krb5-libs |
CVE-2024-3596 |
高危 |
1.18.2-26.el8 |
1.18.2-30.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-09 12:15 修改: 2024-12-30 19:23
|
libsoup |
CVE-2024-52530 |
高危 |
2.62.3-5.el8 |
2.62.3-6.el8_10 |
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52530
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-11 20:15 修改: 2024-11-12 19:35
|
libsoup |
CVE-2024-52532 |
高危 |
2.62.3-5.el8 |
2.62.3-6.el8_10 |
libsoup: infinite loop while reading websocket data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52532
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-11 20:15 修改: 2024-11-12 19:35
|
pam |
CVE-2024-10041 |
高危 |
1.3.1-27.el8 |
1.3.1-36.el8_10 |
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15
|
pam |
CVE-2024-10963 |
高危 |
1.3.1-27.el8 |
1.3.1-36.el8_10 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15
|
platform-python-setuptools |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
python3-setuptools |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
python3-setuptools-wheel |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
gnutls |
CVE-2023-5981 |
中危 |
3.6.16-7.el8 |
3.6.16-8.el8_9 |
gnutls: timing side-channel in the RSA-PSK authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15
|
gnutls |
CVE-2024-28834 |
中危 |
3.6.16-7.el8 |
3.6.16-8.el8_9.3 |
gnutls: vulnerable to Minerva side-channel information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15
|
kernel-headers |
CVE-2022-48773 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48773
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:45
|
kernel-headers |
CVE-2022-48936 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: gso: do not skip outer ip header in case of ipip and net_failover
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48936
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-22 04:15 修改: 2024-08-31 06:15
|
kernel-headers |
CVE-2023-52492 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dmaengine: fix NULL pointer in channel unregistration function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52492
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-03-11 18:15 修改: 2024-11-06 19:35
|
kernel-headers |
CVE-2024-24857 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24857
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-05 08:15 修改: 2024-06-27 12:15
|
kernel-headers |
CVE-2024-26851 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15
|
kernel-headers |
CVE-2024-26924 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nft_set_pipapo: do not free live element
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26924
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-04-25 06:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-26976 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26976
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-27017 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27017
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-01 06:15 修改: 2024-10-17 14:15
|
kernel-headers |
CVE-2024-27043 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: media: edia: dvbdev: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27043
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:13
|
kernel-headers |
CVE-2024-27062 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: nouveau: lock the client object tree.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27062
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-01 13:15 修改: 2024-11-05 17:35
|
kernel-headers |
CVE-2024-27399 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-35839 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35839
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-17 15:15 修改: 2024-05-17 18:35
|
kernel-headers |
CVE-2024-35898 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35898
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-35939 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dma-direct: Leak pages on dma_set_decrypted() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35939
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00
|
kernel-headers |
CVE-2024-38540 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38540
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-19 14:15 修改: 2024-11-14 16:15
|
kernel-headers |
CVE-2024-38541 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: of: module: add buffer overflow check in of_modalias()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38541
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-19 14:15 修改: 2024-07-03 02:05
|
kernel-headers |
CVE-2024-38564 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38564
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:44
|
kernel-headers |
CVE-2024-38586 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38586
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-19 14:15 修改: 2024-07-05 08:15
|
kernel-headers |
CVE-2024-38608 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: net/mlx5e: Fix netif state handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38608
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-19 14:15 修改: 2024-08-27 15:58
|
kernel-headers |
CVE-2024-39503 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39503
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40924 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/i915/dpt: Make DPT object unshrinkable
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40924
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40961 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ipv6: prevent possible NULL deref in fib6_nh_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40961
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:54
|
kernel-headers |
CVE-2024-40983 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: tipc: force a dst refcount before doing decryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40983
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40984 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40984
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-41009 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bpf: Fix overrunning reservations in ringbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41009
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-17 07:15 修改: 2024-07-29 07:15
|
kernel-headers |
CVE-2024-41042 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: prefer nft_chain_validate
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41042
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 15:15 修改: 2024-08-19 05:15
|
kernel-headers |
CVE-2024-41066 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ibmvnic: Add tx check to prevent skb leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41066
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:06
|
kernel-headers |
CVE-2024-41092 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41092
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:51
|
kernel-headers |
CVE-2024-41093 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/amdgpu: avoid using null object of framebuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41093
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:40
|
kernel-headers |
CVE-2024-42070 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42070
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01
|
kernel-headers |
CVE-2024-42079 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42079
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:58
|
kernel-headers |
CVE-2024-42244 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: USB: serial: mos7840: fix crash on resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42244
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53
|
kernel-headers |
CVE-2024-42284 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42284
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:47
|
kernel-headers |
