kernel-headers |
CVE-2024-46695 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46695
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-09-13 06:15 修改: 2024-10-17 14:15
|
kernel-headers |
CVE-2024-49949 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49949
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:03
|
kernel-headers |
CVE-2024-50082 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50082
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15
|
kernel-headers |
CVE-2024-50099 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: arm64: probes: Remove broken LDR (literal) uprobe support
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50099
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-05 18:15 修改: 2024-11-12 16:28
|
kernel-headers |
CVE-2024-50110 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: xfrm: fix one more kernel-infoleak in algo dumping
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50110
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:05
|
kernel-headers |
CVE-2024-50142 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50142
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:47
|
kernel-headers |
CVE-2024-50192 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50192
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:00
|
kernel-headers |
CVE-2024-53088 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.34.1.el8_10 |
kernel: i40e: fix race condition by adding filter's intermediate sync state
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53088
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-19 18:15 修改: 2024-11-25 13:38
|
kernel-headers |
CVE-2024-53122 |
高危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.34.1.el8_10 |
kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53122
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-12-02 14:15 修改: 2024-12-14 21:15
|
pam |
CVE-2024-10963 |
高危 |
1.3.1-34.0.1.el8_10 |
1.3.1-36.0.1.el8_10 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15
|
python36 |
CVE-2024-53899 |
高危 |
3.6.8-39.module+el8.10.0+90274+07ba55de |
3.6.8-39.module+el8.10.0+90473+c30184f9 |
virtualenv: potential command injection via virtual environment activation scripts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53899
镜像层: sha256:097f444f3879f9f1150b49ab204554b3b6712ef9236013f57d59c47fe6e7dd02
发布日期: 2024-11-24 16:15 修改: 2024-11-26 18:23
|
kernel-headers |
CVE-2024-38564 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38564
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:44
|
kernel-headers |
CVE-2024-46858 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: mptcp: pm: Fix uaf in __timer_delete_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46858
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-09-27 13:15 修改: 2024-12-27 13:15
|
kernel-headers |
CVE-2024-50256 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50256
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:11
|
kernel-headers |
CVE-2024-50264 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50264
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15
|
kernel-headers |
CVE-2024-27043 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: media: edia: dvbdev: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27043
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:13
|
pam |
CVE-2024-10041 |
中危 |
1.3.1-34.0.1.el8_10 |
1.3.1-36.0.1.el8_10 |
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15
|
platform-python |
CVE-2024-11168 |
中危 |
3.6.8-67.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15
|
platform-python |
CVE-2024-9287 |
中危 |
3.6.8-67.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
python3-libs |
CVE-2024-11168 |
中危 |
3.6.8-67.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15
|
python3-libs |
CVE-2024-9287 |
中危 |
3.6.8-67.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:297aaf62f39d6daeed8416dd1dcb094a43a583cf4beac4b77d6656a7da100518
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
kernel-headers |
CVE-2024-27399 |
中危 |
4.18.0-553.27.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399
镜像层: sha256:a557af4318c740ec3907dc89dd2228d2059a6df9dfa2fffd0d9011c0ad69151f
发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16
|