kernel-headers |
CVE-2024-46780 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: protect references to superblock parameters exposed in sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31
|
kernel-headers |
CVE-2024-46781 |
中危 |
4.14.352-267.564.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: fix missing cleanup on rollforward recovery error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37
|
libdwarf |
CVE-2020-27545 |
中危 |
20130207-4.amzn2.0.2 |
20130207-4.amzn2.0.3 |
libdwarf: carefully corrupted line table can crash calling app
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27545
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2023-04-16 00:15 修改: 2023-04-26 15:08
|
python |
CVE-2023-27043 |
中危 |
2.7.18-1.amzn2.0.8 |
2.7.18-1.amzn2.0.9 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:50398924c43a1129031d251a84eea6a278d1f682e8e9c27ab4e73e34e9f42acd
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python-libs |
CVE-2023-27043 |
中危 |
2.7.18-1.amzn2.0.8 |
2.7.18-1.amzn2.0.9 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:50398924c43a1129031d251a84eea6a278d1f682e8e9c27ab4e73e34e9f42acd
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
gdb |
CVE-2023-39130 |
低危 |
8.0.1-36.amzn2.0.1 |
8.0.1-36.amzn2.0.2 |
gdb: heap-buffer-overflow in pe_as16(void*)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39130
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2023-07-25 19:15 修改: 2023-08-03 13:50
|
gdb |
CVE-2023-39128 |
低危 |
8.0.1-36.amzn2.0.1 |
8.0.1-36.amzn2.0.2 |
gdb: dynamic-stack-buffer-overflow in ada_decode[abi:cxx11](char const*, bool, bool)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39128
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2023-07-25 19:15 修改: 2023-08-03 13:48
|
gdb |
CVE-2023-39129 |
低危 |
8.0.1-36.amzn2.0.1 |
8.0.1-36.amzn2.0.2 |
gdb: heap-use-after-free /home/root/sp/Dataset/Binutils/binutils_aflpp/gdb/coff-pe-read.c:137:27
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39129
镜像层: sha256:578c17d42d6f79944ec2dd17a61758c802a0cec1fbc5ba5b5ee4b4ab06e3f630
发布日期: 2023-07-25 19:15 修改: 2023-08-03 13:49
|