| gnupg2 |
CVE-2025-68973 |
高危 |
2.3.3-4.el9 |
2.3.3-5.el9_7 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| libarchive |
CVE-2025-5914 |
高危 |
3.5.3-4.el9.0.1 |
3.5.3-6.el9_6 |
libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5914
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-09 20:15 修改: 2026-02-05 20:15
|
| libarchive |
CVE-2026-4111 |
高危 |
3.5.3-4.el9.0.1 |
3.5.3-7.el9_7 |
libarchive: Infinite Loop Denial of Service in RAR5 Decompression via archive_read_data() in libarchive
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4111
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-03-13 19:55 修改: 2026-05-12 10:16
|
| libarchive |
CVE-2026-4424 |
高危 |
3.5.3-4.el9.0.1 |
3.5.3-9.el9_7 |
libarchive: libarchive: Information disclosure via heap out-of-bounds read in RAR archive processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4424
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-03-19 15:16 修改: 2026-05-12 10:16
|
| libarchive |
CVE-2026-5121 |
高危 |
3.5.3-4.el9.0.1 |
3.5.3-9.el9_7 |
libarchive: libarchive: Arbitrary code execution via integer overflow in ISO9660 image processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5121
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-03-30 08:16 修改: 2026-05-12 10:16
|
| libbrotli |
CVE-2025-6176 |
高危 |
1.0.9-7.el9_5 |
1.0.9-9.el9_7 |
Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6176
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-10-31 00:15 修改: 2026-04-15 00:35
|
| libcap |
CVE-2026-4878 |
高危 |
2.48-9.el9_2 |
2.48-10.el9_7.1 |
libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4878
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-04-09 16:16 修改: 2026-05-07 22:16
|
| libnghttp2 |
CVE-2026-27135 |
高危 |
1.43.0-6.el9 |
1.43.0-6.el9_7.1 |
nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27135
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-03-18 18:16 修改: 2026-03-23 17:51
|
| libxml2 |
CVE-2025-49794 |
高危 |
2.9.13-9.el9_6 |
2.9.13-10.el9_6 |
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49794
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-16 16:15 修改: 2026-05-12 13:17
|
| libxml2 |
CVE-2025-49796 |
高危 |
2.9.13-9.el9_6 |
2.9.13-10.el9_6 |
libxml: Type confusion leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49796
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-16 16:15 修改: 2026-05-12 13:17
|
| libxml2 |
CVE-2025-6021 |
高危 |
2.9.13-9.el9_6 |
2.9.13-10.el9_6 |
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6021
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-12 13:15 修改: 2026-05-12 13:17
|
| libxml2 |
CVE-2025-7425 |
高危 |
2.9.13-9.el9_6 |
2.9.13-11.el9_6 |
libxslt: libxml2: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7425
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-10 14:15 修改: 2026-05-12 13:17
|
| pam |
CVE-2025-6020 |
高危 |
1.5.1-23.el9 |
1.5.1-26.el9_6 |
linux-pam: Linux-pam directory Traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6020
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-17 13:15 修改: 2026-05-12 13:17
|
| pam |
CVE-2025-8941 |
高危 |
1.5.1-23.el9 |
1.5.1-26.el9_6 |
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-08-13 15:15 修改: 2026-04-15 00:35
|
| sqlite-libs |
CVE-2025-6965 |
高危 |
3.34.1-7.el9_3 |
3.34.1-9.el9_7 |
sqlite: Integer Truncation in SQLite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6965
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-15 14:15 修改: 2026-04-14 10:16
|
| curl |
CVE-2025-9086 |
中危 |
7.76.1-31.el9 |
7.76.1-35.el9_7.3 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libarchive |
CVE-2025-25724 |
中危 |
3.5.3-4.el9.0.1 |
3.5.3-5.el9_6 |
libarchive: Buffer Overflow vulnerability in libarchive
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25724
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-03-02 02:15 修改: 2025-07-17 15:56
|
| gnutls |
CVE-2025-14831 |
中危 |
3.8.3-6.el9 |
3.8.3-10.el9_7 |
gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14831
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-02-09 15:16 修改: 2026-05-12 13:16
|
| gnutls |
CVE-2025-32988 |
中危 |
3.8.3-6.el9 |
3.8.3-6.el9_6.2 |
