expat |
CVE-2024-45490 |
高危 |
2.1.0-15.amzn2.0.3 |
2.1.0-15.amzn2.0.4 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
expat-devel |
CVE-2024-45490 |
高危 |
2.1.0-15.amzn2.0.3 |
2.1.0-15.amzn2.0.4 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
avahi-libs |
CVE-2024-52616 |
中危 |
0.6.31-20.amzn2.0.5 |
0.6.31-20.amzn2.0.7 |
avahi: Avahi Wide-Area DNS Predictable Transaction IDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15
|
apr |
CVE-2023-49582 |
中危 |
1.7.2-1.amzn2 |
1.7.2-1.amzn2.0.1 |
APR: Lax permissions in Apache Portable Runtime shared memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49582
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-08-26 14:15 修改: 2024-08-27 16:04
|
avahi-libs |
CVE-2024-52615 |
中危 |
0.6.31-20.amzn2.0.5 |
0.6.31-20.amzn2.0.7 |
avahi: Avahi Wide-Area DNS Uses Constant Source Port
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15
|
glibc |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-devel |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-headers |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-langpack-en |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
kernel-devel |
CVE-2024-44987 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: ipv6: prevent UAF in ip6_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53
|
kernel-devel |
CVE-2024-46738 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35
|
kernel-devel |
CVE-2024-46743 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32
|
kernel-devel |
CVE-2024-46744 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Squashfs: sanity check symbolic link size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36
|
kernel-devel |
CVE-2024-46745 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Input: uinput - reject requests with unreasonable number of slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30
|
kernel-devel |
CVE-2024-46750 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: PCI: Add missing bridge lock to pci_bus_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27
|
kernel-devel |
CVE-2024-46756 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46757 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46758 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-devel |
CVE-2024-46759 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28
|
kernel-devel |
CVE-2024-46780 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: protect references to superblock parameters exposed in sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31
|
kernel-devel |
CVE-2024-46781 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: fix missing cleanup on rollforward recovery error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37
|
kernel-devel |
CVE-2024-46800 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: sch/netem: fix use after free in netem_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18
|
kernel-devel |
CVE-2024-46829 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27
|
kernel-devel |
CVE-2024-46840 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: btrfs: clean up our handling of refs == 0 in snapshot delete
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15
|
kernel-headers |
CVE-2024-44987 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: ipv6: prevent UAF in ip6_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53
|
kernel-headers |
CVE-2024-46738 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35
|
kernel-headers |
CVE-2024-46743 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32
|
kernel-headers |
CVE-2024-46744 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Squashfs: sanity check symbolic link size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36
|
kernel-headers |
CVE-2024-46745 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: Input: uinput - reject requests with unreasonable number of slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30
|
kernel-headers |
CVE-2024-46750 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: PCI: Add missing bridge lock to pci_bus_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27
|
kernel-headers |
CVE-2024-46756 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46757 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46758 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29
|
kernel-headers |
CVE-2024-46759 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28
|
kernel-headers |
CVE-2024-46780 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: protect references to superblock parameters exposed in sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31
|
kernel-headers |
CVE-2024-46781 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: nilfs2: fix missing cleanup on rollforward recovery error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37
|
kernel-headers |
CVE-2024-46800 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: sch/netem: fix use after free in netem_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18
|
kernel-headers |
CVE-2024-46829 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27
|
kernel-headers |
CVE-2024-46840 |
中危 |
4.14.353-270.569.amzn2 |
4.14.355-271.569.amzn2 |
kernel: btrfs: clean up our handling of refs == 0 in snapshot delete
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840
镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65
发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15
|
libcrypt |
CVE-2024-33600 |
中危 |
2.26-64.amzn2.0.2 |
2.26-64.amzn2.0.3 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
libxml2 |
CVE-2024-34459 |
中危 |
2.9.1-6.amzn2.5.13 |
2.9.1-6.amzn2.5.14 |
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35
|
vim-data |
CVE-2024-43802 |
中危 |
2:9.0.2153-1.amzn2.0.1 |
2:9.0.2153-1.amzn2.0.2 |
vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02
|
vim-minimal |
CVE-2024-43802 |
中危 |
2:9.0.2153-1.amzn2.0.1 |
2:9.0.2153-1.amzn2.0.2 |
vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802
镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269
发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02
|