CVE-2024-42292 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: kobject_uevent: Fix OOB access within zap_modalias_env()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42292
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59
|
kernel-headers |
CVE-2024-42301 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dev/parport: fix the array out-of-bounds risk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42301
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:31
|
kernel-headers |
CVE-2024-43854 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: block: initialize integrity buffer to zero before writing it to media
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43854
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-17 10:15 修改: 2024-09-12 12:15
|
kernel-headers |
CVE-2024-43880 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43880
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30
|
kernel-headers |
CVE-2024-43889 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43889
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38
|
kernel-headers |
CVE-2024-43892 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: memcg: protect concurrent access to mem_cgroup_idr
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43892
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15
|
kernel-headers |
CVE-2024-44935 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: sctp: Fix null-ptr-deref in reuseport_add_sock().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44935
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:09
|
kernel-headers |
CVE-2024-44989 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bonding: fix xfrm real_dev null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44989
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31
|
kernel-headers |
CVE-2024-44990 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44990
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31
|
kernel-headers |
CVE-2024-45018 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: flowtable: initialise extack before use
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45018
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36
|
kernel-headers |
CVE-2024-46695 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46695
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-13 06:15 修改: 2024-10-17 14:15
|
kernel-headers |
CVE-2024-46826 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ELF: fix kernel.randomize_va_space double read
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46826
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:19
|
kernel-headers |
CVE-2024-46858 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.30.1.el8_10 |
kernel: mptcp: pm: Fix uaf in __timer_delete_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46858
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-09-27 13:15 修改: 2024-12-27 13:15
|
kernel-headers |
CVE-2024-47668 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47668
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-09 15:15 修改: 2024-10-23 15:30
|
kernel-headers |
CVE-2024-49949 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49949
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:03
|
kernel-headers |
CVE-2024-50082 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50082
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15
|
kernel-headers |
CVE-2024-50099 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: arm64: probes: Remove broken LDR (literal) uprobe support
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50099
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-05 18:15 修改: 2024-11-12 16:28
|
kernel-headers |
CVE-2024-50110 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: xfrm: fix one more kernel-infoleak in algo dumping
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50110
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:05
|
kernel-headers |
CVE-2024-50142 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50142
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:47
|
kernel-headers |
CVE-2024-50192 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50192
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:00
|
kernel-headers |
CVE-2024-50256 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50256
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:11
|
kernel-headers |
CVE-2024-50264 |
中危 |
4.18.0-553.16.1.el8_10 |
4.18.0-553.32.1.el8_10 |
kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50264
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15
|
curl |
CVE-2023-28322 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15
|
less |
CVE-2022-48624 |
中危 |
530-1.el8 |
530-2.el8_9 |
less: missing quoting of shell metacharacters in LESSCLOSE handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48624
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-19 01:15 修改: 2024-06-10 18:15
|
libcurl-minimal |
CVE-2023-28322 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15
|
libcurl-minimal |
CVE-2023-38546 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15
|
libcurl-minimal |
CVE-2023-46218 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15
|
curl |
CVE-2023-38546 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15
|
curl |
CVE-2023-46218 |
中危 |
7.61.1-33.el8 |
7.61.1-33.el8_9.5 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15
|
libxml2 |
CVE-2024-25062 |
中危 |
2.9.7-16.el8_8.1 |
2.9.7-18.el8_10.1 |
libxml2: use-after-free in XMLReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40
|
expat |
CVE-2023-52425 |
中危 |
2.2.5-11.el8 |
2.2.5-11.el8_9.1 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35
|
expat |
CVE-2024-45490 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
pam |
CVE-2024-22365 |
中危 |
1.3.1-27.el8 |
1.3.1-33.el8 |
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
platform-python |
CVE-2024-11168 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15
|
platform-python |
CVE-2024-9287 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
platform-python-devel |
CVE-2024-11168 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15
|
platform-python-devel |
CVE-2024-9287 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
expat |
CVE-2024-45491 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
python3-libs |
CVE-2024-11168 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15
|
python3-libs |
CVE-2024-9287 |
中危 |
3.6.8-67.el8_10.rocky.0 |
3.6.8-69.el8_10.rocky.0 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
expat |
CVE-2024-45492 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
expat |
CVE-2024-50602 |
中危 |
2.2.5-11.el8 |
2.2.5-16.el8_10 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35
|
python3.11 |
CVE-2024-9287 |
中危 |
3.11.10-1.el8_10 |
3.11.11-1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
python3.11-libs |
CVE-2024-9287 |
中危 |
3.11.10-1.el8_10 |
3.11.11-1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15
|
sqlite-libs |
CVE-2023-7104 |
中危 |
3.26.0-18.el8_8 |
3.26.0-19.el8_9 |
sqlite: heap-buffer-overflow at sessionfuzz
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34
|
krb5-libs |
CVE-2024-26458 |
低危 |
1.18.2-26.el8 |
1.18.2-27.el8_10 |
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15
|
openssl |
CVE-2024-5535 |
低危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_10 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
openssl-libs |
CVE-2024-5535 |
低危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_10 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
krb5-libs |
CVE-2024-26461 |
低危 |
1.18.2-26.el8 |
1.18.2-27.el8_10 |
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
binutils |
CVE-2018-12699 |
低危 |
2.30-123.el8 |
2.30-125.el8_10 |
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
bzip2-libs |
CVE-2019-12900 |
低危 |
1.0.6-26.el8 |
1.0.6-27.el8_10 |
bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:8c5e449db0e402ef79809821a0363d3ab6d011582ee8ac9636efaf9621e49fdb
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|