gnutls: Vulnerability in GnuTLS otherName SAN export
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32988
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-10 08:15 修改: 2026-05-12 13:16
|
| libcurl |
CVE-2025-9086 |
中危 |
7.76.1-31.el9 |
7.76.1-35.el9_7.3 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| gnutls |
CVE-2025-32989 |
中危 |
3.8.3-6.el9 |
3.8.3-6.el9_6.2 |
gnutls: Vulnerability in GnuTLS SCT extension parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32989
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-10 08:15 修改: 2026-05-12 13:16
|
| libssh |
CVE-2025-5318 |
中危 |
0.10.4-13.el9 |
0.10.4-15.el9_6 |
libssh: out-of-bounds read in sftp_handle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5318
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-24 14:15 修改: 2026-02-27 17:16
|
| libssh |
CVE-2025-5987 |
中危 |
0.10.4-13.el9 |
0.10.4-17.el9_7 |
libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5987
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-07 15:15 修改: 2026-03-20 21:17
|
| libssh-config |
CVE-2025-5318 |
中危 |
0.10.4-13.el9 |
0.10.4-15.el9_6 |
libssh: out-of-bounds read in sftp_handle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5318
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-06-24 14:15 修改: 2026-02-27 17:16
|
| libssh-config |
CVE-2025-5987 |
中危 |
0.10.4-13.el9 |
0.10.4-17.el9_7 |
libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5987
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-07 15:15 修改: 2026-03-20 21:17
|
| gnutls |
CVE-2025-32990 |
中危 |
3.8.3-6.el9 |
3.8.3-6.el9_6.2 |
gnutls: Vulnerability in GnuTLS certtool template parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32990
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-10 10:15 修改: 2026-04-20 22:16
|
| gnutls |
CVE-2025-6395 |
中危 |
3.8.3-6.el9 |
3.8.3-6.el9_6.2 |
gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6395
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-07-10 16:15 修改: 2026-05-12 13:17
|
| gnutls |
CVE-2025-9820 |
中危 |
3.8.3-6.el9 |
3.8.3-10.el9_7 |
gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9820
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2026-01-26 20:16 修改: 2026-05-12 13:17
|
| krb5-libs |
CVE-2025-3576 |
中危 |
1.21.1-6.el9 |
1.21.1-8.el9_6 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-04-15 06:15 修改: 2026-05-12 13:17
|
| libxml2 |
CVE-2025-32414 |
中危 |
2.9.13-9.el9_6 |
2.9.13-12.el9_6 |
libxml2: Out-of-Bounds Read in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32414
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-04-08 03:15 修改: 2025-11-03 20:18
|
| libxml2 |
CVE-2025-32415 |
中危 |
2.9.13-9.el9_6 |
2.9.13-12.el9_6 |
libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32415
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-04-17 17:15 修改: 2025-11-03 20:18
|
| libxml2 |
CVE-2025-9714 |
中危 |
2.9.13-9.el9_6 |
2.9.13-14.el9_7 |
libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9714
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-09-10 19:15 修改: 2026-05-12 13:17
|
| glib2 |
CVE-2024-52533 |
中危 |
2.68.4-16.el9 |
2.68.4-16.el9_6.2 |
glib: buffer overflow in set_connect_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2024-11-11 23:15 修改: 2025-06-17 01:23
|
| glib2 |
CVE-2025-13601 |
中危 |
2.68.4-16.el9 |
2.68.4-18.el9_7.1 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-11-26 15:15 修改: 2026-04-19 20:16
|
| glib2 |
CVE-2025-4373 |
中危 |
2.68.4-16.el9 |
2.68.4-16.el9_6.2 |
glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4373
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2025-05-06 15:16 修改: 2026-05-12 13:17
|
| ncurses-libs |
CVE-2022-29458 |
低危 |
6.2-10.20210508.el9 |
6.2-10.20210508.el9_6.2 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|
| shadow-utils |
CVE-2024-56433 |
低危 |
2:4.9-12.el9 |
2:4.9-15.el9 |
shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2024-12-26 09:15 修改: 2026-04-15 00:35
|
| ncurses-base |
CVE-2022-29458 |
低危 |
6.2-10.20210508.el9 |
6.2-10.20210508.el9_6.2 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:5556686b341b7bc3e29b6420da30d3e2ab0d504697387e705dcc667b6edbccee
发布日期: 2022-04-18 21:15 修改: 2025-06-09 15:15
|